Privacy-preserving computation of Bayesian networks on vertically partitioned data

被引:1
作者
Yang, Zhiqiang [1 ]
Wright, Rebecca N. [1 ]
机构
[1] Stevens Inst Technol, Dept Comp Sci, Hoboken, NJ 07030 USA
关键词
data privacy; Bayesian networks; privacy-preserving data mining;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Traditionally, many data mining techniques have been designed in the centralized model in which all data is collected and available in one central site. However, as more and more activities are carried out using computers and computer networks, the amount of potentially sensitive data stored by business, governments, and other parties increases. Different parties often wish to benefit from cooperative use of their data, but privacy regulations and other privacy concerns may prevent the parties from sharing their data. Privacy-preserving data mining provides a solution by creating distributed data mining algorithms in which the underlying data need not be revealed. In this paper, we present privacy-preserving protocols for a particular data mining task: learning a Bayesian network from a database vertically partitioned among two parties. In this setting, two parties owning confidential databases wish to learn the Bayesian network on the combination of their databases without revealing anything else about their data to each other. We present an efficient and privacy-preserving protocol to construct a Bayesian network on the parties' joint data.
引用
收藏
页码:1253 / 1264
页数:12
相关论文
共 50 条
[1]   Privacy-preserving datamining on vertically partitioned databases [J].
Dwork, C ;
Nissim, K .
ADVANCES IN CRYPTOLOGY - CRYPTO 2004, PROCEEDINGS, 2004, 3152 :528-544
[2]   Incremental learning of privacy-preserving Bayesian networks [J].
Samet, Saeed ;
Miri, Ali ;
Granger, Eric .
APPLIED SOFT COMPUTING, 2013, 13 (08) :3657-3667
[3]   Scalable Privacy-Preserving Data Mining with Asynchronously Partitioned Datasets [J].
Kikuchi, Hiroaki ;
Kagawa, Daisuke ;
Basu, Anirban ;
Ishii, Kazuhiko ;
Terada, Masayuki ;
Hongo, Sadayuki .
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2013, E96A (01) :111-120
[4]   Efficient multi-party privacy preserving data mining for vertically partitioned data [J].
Sharma, Surbhi ;
Shukla, Deepak .
2016 INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT), VOL 2, 2016, :189-195
[5]   On private scalar product computation for privacy-preserving data mining [J].
Goethals, B ;
Laur, S ;
Lipmaa, H ;
Mielikäinen, T .
INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2004, 2004, 3506 :104-120
[6]   An Efficient Privacy-Preserving Outsourced Computation over Public Data [J].
Liu, Ximeng ;
Qin, Baodong ;
Deng, Robert H. ;
Li, Yingjiu .
IEEE TRANSACTIONS ON SERVICES COMPUTING, 2017, 10 (05) :756-770
[7]   Privacy Preserving Distributed Association Rule Mining Approach on Vertically Partitioned Healthcare Data [J].
Domadiya, Nikunj ;
Rao, Udai Pratap .
SECOND INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING IN DATA SCIENCES (ICDS2018), 2019, 148 :303-312
[8]   Privacy-Preserving Computation Offloading for Parallel Deep Neural Networks Training [J].
Mao, Yunlong ;
Hong, Wenbo ;
Wang, Heng ;
Li, Qun ;
Zhong, Sheng .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2021, 32 (07) :1777-1788
[9]   Cerberus: Privacy-Preserving Computation in Edge Computing [J].
Zhang, Dilu ;
Fan, Lei .
IEEE INFOCOM 2020 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2020, :43-49
[10]   Efficient privacy-preserving dot-product computation for mobile big data [J].
Hu, Chunqiang ;
Huo, Yan .
IET COMMUNICATIONS, 2017, 11 (05) :704-712