Privacy-Preserving Data Mining: A Game-Theoretic Approach

被引:0
|
作者
Miyaji, Atsuko [1 ]
Rahman, Mohammad Shahriar [1 ]
机构
[1] Japan Adv Inst Sci & Technol, Sch Informat Sci, Nomi, Ishikawa 9231292, Japan
关键词
Privacy-preserving data mining; Set-intersection; Game theory; Computational strict Nash equilibrium; Stability with respect to trembles; MULTIPARTY COMPUTATION; PROTOCOLS; CRYPTOGRAPHY; SECURITY;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Privacy-preserving data mining has been an active research area in recent years due to privacy concerns in many distributed data mining settings. Protocols for privacy-preserving data mining have considered semi-honest, malicious, and covert adversarial models in cryptographic settings, whereby an adversary is assumed to follow, arbitrarily deviate from the protocol, or behaving somewhere in between these two, respectively. Semi-honest model provides weak security requiring small amount of computation, on the other hand, malicious and covert models provide strong security requiring expensive computations like homomorphic encryptions. However, game theory allows us to design protocols where parties are neither honest nor malicious but are instead viewed as rational and are assumed (only) to act in their own self-interest. In this paper, we build efficient and secure set-intersection protocol in game-theoretic setting using cryptographic primitives. Our construction avoids the use of expensive tools like homomorphic encryption and oblivious transfer. We also show that our protocol satisfies computational versions of strict Nash equilibrium and stability with respect to trembles.
引用
收藏
页码:186 / 200
页数:15
相关论文
共 50 条
  • [1] A Game-Theoretic Approach to Quality Control for Collecting Privacy-Preserving Data
    Wang, Weina
    Ying, Lei
    Zhang, Junshan
    [J]. 2015 53RD ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING (ALLERTON), 2015, : 474 - 479
  • [2] A Game-theoretic Framework for Privacy-preserving Federated Learning
    Zhang, Xiaojin
    Fan, Lixin
    Wang, Siwei
    Li, Wenjie
    Chen, Kai
    Yang, Qiang
    [J]. ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY, 2024, 15 (03)
  • [3] A Game-Theoretic Model for Energy Trading of Privacy-Preserving Microgrid Social Networks
    He, Youbiao
    Wei, Jin
    [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON SMART GRID COMMUNICATIONS (SMARTGRIDCOMM), 2016,
  • [4] Multi-party, privacy-preserving distributed data mining using a game theoretic framework
    Kargupta, Hillol
    Das, Kamalika
    Liu, Kun
    [J]. KNOWLEDGE DISCOVERY IN DATABASES: PKDD 2007, PROCEEDINGS, 2007, 4702 : 523 - +
  • [5] Towards Privacy-Preserving Spatial Distribution Crowdsensing: A Game Theoretic Approach
    Ren, Yanbing
    Li, Xinghua
    Miao, Yinbin
    Luo, Bin
    Weng, Jian
    Choo, Kim-Kwang Raymond
    Deng, Robert H.
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 804 - 818
  • [6] Privacy-preserving data mining
    Agrawal, R
    Srikant, R
    [J]. SIGMOD RECORD, 2000, 29 (02) : 439 - 450
  • [8] Data privacy in construction industry by privacy-preserving data mining (PPDM) approach
    Patel T.
    Patel V.
    [J]. Asian Journal of Civil Engineering, 2020, 21 (3) : 505 - 515
  • [9] A Privacy-Preserving Game Model for Local Differential Privacy by Using Information-Theoretic Approach
    Wu, Ningbo
    Peng, Changgen
    Niu, Kun
    [J]. IEEE ACCESS, 2020, 8 (08): : 216741 - 216751
  • [10] Privacy-preserving collaborative data mining
    Zhan, J
    Chang, LW
    Matwin, S
    [J]. FOUNDATIONS AND NOVEL APPROACHES IN DATA MINING, 2006, 9 : 213 - +