Privacy-preserving computation of Bayesian networks on vertically partitioned data

被引:1
作者
Yang, Zhiqiang [1 ]
Wright, Rebecca N. [1 ]
机构
[1] Stevens Inst Technol, Dept Comp Sci, Hoboken, NJ 07030 USA
关键词
data privacy; Bayesian networks; privacy-preserving data mining;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Traditionally, many data mining techniques have been designed in the centralized model in which all data is collected and available in one central site. However, as more and more activities are carried out using computers and computer networks, the amount of potentially sensitive data stored by business, governments, and other parties increases. Different parties often wish to benefit from cooperative use of their data, but privacy regulations and other privacy concerns may prevent the parties from sharing their data. Privacy-preserving data mining provides a solution by creating distributed data mining algorithms in which the underlying data need not be revealed. In this paper, we present privacy-preserving protocols for a particular data mining task: learning a Bayesian network from a database vertically partitioned among two parties. In this setting, two parties owning confidential databases wish to learn the Bayesian network on the combination of their databases without revealing anything else about their data to each other. We present an efficient and privacy-preserving protocol to construct a Bayesian network on the parties' joint data.
引用
收藏
页码:1253 / 1264
页数:12
相关论文
共 50 条
[21]   Data Protection: Privacy-Preserving Data Collection With Validation [J].
Hou, Jiahui ;
Liu, Dongxiao ;
Huang, Cheng ;
Zhuang, Weihua ;
Shen, Xuemin ;
Sun, Rob ;
Ying, Bidi .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (04) :3422-3438
[22]   Privacy-preserving ridge regression on distributed data [J].
Chen, Yi-Ruei ;
Rezapour, Amir ;
Tzeng, Wen-Guey .
INFORMATION SCIENCES, 2018, 451 :34-49
[23]   Privacy-preserving data mining in the malicious model [J].
Kantarcioglu, Murat ;
Kardes, Onur .
International Journal of Information and Computer Security, 2008, 2 (04) :353-375
[24]   Privacy-preserving data splitting: a combinatorial approach [J].
Farras, Oriol ;
Ribes-Gonzalez, Jordi ;
Ricci, Sara .
DESIGNS CODES AND CRYPTOGRAPHY, 2021, 89 (07) :1735-1756
[25]   Privacy-Preserving Outsourced Inner Product Computation on Encrypted Database [J].
Yang, Haining ;
Su, Ye ;
Qin, Jing ;
Wang, Huaxiong .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (02) :1320-1337
[26]   Outsourced privacy-preserving C4.5 decision tree algorithm over horizontally and vertically partitioned dataset among multiple parties [J].
Li, Ye ;
Jiang, Zoe L. ;
Yao, Lin ;
Wang, Xuan ;
Yiu, S. M. ;
Huang, Zhengan .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 1) :1581-1593
[27]   Privacy-preserving data splitting: a combinatorial approach [J].
Oriol Farràs ;
Jordi Ribes-González ;
Sara Ricci .
Designs, Codes and Cryptography, 2021, 89 :1735-1756
[28]   Privacy-preserving data mining: Developments and directions [J].
Thuraisingham, B .
JOURNAL OF DATABASE MANAGEMENT, 2005, 16 (01) :75-87
[29]   Outsourced privacy-preserving C4.5 decision tree algorithm over horizontally and vertically partitioned dataset among multiple parties [J].
Ye Li ;
Zoe L. Jiang ;
Lin Yao ;
Xuan Wang ;
S. M. Yiu ;
Zhengan Huang .
Cluster Computing, 2019, 22 :1581-1593
[30]   Learning privacy-preserving Bayesian network based on genetic algorithms [J].
Lv Yali ;
Shi Hongbo .
ISTM/2007: 7TH INTERNATIONAL SYMPOSIUM ON TEST AND MEASUREMENT, VOLS 1-7, CONFERENCE PROCEEDINGS, 2007, :2597-2600