Privacy-preserving computation of Bayesian networks on vertically partitioned data

被引:1
作者
Yang, Zhiqiang [1 ]
Wright, Rebecca N. [1 ]
机构
[1] Stevens Inst Technol, Dept Comp Sci, Hoboken, NJ 07030 USA
关键词
data privacy; Bayesian networks; privacy-preserving data mining;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Traditionally, many data mining techniques have been designed in the centralized model in which all data is collected and available in one central site. However, as more and more activities are carried out using computers and computer networks, the amount of potentially sensitive data stored by business, governments, and other parties increases. Different parties often wish to benefit from cooperative use of their data, but privacy regulations and other privacy concerns may prevent the parties from sharing their data. Privacy-preserving data mining provides a solution by creating distributed data mining algorithms in which the underlying data need not be revealed. In this paper, we present privacy-preserving protocols for a particular data mining task: learning a Bayesian network from a database vertically partitioned among two parties. In this setting, two parties owning confidential databases wish to learn the Bayesian network on the combination of their databases without revealing anything else about their data to each other. We present an efficient and privacy-preserving protocol to construct a Bayesian network on the parties' joint data.
引用
收藏
页码:1253 / 1264
页数:12
相关论文
共 50 条
[41]   Privacy Passport: Privacy-Preserving Cross-Domain Data Sharing [J].
Chen, Xue ;
Wang, Cheng ;
Yang, Qing ;
Teng, Hu ;
Jiang, Changjun .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2025, 20 :636-650
[42]   Enabling privacy-preserving non-interactive computation for Hamming distance [J].
Gao, Wenjing ;
Liang, Wei ;
Hao, Rong ;
Yu, Jia .
INFORMATION SCIENCES, 2024, 670
[43]   A novel privacy-preserving outsourcing computation scheme for Canny edge detection [J].
Li, Bowen ;
He, Fazhi ;
Zeng, Xiantao .
VISUAL COMPUTER, 2022, 38 (12) :4437-4455
[44]   Privacy-Preserving Deep Learning Based on Multiparty Secure Computation: A Survey [J].
Zhang, Qiao ;
Xin, Chunsheng ;
Wu, Hongyi .
IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (13) :10412-10429
[45]   A novel privacy-preserving outsourcing computation scheme for Canny edge detection [J].
Bowen Li ;
Fazhi He ;
Xiantao Zeng .
The Visual Computer, 2022, 38 :4437-4455
[46]   PriveTAB : Secure and Privacy-Preserving sharing of Tabular Data [J].
Kotal, Anantaa ;
Piplai, Aritran ;
Chukkapalli, Sai Sree Laya ;
Joshi, Anupam .
PROCEEDINGS OF THE 2022 ACM INTERNATIONAL WORKSHOP ON SECURITY AND PRIVACY ANALYTICS (IWSPA '22), 2022, :35-45
[47]   A New Scheme to Privacy-Preserving Collaborative Data Mining [J].
Zhu, Jianming .
FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, :468-471
[48]   Privacy-Preserving Data Mining: Methods, Metrics, and Applications [J].
Mendes, Ricardo ;
Vilela, Joao P. .
IEEE ACCESS, 2017, 5 :10562-10582
[49]   A privacy-preserving data collection model for digital community [J].
Li HongTao ;
Ma JianFeng ;
Fu Shuai .
SCIENCE CHINA-INFORMATION SCIENCES, 2015, 58 (03) :1-16
[50]   A Possible Solution For Privacy-Preserving Cloud Data Storage [J].
Paul, Mithun ;
Collberg, Christian ;
Bambauer, Derek .
2015 IEEE INTERNATIONAL CONFERENCE ON CLOUD ENGINEERING (IC2E 2015), 2015, :397-403