Access-Private outsourcing of markov chain and randomWalk based data analysis applications

Ping Lin, Kasim Candan

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

Random walk graph and Markov chain based models are used heavily in many data and system analysis domains, including web, bioinformatics, and queueing. These models enable the description and analysis of various behaviors of stochastic systems. If the system being modelled has certain properties, such as if it is irreducible and aperiodic, close form formulations corresponding to its stationary behavior can be used to analyze its behavior. However, if the system does not have these properties or if the user is not interested in the stationary behavior, then an iterative approach needs to be used to determine potential outcomes based on the initial probability distribution inputs to the model. In this paper, we focus on access-privacy enabled outsourced Markov chain based data analysis applications, where a non-Trusted service provider takes (hidden) user queries that are described in terms of initial state distributions, and evaluates them iteratively in an oblivious manner. We show that this iterative process can leak information regarding the possible values of the hidden input if the server has a priori knowledge about the underlying Markovian process. Hence as opposed to simple obfuscation mechanisms, we develop an algorithm based on methodical addition of extra states, which guarantees unbounded feasible regions for the inputs, thus preventing a malicious host from having an informed guess regarding the inputs.

Original languageEnglish (US)
Title of host publicationICDEW 2006 - Proceedings of the 22nd International Conference on Data Engineering Workshops
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)0769525717, 9780769525716
DOIs
StatePublished - 2006
Event22nd International Conference on Data Engineering Workshops, ICDEW 2006 - Atlanta, United States
Duration: Apr 3 2006Apr 7 2006

Other

Other22nd International Conference on Data Engineering Workshops, ICDEW 2006
CountryUnited States
CityAtlanta
Period4/3/064/7/06

Fingerprint

Outsourcing
Markov processes
Stochastic systems
Bioinformatics
Probability distributions
Servers
Systems analysis
Markov chain
Random walk

ASJC Scopus subject areas

  • Information Systems
  • Computer Networks and Communications
  • Information Systems and Management

Cite this

Lin, P., & Candan, K. (2006). Access-Private outsourcing of markov chain and randomWalk based data analysis applications. In ICDEW 2006 - Proceedings of the 22nd International Conference on Data Engineering Workshops [1623892] Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/ICDEW.2006.25

Access-Private outsourcing of markov chain and randomWalk based data analysis applications. / Lin, Ping; Candan, Kasim.

ICDEW 2006 - Proceedings of the 22nd International Conference on Data Engineering Workshops. Institute of Electrical and Electronics Engineers Inc., 2006. 1623892.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Lin, P & Candan, K 2006, Access-Private outsourcing of markov chain and randomWalk based data analysis applications. in ICDEW 2006 - Proceedings of the 22nd International Conference on Data Engineering Workshops., 1623892, Institute of Electrical and Electronics Engineers Inc., 22nd International Conference on Data Engineering Workshops, ICDEW 2006, Atlanta, United States, 4/3/06. https://doi.org/10.1109/ICDEW.2006.25
Lin P, Candan K. Access-Private outsourcing of markov chain and randomWalk based data analysis applications. In ICDEW 2006 - Proceedings of the 22nd International Conference on Data Engineering Workshops. Institute of Electrical and Electronics Engineers Inc. 2006. 1623892 https://doi.org/10.1109/ICDEW.2006.25
Lin, Ping ; Candan, Kasim. / Access-Private outsourcing of markov chain and randomWalk based data analysis applications. ICDEW 2006 - Proceedings of the 22nd International Conference on Data Engineering Workshops. Institute of Electrical and Electronics Engineers Inc., 2006.
@inproceedings{d8f08d729f704d0c99eac420395a5978,
title = "Access-Private outsourcing of markov chain and randomWalk based data analysis applications",
abstract = "Random walk graph and Markov chain based models are used heavily in many data and system analysis domains, including web, bioinformatics, and queueing. These models enable the description and analysis of various behaviors of stochastic systems. If the system being modelled has certain properties, such as if it is irreducible and aperiodic, close form formulations corresponding to its stationary behavior can be used to analyze its behavior. However, if the system does not have these properties or if the user is not interested in the stationary behavior, then an iterative approach needs to be used to determine potential outcomes based on the initial probability distribution inputs to the model. In this paper, we focus on access-privacy enabled outsourced Markov chain based data analysis applications, where a non-Trusted service provider takes (hidden) user queries that are described in terms of initial state distributions, and evaluates them iteratively in an oblivious manner. We show that this iterative process can leak information regarding the possible values of the hidden input if the server has a priori knowledge about the underlying Markovian process. Hence as opposed to simple obfuscation mechanisms, we develop an algorithm based on methodical addition of extra states, which guarantees unbounded feasible regions for the inputs, thus preventing a malicious host from having an informed guess regarding the inputs.",
author = "Ping Lin and Kasim Candan",
year = "2006",
doi = "10.1109/ICDEW.2006.25",
language = "English (US)",
booktitle = "ICDEW 2006 - Proceedings of the 22nd International Conference on Data Engineering Workshops",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
address = "United States",

}

TY - GEN

T1 - Access-Private outsourcing of markov chain and randomWalk based data analysis applications

AU - Lin, Ping

AU - Candan, Kasim

PY - 2006

Y1 - 2006

N2 - Random walk graph and Markov chain based models are used heavily in many data and system analysis domains, including web, bioinformatics, and queueing. These models enable the description and analysis of various behaviors of stochastic systems. If the system being modelled has certain properties, such as if it is irreducible and aperiodic, close form formulations corresponding to its stationary behavior can be used to analyze its behavior. However, if the system does not have these properties or if the user is not interested in the stationary behavior, then an iterative approach needs to be used to determine potential outcomes based on the initial probability distribution inputs to the model. In this paper, we focus on access-privacy enabled outsourced Markov chain based data analysis applications, where a non-Trusted service provider takes (hidden) user queries that are described in terms of initial state distributions, and evaluates them iteratively in an oblivious manner. We show that this iterative process can leak information regarding the possible values of the hidden input if the server has a priori knowledge about the underlying Markovian process. Hence as opposed to simple obfuscation mechanisms, we develop an algorithm based on methodical addition of extra states, which guarantees unbounded feasible regions for the inputs, thus preventing a malicious host from having an informed guess regarding the inputs.

AB - Random walk graph and Markov chain based models are used heavily in many data and system analysis domains, including web, bioinformatics, and queueing. These models enable the description and analysis of various behaviors of stochastic systems. If the system being modelled has certain properties, such as if it is irreducible and aperiodic, close form formulations corresponding to its stationary behavior can be used to analyze its behavior. However, if the system does not have these properties or if the user is not interested in the stationary behavior, then an iterative approach needs to be used to determine potential outcomes based on the initial probability distribution inputs to the model. In this paper, we focus on access-privacy enabled outsourced Markov chain based data analysis applications, where a non-Trusted service provider takes (hidden) user queries that are described in terms of initial state distributions, and evaluates them iteratively in an oblivious manner. We show that this iterative process can leak information regarding the possible values of the hidden input if the server has a priori knowledge about the underlying Markovian process. Hence as opposed to simple obfuscation mechanisms, we develop an algorithm based on methodical addition of extra states, which guarantees unbounded feasible regions for the inputs, thus preventing a malicious host from having an informed guess regarding the inputs.

UR - http://www.scopus.com/inward/record.url?scp=84990935227&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84990935227&partnerID=8YFLogxK

U2 - 10.1109/ICDEW.2006.25

DO - 10.1109/ICDEW.2006.25

M3 - Conference contribution

AN - SCOPUS:84990935227

BT - ICDEW 2006 - Proceedings of the 22nd International Conference on Data Engineering Workshops

PB - Institute of Electrical and Electronics Engineers Inc.

ER -