Protecting data privacy in growing neural gas

被引:0
|
作者
Tingting Chen
Ankur Bansal
Sheng Zhong
Xiaodong Chen
机构
[1] State University of New York at Buffalo,Department of Computer Science and Engineering
[2] Harbin Institute of Technology,Department of Electrical and Computer Engineering
来源
关键词
Growing neural gas; Privacy; Distributed data;
D O I
暂无
中图分类号
学科分类号
摘要
Growing neural gas is a well-known algorithm in evolutionary computing. It is very effective for training neural networks. However, if the training data for growing neural gas comes from two different parties, privacy concerns may become a hurdle for using this algorithm: Each party may not be willing to reveal her own data to the other, although she wants to collaborate with the other party in running the growing neural gas algorithm on their joint data. In this paper, we propose a privacy-preserving algorithm for growing neural gas with training data from two parties. Our algorithm allows two parties to jointly execute the growing neural gas algorithm without revealing any party’s data to the other. Our algorithm is secure in that it leaks no knowledge about any participant’s data to the other. Experiments on the real-world data show that our algorithm is very efficient.
引用
收藏
页码:1255 / 1262
页数:7
相关论文
共 50 条
  • [41] A deterministic approach for protecting privacy in sensitive personal data
    Avraam, Demetris
    Jones, Elinor
    Burton, Paul
    [J]. BMC MEDICAL INFORMATICS AND DECISION MAKING, 2022, 22 (01)
  • [42] Protecting farmers' data privacy and confidentiality: Recommendations and considerations
    Kaur, Jasmin
    Fard, Seyed Mehdi Hazrati
    Amiri-Zarandi, Mohammad
    Dara, Rozita
    [J]. FRONTIERS IN SUSTAINABLE FOOD SYSTEMS, 2022, 6
  • [43] Protecting the privacy and security of sensitive customer data in the cloud
    King, Nancy J.
    Raja, V. T.
    [J]. COMPUTER LAW & SECURITY REVIEW, 2012, 28 (03) : 308 - 319
  • [44] Who owns the data? Protecting privacy by sharing openly
    Campbell, J
    [J]. BEHAVIORAL HEALTHCARE TOMORROW, 1996, 5 (06): : 49 - 51
  • [45] Protecting Outsourced Data Privacy with Lifelong Policy Carrying
    Wang, Xiaoguang
    Yong, Qi
    Dai, Yuehua
    Ren, Jianbao
    Hang, Zhang
    [J]. 2013 IEEE 15TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS & 2013 IEEE INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (HPCC_EUC), 2013, : 896 - 905
  • [46] Privacy in multimedia communications: Protecting users, not just data
    Adams, A
    Sasse, MA
    [J]. PEOPLE AND COMPUTERS XV - INTERACTION WITHOUT FRONTIERS, 2001, : 49 - 64
  • [47] NATIONAL DATA BANK - SOME PROPOSALS FOR PROTECTING PRIVACY
    VANTASSE.D
    [J]. COMPUTERS AND AUTOMATION, 1970, 19 (04): : 9 - &
  • [48] Protecting Privacy of Sensitive Value Distributions in Data Release
    Bezzi, Michele
    di Vimercati, Sabrina De Capitani
    Livraga, Giovanni
    Samarati, Pierangela
    [J]. SECURITY AND TRUST MANAGEMENT, 2011, 6710 : 255 - +
  • [49] Protecting data privacy is key to a smart energy future
    Carissa Véliz
    Philipp Grunewald
    [J]. Nature Energy, 2018, 3 : 702 - 704
  • [50] A Module for Protecting Data Location Privacy on Mobile Devices
    Makki, Fatima
    El-Hajj, Wassim
    Safa, Haidar
    Alhakim, Abbas
    [J]. 2018 14TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2018, : 512 - 517