Privacy-Preserving Multiparty Collaborative Mining with Geometric Data Perturbation

被引:19
|
作者
Chen, Keke [1 ]
Liu, Ling [2 ]
机构
[1] Wright State Univ, Dept Comp Sci & Engn, Dayton, OH 45435 USA
[2] Georgia Tech, Coll Comp, Atlanta, GA 30332 USA
基金
美国国家科学基金会;
关键词
Privacy-preserving data mining; distributed computing; collaborative computing; geometric data perturbation;
D O I
10.1109/TPDS.2009.26
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In multiparty collaborative data mining, participants contribute their own data sets and hope to collaboratively mine a comprehensive model based on the pooled data set. How to efficiently mine a quality model without breaching each party's privacy is the major challenge. In this paper, we propose an approach based on geometric data perturbation and data mining service-oriented framework. The key problem of applying geometric data perturbation in multiparty collaborative mining is to securely unify multiple geometric perturbations that are preferred by different parties, respectively. We have developed three protocols for perturbation unification. Our approach has three unique features compared to the existing approaches: 1) with geometric data perturbation, these protocols can work for many existing popular data mining algorithms, while most of other approaches are only designed for a particular mining algorithm; 2) both the two major factors: data utility and privacy guarantee are well preserved, compared to other perturbation-based approaches; and 3) two of the three proposed protocols also have great scalability in terms of the number of participants, while many existing cryptographic approaches consider only two or a few more participants. We also study different features of the three protocols and show the advantages of different protocols in experiments.
引用
收藏
页码:1764 / 1776
页数:13
相关论文
共 50 条
  • [31] Privacy-preserving data-mining
    Grosskreutz H.
    Lemmen B.
    Rüping S.
    Informatik-Spektrum, 2010, 33 (04) : 380 - 383
  • [32] Privacy-preserving Data Mining in Industry
    Kenthapadi, Krishnaram
    Mironov, Ilya
    Thakurta, Abhradeep Guha
    PROCEEDINGS OF THE TWELFTH ACM INTERNATIONAL CONFERENCE ON WEB SEARCH AND DATA MINING (WSDM'19), 2019, : 840 - 841
  • [33] Privacy-preserving data mining systems
    Zhang, Nan
    Zhao, Wei
    COMPUTER, 2007, 40 (04) : 52 - +
  • [34] Data Perturbation Method Based on Contrast Mapping for Reversible Privacy-preserving Data Mining
    Kao, Yuan-Hung
    Lee, Wei-Bin
    Hsu, Tien-Yu
    Lin, Chen-Yi
    Tsai, Hui-Fang
    Chen, Tung-Shou
    JOURNAL OF MEDICAL AND BIOLOGICAL ENGINEERING, 2015, 35 (06) : 789 - 794
  • [35] Data Perturbation Method Based on Contrast Mapping for Reversible Privacy-preserving Data Mining
    Yuan-Hung Kao
    Wei-Bin Lee
    Tien-Yu Hsu
    Chen-Yi Lin
    Hui-Fang Tsai
    Tung-Shou Chen
    Journal of Medical and Biological Engineering, 2015, 35 : 789 - 794
  • [36] SVD-based advanced data perturbation method for privacy-preserving data mining
    Li, Feng
    Li, Sheng-Hong
    Li, Jian-Hua
    Shanghai Jiaotong Daxue Xuebao/Journal of Shanghai Jiaotong University, 2009, 43 (03): : 427 - 431
  • [37] Collaborative, Privacy-Preserving Data Aggregation at Scale
    Applebaum, Benny
    Ringberg, Haakon
    Freedman, Michael J.
    Caesar, Matthew
    Rexford, Jennifer
    PRIVACY ENHANCING TECHNOLOGIES, 2010, 6205 : 56 - +
  • [38] Privacy-preserving collaborative filtering using randomized perturbation techniques
    Polat, H
    Du, WL
    THIRD IEEE INTERNATIONAL CONFERENCE ON DATA MINING, PROCEEDINGS, 2003, : 625 - 628
  • [39] Privacy-preserving data mining in the malicious model
    Kantarcioglu, Murat
    Kardes, Onur
    International Journal of Information and Computer Security, 2008, 2 (04) : 353 - 375
  • [40] Research on Privacy-Preserving Technology of Data Mining
    Shen, Yanguang
    Han, Junrui
    HuiShao
    ICICTA: 2009 SECOND INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTATION TECHNOLOGY AND AUTOMATION, VOL II, PROCEEDINGS, 2009, : 612 - 614