Privacy-Preserving Mining of Decision Trees Using Data Negation Approach

被引:0
|
作者
Dhandhania, R. K. [1 ]
Baruah, P. K. [1 ]
Mukkamala, R. [2 ]
机构
[1] Sri Sathya Sai Inst Higher Learning, Dept Math & Comp Sci, Prasanthinilayam, India
[2] Old Dominion Univ, Dept Comp Sci, Norfolk, VA 23529 USA
关键词
ID3; Algorithm; Entropy; privacy-preserving; privacy-loss;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the ever increasing need to share data across organizations, the demand for its privacy is also becoming increasingly important. In the past, several techniques have been proposed for privacy-preserving data mining. In this paper, we propose a privacy-preserving technique to build decision trees. We refer to it as negation technique. Since our technique does not employ any cryptographic techniques, it is computationally efficient. However, as a trade-off, it requires extra storage at the data owner site. We show that there is no loss in accuracy of the resulting decision tree due to the proposed data transformations. In this technique, we convert all the tuples in the database to anti-tuples, and then using the results obtained, we build the original decision tree from the transformed tuples. Privacy can be enhanced further by using cryptographic techniques along with this technique.
引用
收藏
页码:43 / 48
页数:6
相关论文
共 50 条
  • [1] Privacy-preserving data mining
    Agrawal, R
    Srikant, R
    [J]. SIGMOD RECORD, 2000, 29 (02) : 439 - 450
  • [2] Privacy-preserving decision trees over vertically partitioned data
    Vaidya, J
    Clifton, C
    [J]. DATA AND APPLICATIONS SECURITY XIX, PROCEEDINGS, 2005, 3654 : 139 - 152
  • [3] A Random Decision Tree Framework for Privacy-Preserving Data Mining
    Vaidya, Jaideep
    Shafiq, Basit
    Fan, Wei
    Mehmood, Danish
    Lorenzi, David
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2014, 11 (05) : 399 - 411
  • [4] Data privacy in construction industry by privacy-preserving data mining (PPDM) approach
    Patel T.
    Patel V.
    [J]. Asian Journal of Civil Engineering, 2020, 21 (3) : 505 - 515
  • [5] Privacy-Preserving Gradient Boosting Decision Trees
    Li, Qinbin
    Wu, Zhaomin
    Wen, Zeyi
    He, Bingsheng
    [J]. THIRTY-FOURTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, THE THIRTY-SECOND INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE CONFERENCE AND THE TENTH AAAI SYMPOSIUM ON EDUCATIONAL ADVANCES IN ARTIFICIAL INTELLIGENCE, 2020, 34 : 784 - 791
  • [6] Privacy-Preserving Decision Trees Training and Prediction
    Akavia, Adi
    Leibovich, Max
    Resheff, Yehezkel S.
    Ron, Roey
    Shahar, Moni
    Vald, Margarita
    [J]. MACHINE LEARNING AND KNOWLEDGE DISCOVERY IN DATABASES, ECML PKDD 2020, PT I, 2021, 12457 : 145 - 161
  • [7] Privacy-Preserving Inductive Learning with Decision Trees
    Truex, Stacey
    Liu, Ling
    Gursoy, Mehmet Emre
    Yu, Lei
    [J]. 2017 IEEE 6TH INTERNATIONAL CONGRESS ON BIG DATA (BIGDATA CONGRESS 2017), 2017, : 57 - 64
  • [8] Privacy-Preserving Decision Trees Training and Prediction
    Akavia, Adi
    Leibovich, Max
    Resheff, Yehezkel S.
    Ron, Roey
    Shahar, Moni
    Vald, Margarita
    [J]. ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2022, 25 (03)
  • [9] A Review on Privacy-Preserving Data Mining
    Li, Xueyun
    Yan, Zheng
    Zhang, Peng
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY (CIT), 2014, : 769 - 774
  • [10] Privacy-preserving collaborative data mining
    Zhan, J
    Chang, LW
    Matwin, S
    [J]. FOUNDATIONS AND NOVEL APPROACHES IN DATA MINING, 2006, 9 : 213 - +