A hybrid multi-group privacy-preserving approach for building decision trees

被引:0
|
作者
Teng, Zhouxuan [1 ]
Du, Wenliang [1 ]
机构
[1] Syracuse Univ, Dept Elect Engn & Comp Sci, Syracuse, NY 13244 USA
来源
ADVANCES IN KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS | 2007年 / 4426卷
基金
美国国家科学基金会;
关键词
privacy; SMC; randomization;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, we study the privacy-preserving decision tree building problem on vertically partitioned data. We made two contributions. First, we propose a novel hybrid approach, which takes advantage of the strength of the two existing approaches, randomization and the secure multi-party computation (SMC), to balance the accuracy and efficiency constraints. Compared to these two existing approaches, our proposed approach can achieve much better accuracy than randomization approach and much reduced computation cost than SMC approach. We also propose a multi-group scheme that makes it flexible for data miners to control the balance between data mining accuracy and privacy. We partition attributes into groups, and develop a scheme to conduct group-based randomization to achieve better data mining accuracy. We have implemented and evaluated the proposed schemes for the ID3 decision tree algorithm.
引用
收藏
页码:296 / +
页数:3
相关论文
共 50 条
  • [31] Privacy-preserving surveillance: an interdisciplinary approach
    Birnstill, Pascal
    Bretthauer, Sebastian
    Greiner, Simon
    Krempel, Erik
    INTERNATIONAL DATA PRIVACY LAW, 2015, 5 (04) : 298 - 308
  • [32] Privacy-Preserving Contrastive Explanations with Local Foil Trees
    Veugen, Thijs
    Kamphorst, Bart
    Marcus, Michiel
    CYBER SECURITY, CRYPTOLOGY, AND MACHINE LEARNING, 2022, 13301 : 88 - 98
  • [33] Privacy-Preserving Contrastive Explanations with Local Foil Trees
    Veugen, Thijs
    Kamphorst, Bart
    Marcus, Michiel
    CRYPTOGRAPHY, 2022, 6 (04)
  • [34] Parallel Privacy-preserving Computation of Minimum Spanning Trees
    Anagreh, Mohammad
    Vainikko, Eero
    Laud, Peeter
    ICISSP: PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2021, : 181 - 190
  • [35] Multi-party privacy-preserving decision tree training with a privileged party
    Tong, Yiwen
    Feng, Qi
    Luo, Min
    He, Debiao
    SCIENCE CHINA-INFORMATION SCIENCES, 2024, 67 (08)
  • [36] Multi-party privacy-preserving decision tree training with a privileged party
    Yiwen TONG
    Qi FENG
    Min LUO
    Debiao HE
    ScienceChina(InformationSciences), 2024, 67 (08) : 253 - 268
  • [37] A privacy-preserving multi-keyword search approach in cloud computing
    Manasrah, Ahmed M.
    Abu Nasir, Mahmoud
    Salem, Maher
    SOFT COMPUTING, 2020, 24 (08) : 5609 - 5631
  • [38] A privacy-preserving multi-keyword search approach in cloud computing
    Ahmed M. Manasrah
    Mahmoud Abu Nasir
    Maher Salem
    Soft Computing, 2020, 24 : 5609 - 5631
  • [39] Privacy-preserving data utilization in hybrid clouds
    Li, Jingwei
    Li, Jin
    Chen, Xiaofeng
    Liu, Zheli
    Jia, Chunfu
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2014, 30 : 98 - 106
  • [40] Privacy-Preserving Proof of Storage in Large Group
    Ren, Yongjun
    Han, Jin
    Wang, Jin
    Fang, Liming
    49TH ANNUAL IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2015, : 269 - 272