Privacy-preserving computation of Bayesian networks on vertically partitioned data

被引:1
作者
Yang, Zhiqiang [1 ]
Wright, Rebecca N. [1 ]
机构
[1] Stevens Inst Technol, Dept Comp Sci, Hoboken, NJ 07030 USA
关键词
data privacy; Bayesian networks; privacy-preserving data mining;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Traditionally, many data mining techniques have been designed in the centralized model in which all data is collected and available in one central site. However, as more and more activities are carried out using computers and computer networks, the amount of potentially sensitive data stored by business, governments, and other parties increases. Different parties often wish to benefit from cooperative use of their data, but privacy regulations and other privacy concerns may prevent the parties from sharing their data. Privacy-preserving data mining provides a solution by creating distributed data mining algorithms in which the underlying data need not be revealed. In this paper, we present privacy-preserving protocols for a particular data mining task: learning a Bayesian network from a database vertically partitioned among two parties. In this setting, two parties owning confidential databases wish to learn the Bayesian network on the combination of their databases without revealing anything else about their data to each other. We present an efficient and privacy-preserving protocol to construct a Bayesian network on the parties' joint data.
引用
收藏
页码:1253 / 1264
页数:12
相关论文
共 50 条
[11]   Privacy preserving data publishing via weighted Bayesian networks [J].
Wang L. ;
Wang W. ;
Meng D. .
Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2016, 53 (10) :2343-2353
[12]   Privacy-Preserving Characterization and Data Publishing [J].
Ren, Jian ;
Li, Tongtong .
2024 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS, ICNC, 2024, :549-553
[13]   Privacy-Preserving and Verifiable Data Aggregation [J].
Tran, Hieu N. ;
Deng, Robert H. ;
Pang, HweeHwa .
PROCEEDINGS OF THE SINGAPORE CYBER-SECURITY CONFERENCE (SG-CRC) 2016: CYBER-SECURITY BY DESIGN, 2016, 14 :115-122
[14]   Privacy-Preserving Publishing of Hierarchical Data [J].
Ozalp, Ismet ;
Gursoy, Mehmet Emre ;
Nergiz, Mehmet Ercan ;
Saygin, Yucel .
ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2016, 19 (03)
[15]   Location Privacy-Preserving Distance Computation for Spatial Crowdsourcing [J].
Han, Song ;
Lin, Jianhong ;
Zhao, Shuai ;
Xu, Guangquan ;
Ren, Siqi ;
He, Daojing ;
Wang, Licheng ;
Shi, Leyun .
IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (08) :7550-7563
[16]   Lightweight privacy-Preserving data classification [J].
Ngoc Hong Tran ;
Le-Khac, Nhien-An ;
Kechadi, M-Tahar .
COMPUTERS & SECURITY, 2020, 97
[17]   Interval Privacy: A Framework for Privacy-Preserving Data Collection [J].
Ding, Jie ;
Ding, Bangjun .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2022, 70 :2443-2459
[18]   Privacy-Preserving-Outsourced Association Rule Mining on Vertically Partitioned Databases [J].
Li, Lichun ;
Lu, Rongxing ;
Choo, Kim-Kwang Raymond ;
Datta, Anwitaman ;
Shao, Jun .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (08) :1847-1861
[19]   Privacy-preserving association rule mining for horizontally partitioned healthcare data: a case study on the heart diseases [J].
Domadiya, Nikunj ;
Rao, Udai Pratap .
SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES, 2018, 43 (08)
[20]   Privacy-preserving association rule mining for horizontally partitioned healthcare data: a case study on the heart diseases [J].
Nikunj Domadiya ;
Udai Pratap Rao .
Sādhanā, 2018, 43