Privacy-preserving imputation of missing data

被引:17
|
作者
Jagannathan, Geetha [1 ]
Wright, Rebecca N. [1 ]
机构
[1] Stevens Inst Technol, Dept Comp Sci, Hoboken, NJ 07030 USA
基金
美国国家科学基金会;
关键词
data cleaning; data imputation; privacy-preserving protocols;
D O I
10.1016/j.datak.2007.06.013
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Handling missing data is a critical step to ensuring good results in data mining. Like most data mining algorithms, existing privacy-preserving data mining algorithms assume data is complete. In order to maintain privacy in the data mining process while cleaning data, privacy-preserving methods of data cleaning are required. In this paper, we address the problem of privacy-preserving data imputation of missing data. We present a privacy-preserving protocol for filling in missing values using a lazy decision-tree imputation algorithm for data that is horizontally partitioned between two parties. The participants of the protocol learn only the imputed values. The computed decision tree is not learned by either party. (c) 2007 Elsevier B.V. All rights reserved.
引用
收藏
页码:40 / 56
页数:17
相关论文
共 50 条
  • [21] Privacy-preserving collaborative data mining
    Zhan, J
    Chang, LW
    Matwin, S
    FOUNDATIONS AND NOVEL APPROACHES IN DATA MINING, 2006, 9 : 213 - +
  • [22] Privacy-preserving data set union
    Segre, Alberto Maria
    Wildenberg, Andrew
    Vieland, Veronica
    Zhang, Ying
    PRIVACY IN STATISTICAL DATABASES, PROCEEDINGS, 2006, 4302 : 266 - +
  • [23] Privacy-preserving Sensory Data Recovery
    Chen, Cai
    Zhang, Manyuan
    Zhang, Huanzhi
    Huang, Zhenyun
    Li, Yong
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 1646 - 1650
  • [24] Privacy-Preserving and Verifiable Data Aggregation
    Tran, Hieu N.
    Deng, Robert H.
    Pang, HweeHwa
    PROCEEDINGS OF THE SINGAPORE CYBER-SECURITY CONFERENCE (SG-CRC) 2016: CYBER-SECURITY BY DESIGN, 2016, 14 : 115 - 122
  • [25] Privacy-preserving clustering of data streams
    Chao, Ching-Ming
    Chen, Po-Zung
    Sun, Chu-Hao
    Tamkang Journal of Science and Engineering, 2010, 13 (03): : 349 - 358
  • [26] Privacy-preserving Multimedia Data Analysis
    Zhu, Xiaofeng
    Thung, Kim Han
    Kim, Minjeong
    COMPUTER JOURNAL, 2021, 64 (07): : 991 - 992
  • [27] PRIVACY-PRESERVING COLLABORATIVE DATA MINING
    Zhan, Justin
    KMIS 2009: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON KNOWLEDGE MANAGEMENT AND INFORMATION SHARING, 2009, : IS15 - IS15
  • [28] Privacy-Preserving Integration of Medical Data
    Miyaji, Atsuko
    Nakasho, Kazuhisa
    Nishida, Shohei
    JOURNAL OF MEDICAL SYSTEMS, 2017, 41 (03)
  • [29] Privacy-preserving publishing for streaming data
    Huang, Xuezhen
    Liu, Jiqiang
    Han, Zhen
    Yang, Jun
    Journal of Computational Information Systems, 2015, 11 (05): : 1863 - 1877
  • [30] Privacy-Preserving Sequential Data Publishing
    Wang, Huili
    Ma, Wenping
    Zheng, Haibin
    Liang, Zhi
    Wu, Qianhong
    NETWORK AND SYSTEM SECURITY, NSS 2019, 2019, 11928 : 596 - 614