A machine learning model based on heterogeneous data





Blockchain, heterogeneous data, SVM, secure scheme


Big data is widely used in many areas of business. The information between organizations is systematically reproduced and processed by data, and the collected data differs significantly in attributes. By composing heterogeneous data sets, they complement each other, therefore, data exchange between organizations is necessary. In a machine learning collaborative learning process based on heterogeneous data, the current schema has many challenges, including efficiency, security, and availability in real-world situations. In this paper, we propose a secure SVM learning mechanism based on the consortium blockchain and a threshold homomorphic encryption algorithm. By implementing the consortium’s blockchain, it is possible to build a decentralized data exchange platform, and also to develop a secure algorithm for the support-vector machine classifier based on threshold homomorphic encryption


[1] Narbayeva S., Bakibayev T., Abeshev K., Makarova I., Shubenkova K., Pashkevich A., "Blockchain Technology on the Way of Autonomous Vehicles Development" , Transportation Research Procedia 44 (2020): 168-175.
[2] Cheng N. , Lyu F. , Chen J., Xu W., Zhou H., Zhang S., Shen X.S., "Big data driven vehicular networks" , IEEE Netw. 32(6) (2018): 160-167.
[3] Fadlullah Z.M., Tang F., Mao B., Kato N., Akashi O., Inoue T., Mizutani K., "State-of-theart deep learning: evolving machine intelligence toward tomorrow’s intelligent network traffic control systems" , IEEE Commun. Surv. Tutorials 19(4) (2017): 2432-2455.
[4] Lv L., Zhang Y., Li Y., Xu K., Wang D., Wang W., Li M., Cao X., Liang Q., "Communicationaware container placement and reassignment in large-scale Internet data centers" , IEEE J. Sel. Areas Commun. 37(3) (2019): 540-555.
[5] Song D.X., Wagner D., Perrig A., "Practical techniques for searches on encrypted data" , IEEE S&P (2000): 44-55.
[6] Li H., Zhu L., Shen M., Gao F., Tao X., Liu S., "Blockchain-based data preservation system for medical data" , J. Med. Syst. 42(8) (2018): 141.
[7] Shen M., Ma B., Zhu L., Du X., Xu K., "Secure phrase search for intelligent processing of encrypted data in cloud-based IoT" , IEEE Internet Things J. 6(2), (2019): 1998-2008.
[8] Xu K., Yue H., Guo L., Guo Y., Fang Y., "Privacy-preserving machine learning algorithms for big data systems" , IEEE 35th International Conference on Distributed Computing Systems (IEEE, Piscataway (2015): 318-327.
[9] Mohassel P., Rindal P., "ABY 3: a mixed protocol framework for machine learning," , Proceedings of the 2018 ACMSIGSAC Conference on Computer and Communications Security, ACM, New York (2018): 35-52.
[10] Katz J., Lindell Y., " , Introduction to Modern Cryptography (Chapman and Hall/CRC, Boca Raton, 2014)
[11] Mangasarian O.L., Wolberg W.H., " , Cancer diagnosis via linear programming Technical report (University of WisconsinMadison Department of Computer Sciences, 1990)