Privacy-preserving Naive Bayes classification

被引:114
作者
Vaidya, Jaideep [1 ]
Kantarcioglu, Murat [2 ]
Clifton, Chris [3 ]
机构
[1] Rutgers State Univ, Newark, NJ 07102 USA
[2] Univ Texas Dallas, Dallas, TX 75230 USA
[3] Purdue Univ, W Lafayette, IN 47907 USA
基金
美国国家科学基金会;
关键词
data mining; privacy; security; Naive Bayes; distributed computing;
D O I
10.1007/s00778-006-0041-y
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Privacy-preserving data mining-developing models without seeing the data - is receiving growing attention. This paper assumes a privacy-preserving distributed data mining scenario: data sources collaborate to develop a global model, but must not disclose their data to others. The problem of secure distributed classification is an important one. In many situations, data is split between multiple organizations. These organizations may want to utilize all of the data to create more accurate predictive models while revealing neither their training data/databases nor the instances to be classified. Naive Bayes is often used as a baseline classifier, consistently providing reasonable classification performance. This paper brings privacy-preservation to that baseline, presenting protocols to develop a Naive Bayes classifier on both vertically as well as horizontally partitioned data.
引用
收藏
页码:879 / 898
页数:20
相关论文
共 41 条
[1]  
Agrawal D., 2001, Proceedings of the 20th ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, P247, DOI DOI 10.1145/375551.375602
[2]  
[Anonymous], 2002, Proceedings of The Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, DOI DOI 10.1145/775047.775080
[3]  
[Anonymous], 2002, FED REG 0814
[4]  
[Anonymous], 2000, Privacy-preserving data mining, DOI DOI 10.1145/342009.335438
[5]  
[Anonymous], ACM C COMPUTER COMMU, DOI [DOI 10.1145/288090.288106, DOI 10.1145/2046707.2046742]
[6]  
[Anonymous], 1997, Machine Learning
[7]  
BENALOH JC, 1987, LECT NOTES COMPUT SC, V263, P251
[8]  
BLUM M, 1984, ADV CRYPTOLOGY CRYPT
[9]  
CHANG YC, 2001, LECT NOTES COMPUTER, V2248
[10]   A COMMUNICATION-PRIVACY TRADEOFF FOR MODULAR ADDITION [J].
CHOR, B ;
KUSHILEVITZ, E .
INFORMATION PROCESSING LETTERS, 1993, 45 (04) :205-210