A hybrid multi-group approach for privacy-preserving data mining

被引:17
|
作者
Teng, Zhouxuan [1 ]
Du, Wenliang [1 ]
机构
[1] Syracuse Univ, Dept Elect Engn & Comp Sci, Syracuse, NY 13244 USA
关键词
Privacy; SMC; Randomization; Hybrid;
D O I
10.1007/s10115-008-0158-y
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, we propose a hybrid multi-group approach for privacy preserving data mining. We make two contributions in this paper. First, we propose a hybrid approach. Previous work has used either the randomization approach or the secure multi-party computation (SMC) approach. However, these two approaches have complementary features: the randomization approach is much more efficient but less accurate, while the SMC approach is less efficient but more accurate. We propose a novel hybrid approach, which takes advantage of the strength of both approaches to balance the accuracy and efficiency constraints. Compared to the two existing approaches, our proposed approach can achieve much better accuracy than randomization approach and much reduced computation cost than SMC approach. We also propose a multi-group scheme that makes it flexible for the data miner to control the balance between data mining accuracy and privacy. This scheme is motivated by the fact that existing randomization schemes that randomize data at individual attribute level can produce insufficient accuracy when the number of dimensions is high. We partition attributes into groups, and develop a scheme to conduct group-based randomization to achieve better data mining accuracy. To demonstrate the effectiveness of the proposed general schemes, we have implemented them for the ID3 decision tree algorithm and association rule mining problem and we also present experimental results.
引用
收藏
页码:133 / 157
页数:25
相关论文
共 50 条
  • [41] A hybrid approach for privacy-preserving RFID tags
    Ryu, Eun-Kyung
    Takagi, Tsuyoshi
    COMPUTER STANDARDS & INTERFACES, 2009, 31 (04) : 812 - 815
  • [42] A high collusion-resistant approach to distributed privacy-preserving data mining
    Urabe, Shintaro
    Wang, Jiahong
    Kodama, Eiichiro
    Takata, Toyoo
    PROCEEDINGS OF THE IASTED INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING AND NETWORKS, 2007, : 326 - +
  • [43] Efficient paillier cryptoprocessor for privacy-preserving data mining
    San, Ismail
    At, Nuray
    Yakut, Ibrahim
    Polat, Huseyin
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (11) : 1535 - 1546
  • [44] Comparative Analysis of Privacy-Preserving Data Mining Techniques
    Bhandari, Neetika
    Pahwa, Payal
    INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING AND COMMUNICATIONS, VOL 2, 2019, 56 : 535 - 541
  • [45] Recent Developments in Privacy-preserving Mining of Clinical Data
    Desmet, Chance
    Cook, Diane J.
    ACM/IMS Transactions on Data Science, 2021, 2 (04):
  • [46] Approximate Privacy-Preserving Data Mining on Vertically Partitioned Data
    Nix, Robert
    Kantarcioglu, Murat
    Han, Keesook J.
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXVI, 2012, 7371 : 129 - 144
  • [47] A New Scheme to Privacy-Preserving Collaborative Data Mining
    Zhu, Jianming
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 468 - 471
  • [48] Privacy-Preserving Data Mining: Methods, Metrics, and Applications
    Mendes, Ricardo
    Vilela, Joao P.
    IEEE ACCESS, 2017, 5 : 10562 - 10582
  • [49] DAG: A General Model for Privacy-Preserving Data Mining
    Teo, Sin G.
    Cao, Jianneng
    Lee, Vincent C. S.
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2020, 32 (01) : 40 - 53
  • [50] An effective distributed privacy-preserving data mining algorithm
    Fukasawa, T
    Wang, JH
    Takata, T
    Miyazaki, M
    INTELLIGENT DAA ENGINEERING AND AUTOMATED LEARNING IDEAL 2004, PROCEEDINGS, 2004, 3177 : 320 - 325