Privacy-Preserving Mining of Decision Trees Using Data Negation Approach

被引:0
|
作者
Dhandhania, R. K. [1 ]
Baruah, P. K. [1 ]
Mukkamala, R. [2 ]
机构
[1] Sri Sathya Sai Inst Higher Learning, Dept Math & Comp Sci, Prasanthinilayam, India
[2] Old Dominion Univ, Dept Comp Sci, Norfolk, VA 23529 USA
关键词
ID3; Algorithm; Entropy; privacy-preserving; privacy-loss;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the ever increasing need to share data across organizations, the demand for its privacy is also becoming increasingly important. In the past, several techniques have been proposed for privacy-preserving data mining. In this paper, we propose a privacy-preserving technique to build decision trees. We refer to it as negation technique. Since our technique does not employ any cryptographic techniques, it is computationally efficient. However, as a trade-off, it requires extra storage at the data owner site. We show that there is no loss in accuracy of the resulting decision tree due to the proposed data transformations. In this technique, we convert all the tuples in the database to anti-tuples, and then using the results obtained, we build the original decision tree from the transformed tuples. Privacy can be enhanced further by using cryptographic techniques along with this technique.
引用
收藏
页码:43 / 48
页数:6
相关论文
共 50 条
  • [41] A hybrid multi-group approach for privacy-preserving data mining
    Teng, Zhouxuan
    Du, Wenliang
    [J]. KNOWLEDGE AND INFORMATION SYSTEMS, 2009, 19 (02) : 133 - 157
  • [42] A Knowledge Model Sharing Based Approach to Privacy-Preserving Data Mining
    Tian, Hongwei
    Zhang, Weining
    Xu, Shouhuai
    Sharkey, Patrick
    [J]. TRANSACTIONS ON DATA PRIVACY, 2012, 5 (02) : 433 - 467
  • [43] DATA MINING AS A TOOL IN PRIVACY-PRESERVING DATA PUBLISHING
    Sramka, Michal
    [J]. NILCRYPT 10, 2010, 45 : 151 - 159
  • [44] Accuracy in Privacy-Preserving Data Mining Using the Paradigm of Cryptographic Elections
    Magkos, Emmanouil
    Maragoudakis, Manolis
    Chrissikopoulos, Vassilis
    Gridzalis, Stefanos
    [J]. PRIVACY IN STATISTICAL DATABASES, PROCEEDINGS, 2008, 5262 : 284 - +
  • [45] Privacy-Preserving Decision Trees Evaluation via Linear Functions
    Tai, Raymond K. H.
    Ma, Jack P. K.
    Zhao, Yongjun
    Chow, Sherman S. M.
    [J]. COMPUTER SECURITY - ESORICS 2017, PT II, 2017, 10493 : 494 - 512
  • [46] PRELIMINARY DATA ANALYSIS IN HEALTHCARE MULTICENTRIC DATA MINING: A PRIVACY-PRESERVING DISTRIBUTED APPROACH
    Damiani, Andrea
    Masciocchi, Carlotta
    Boldrini, Luca
    Gatta, Roberto
    Dinapoli, Nicola
    Lenkowicz, Jacopo
    Chiloiro, Giuditta
    Gambacorta, Maria Antonietta
    Tagliaferri, Luca
    Autorino, Rosa
    Pagliara, Monica Maria
    Blasi, Maria Antonietta
    van Soest, Johan
    Dekker, Andre
    Valentini, Vincenzo
    [J]. JOURNAL OF E-LEARNING AND KNOWLEDGE SOCIETY, 2018, 14 (01): : 71 - 81
  • [47] A high collusion-resistant approach to distributed privacy-preserving data mining
    Urabe, Shintaro
    Wang, Jiahong
    Kodama, Eiichiro
    Takata, Toyoo
    [J]. PROCEEDINGS OF THE IASTED INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING AND NETWORKS, 2007, : 326 - +
  • [48] Recent Developments in Privacy-preserving Mining of Clinical Data
    Desmet, Chance
    Cook, Diane J.
    [J]. ACM/IMS Transactions on Data Science, 2021, 2 (04):
  • [49] Efficient paillier cryptoprocessor for privacy-preserving data mining
    San, Ismail
    At, Nuray
    Yakut, Ibrahim
    Polat, Huseyin
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (11) : 1535 - 1546
  • [50] Comparative Analysis of Privacy-Preserving Data Mining Techniques
    Bhandari, Neetika
    Pahwa, Payal
    [J]. INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING AND COMMUNICATIONS, VOL 2, 2019, 56 : 535 - 541