|
|
Decision-Tree Model Research Based on Privacy-Preserving |
FANG Wei-Wei1,2,YANG Bing-Ru2,YANG Jun2,ZHOU Chang-Sheng1 |
1.Computer Center,Beijing Information Science and Technology University,Beijing 100192
2.Information Engineering School,University of Science and Technology Beijing,Beijing 100083 |
|
|
Abstract How to realize privacy-preserving data mining becomes a research hotspot in a distributed environment. A model is proposed to realize privacy-preserving decision-tree classifying when data are vertically partitioned. In this model, a privacy-preserving decision-tree is proposed, which is composed of Global-Table stored by an obvious semi-honest partner and several local decision-trees stored by different sites. By using indexed array and private data comparison protocol, decision-tree generation and classification can be realized without uncovering the original information. Theoretical analysis and experimental results demonstrate the proposed model provides good capabilities of privacies preserving, accuracy and efficiency.
|
Received: 27 July 2009
|
|
|
|
|
[1] Han Jiawei. Data Mining: Definition and Technology. Beijing, China: Mechanism Industry Publish, 2001 (in Chinese) (韩家炜.数据挖掘:概念与技术.北京:机械工业出版社, 2001) [2] Rizvi S J, Haritsa J R. Maintaining Data Privacy in Association Rule Mining // Proc of the 28th International Conference on Very Large Databases. Hongkong, China, 2002: 682-693 [3] Agrawal R, Srikant R. Privacy-Preserving Data Mining. ACM SIGMOD Record, 2000, 29(2): 439-450 [4] Vaidya J, Clifton C. Privacy-Preserving K-Means Clustering over Vertically Partitioned Data // Proc of the 9th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. Washington, USA, 2003: 206-215 [5] Li Feng,Li Shenghong, Li Jianhua. An SVD-Based Advanced Data Perturbation Method for Privacy-Preserving Data Mining. Journal of Shanghai Jiaotong University, 2009, 43(3): 427-431 (in Chinese) (李 锋,李生红,李建华.一种基于特征值分解的数据挖掘隐私保护扰乱增强方法.上海交通大学学报, 2009, 43(3): 427-431) [6] Zhang Guorong, Yin Jian. Privacy Data Preserving Method Based on Discrete Cosine Transform Matrix. Computer Engineering, 2009, 35(2): 157-162 (in Chinese) (张国荣,印 鉴.基于离散余弦变换矩阵的隐私数据保护方法.计算机工程, 2009, 35(2): 157-162) [7] Chaudhuri K, Mishra N. When Random Sampling Preserves Privacy // Proc of the 26th Annual International Cryptology Conference. Santa Barbara, USA, 2006: 198-213 [8] Pinkas B. Cryptographic Techniques for Privacy-Preserving Data Mining. ACM SIGKDD Explorations Newsletter, 2002, 4(2): 12-19 [9] Cliffton C, Kantarcioglu M, Vaidya J, et al. Tools for Privacy Preserving Distributed Data Mining. ACM SIGKDD Explorations Newsletter, 2004, 4(2): 28-34 [10] Zhan J. Using Cryptography for Privacy Protection in Data Mining Systems // Proc of the 1st WICI International Workshop on Web Intelligence Meets Brain Informatics. Beijing, China, 2007: 494-513 [11] Kantarcioglous M, Clifton C. Privacy Preserving Distributed Mining of Association Rules on Horizontally Partitioned Data. IEEE Trans on Knowledge and Data Engineering, 2004, 16(9): 1026-1037 [12] Vaidya J, Clifton C. Privacy, Preserving Association Rule Mining in Vertically Partitioned Data // Proc of the 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. Edmonton, Canada, 2002: 639-644 [13] Zhang Peng, Tan Shiwei. Privacy Preserving Nave Bayes Classification. Chinese Journal of Computers, 2007, 30(8): 1267-1272 (in Chinese) (张 鹏,唐世谓.朴素贝叶斯分类中的隐私保护方法研究.计算机学报, 2007, 30(8): 1267-1272) [14] Emekci F, Sahin O D, Agrawal D, et al. Privacy Preserving Decision Tree Learning over Multiple Parties. Data Knowledge Engineering, 2007, 63(2): 348-361 [15] Agrawal D, Aggarwal C. On The Design and Quantification of Privacy Preserving Data Mining Algorithms // Proc of the 20th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems. Santa Barbara, USA, 2001: 247-255 [16] Yao A C. Protocols for Secure Computations // Proc of the 23rd Annual IEEE Symposium on Foundations of Computer Science. Chicago, USA, 1982: 160-164 [17] Cachin C. Efficient Private Bidding and Auctions with an Oblivious Third Party // Proc of the 6th ACM Conference on Computer and Communication Security. Singapore, Singapore, 1999: 120-127 [18] Qin Jing, Zhang Zhenfeng, Feng Dengguo, et al. A Protocol of Specific Secure Two-Party Computation. Journal of China Institute of Communications, 2004, 25(1): 35-42 (in Chinese) (秦 静,张振峰,冯登国,等.一个特殊的安全双方计算协议.通信学报, 2004, 25(1): 35-42) |
|
|
|