Efficient privacy-preserving classification construction model with differential privacy technology

被引:17
作者
Zhang, Lin [1 ,2 ]
Liu, Yan [1 ]
Wang, Ruchuan [1 ,2 ]
Fu, Xiong [1 ,2 ]
Lin, Qiaomin [2 ]
机构
[1] Nanjing Univ Posts & Telecommun, Coll Comp, Nanjing 210003, Jiangsu, Peoples R China
[2] Jiangsu High Technol Res Key Lab Wireless Sensor, Nanjing 210003, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
differential privacy; data mining; privacy-preserving; decision tree; ALGORITHM;
D O I
10.21629/JSEE.2017.01.19
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To address the problem of privacy disclosure during data mining, a new privacy-preserving decision tree classification construction model based on a differential privacy-protection mechanism is presented. An efficient classifier that uses feedback to add two types of noise via Laplace and exponential mechanisms to perturb the calculation results are introduced to the construction algorithm that provides a secure data access interface for users. Different split solutions for attributes of continuous and discrete values are provided and used to optimize the search scheme to reduce the error rate of the classifier. By choosing an available quality function with lower sensitivity for making decisions and improving the privacy budget allocation methods, the algorithm effectively resists malicious attacks that depend on the background knowledge. The potential problem of obtaining personal information by guessing unknown sensitive nodes of tree-type data is solved correspondingly. The better privacy preservation and accuracy of this new algorithm are shown by simulation experiments.
引用
收藏
页码:170 / 178
页数:9
相关论文
共 25 条
[1]  
Baghel R, 2013, INT CONF CONTEMP, P124, DOI 10.1109/IC3.2013.6612175
[2]  
Blum A., 2005, PODS'05: Proceedings of the twenty-fourth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems, P128, DOI DOI 10.1145/1065167.1065184
[3]  
[丁丽萍 Ding Liping], 2014, [通信学报, Journal on Communications], V35, P200
[4]  
Dwork C., 2006, P 3 THEOR CRYPT C TC, P363
[5]   Differential privacy: A survey of results [J].
Dwork, Cynthia .
THEORY AND APPLICATIONS OF MODELS OF COMPUTATION, PROCEEDINGS, 2008, 4978 :1-19
[6]  
Dwork C, 2006, LECT NOTES COMPUT SC, V4052, P1
[7]  
Friedman A., 2010, P 16 ACM SIGKDD INT, P493
[8]  
Gu B., IEEE T NEURAL NETWOR, DOI [10.1109/TNNL.2016.2544779, DOI 10.1109/TNNL.2016.2544779]
[9]  
Itten I. H., 2011, DATA MINING PRACTICA
[10]  
Liu Xiang-Yu, 2014, Journal of Software, V25, P576