Privacy-Preserving Multiparty Collaborative Mining with Geometric Data Perturbation

被引:19
|
作者
Chen, Keke [1 ]
Liu, Ling [2 ]
机构
[1] Wright State Univ, Dept Comp Sci & Engn, Dayton, OH 45435 USA
[2] Georgia Tech, Coll Comp, Atlanta, GA 30332 USA
基金
美国国家科学基金会;
关键词
Privacy-preserving data mining; distributed computing; collaborative computing; geometric data perturbation;
D O I
10.1109/TPDS.2009.26
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In multiparty collaborative data mining, participants contribute their own data sets and hope to collaboratively mine a comprehensive model based on the pooled data set. How to efficiently mine a quality model without breaching each party's privacy is the major challenge. In this paper, we propose an approach based on geometric data perturbation and data mining service-oriented framework. The key problem of applying geometric data perturbation in multiparty collaborative mining is to securely unify multiple geometric perturbations that are preferred by different parties, respectively. We have developed three protocols for perturbation unification. Our approach has three unique features compared to the existing approaches: 1) with geometric data perturbation, these protocols can work for many existing popular data mining algorithms, while most of other approaches are only designed for a particular mining algorithm; 2) both the two major factors: data utility and privacy guarantee are well preserved, compared to other perturbation-based approaches; and 3) two of the three proposed protocols also have great scalability in terms of the number of participants, while many existing cryptographic approaches consider only two or a few more participants. We also study different features of the three protocols and show the advantages of different protocols in experiments.
引用
收藏
页码:1764 / 1776
页数:13
相关论文
共 50 条
  • [21] A tree-based data perturbation approach for privacy-preserving data mining
    Li, Xiao-Bai
    Sarkar, Sumit
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2006, 18 (09) : 1278 - 1283
  • [22] A tree-based data perturbation approach for privacy-preserving data mining
    IEEE Computer Society
    不详
    不详
    IEEE Trans Knowl Data Eng, 2006, 9 (1278-1283):
  • [23] Privacy-preserving collaborative association rule mining
    Zhan, J
    Matwin, S
    Japkowicz, N
    Chang, LW
    SHAPING BUSINESS STRATEGY IN A NETWORKED WORLD, VOLS 1 AND 2, PROCEEDINGS, 2004, : 1172 - 1178
  • [24] Privacy-preserving collaborative association rule mining
    Zhan, J
    Matwin, S
    Chang, LW
    DATA AND APPLICATIONS SECURITY XIX, PROCEEDINGS, 2005, 3654 : 153 - 165
  • [25] Privacy-preserving collaborative association rule mining
    Zhan, Justin
    Matwin, Stan
    Chang, LiWu
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2007, 30 (03) : 1216 - 1227
  • [26] A crypto-based approach to privacy-preserving collaborative data mining
    Zhan, Justin
    Matwin, Stan
    ICDM 2006: SIXTH IEEE INTERNATIONAL CONFERENCE ON DATA MINING, WORKSHOPS, 2006, : 546 - 550
  • [27] A Review on Privacy-Preserving Data Mining
    Li, Xueyun
    Yan, Zheng
    Zhang, Peng
    2014 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY (CIT), 2014, : 769 - 774
  • [28] Privacy-Preserving Outsourcing of Data Mining
    Monreale, Anna
    Wang, Wendy Hui
    PROCEEDINGS 2016 IEEE 40TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSAC), VOL 2, 2016, : 583 - 588
  • [29] Study of privacy-preserving data mining
    Dai, Guangming
    Zhou, Xingeng
    Wang, Maocai
    2007 International Symposium on Computer Science & Technology, Proceedings, 2007, : 412 - 414
  • [30] Privacy-preserving Data Mining in Industry
    Kenthapadi, Krishnaram
    Mironov, Ilya
    Thakurta, Abhradeep Guha
    COMPANION OF THE WORLD WIDE WEB CONFERENCE (WWW 2019 ), 2019, : 1308 - 1310