skip to main content
10.1145/1081870.1081913acmconferencesArticle/Chapter ViewAbstractPublication PageskddConference Proceedingsconference-collections
Article

A new scheme on privacy-preserving data classification

Published:21 August 2005Publication History

ABSTRACT

We address privacy-preserving classification problem in a distributed system. Randomization has been the approach proposed to preserve privacy in such scenario. However, this approach is now proven to be insecure as it has been discovered that some privacy intrusion techniques can be used to reconstruct private information from the randomized data tuples. We introduce an algebraic-technique-based scheme. Compared to the randomization approach, our new scheme can build classifiers more accurately but disclose less private information. Furthermore, our new scheme can be readily integrated as a middleware with existing systems.

References

  1. D. Agrawal and C. C. Aggarwal. On the design and quantification of privacy preserving data mining algorithms. In Proceedings of the 20th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, pages 247--255. ACM Press, 2001.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. R. Agrawal and R. Srikant. Privacy-preserving data mining. In Proceedings of the 19th ACM SIGMOD International Conference on Management of Data, pages 439--450. ACM Press, 2000.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. S. Agrawal, V. Krishnan, and J. R. Haritsa. On addressing efficiency concerns in privacy-preserving mining. In Proceedings of the 9th International Conference on Database Systems for Advanced Applications, pages 439--450. Springer Verlag, 2004.]]Google ScholarGoogle ScholarCross RefCross Ref
  4. C. Blake and C. Merz. UCI repository of machine learning databases, 1998.]]Google ScholarGoogle Scholar
  5. T. M. Cover and J. A. Thomas. Elements of information theory. Wiley-Interscience, 1991.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. L. Cranor, J. Reagle, and M. S. Ackerman. Beyond concern: Understanding net users' attitudes about online privacy. Technical Report TR 99.4.3, AT&T Labs-Research, 1999.]]Google ScholarGoogle Scholar
  7. W. Du and Z. Zhan. Building decision tree classifier on private data. In Proceedings of the IEEE International Conference on Privacy, Security and Data Mining, pages 1--8. Australian Computer Society, Inc., 2002.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. W. Du and Z. Zhan. Using randomized response techniques for privacy-preserving data mining. In Proceedings of the 9th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pages 505--510. ACM Press, 2003.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. G. H. Golub and C. F. V. Loan. Matrix Computation. John Hopkins University Press, 1996.]]Google ScholarGoogle Scholar
  10. J. Han and M. Kamber. Data Mining Concepts and Techniques. Morgan Kaufmann, 2001.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. HIPAA. Health insurance portability and accountability act, 2002. available at http://www.hhs.gov/ocr/hipaa/privrulepd.pdf.]]Google ScholarGoogle Scholar
  12. M. Kantarcioglu and J. Vaidya. Privacy preserving naïve bayes classifier for horizontally partitioned data. In Workshop on Privacy Preserving Data Mining held in association with The 3rd IEEE International Conference on Data Mining, 2003.]]Google ScholarGoogle Scholar
  13. H. Kargupta, S. Datta, Q. Wang, and K. Sivakumar. On the privacy preserving properties of random data perturbation techniques. In Proceedings of the 3rd IEEE International Conference on Data Mining, pages 99--106. IEEE Press, 2003.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Y. Lindell and B. Pinkas. Privacy preserving data mining. In Proceedings of the 20th Annual International Cryptology Conference on Advances in Cryptology, pages 36--54. Springer Verlag, 2000.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. J. R. Quinlan. Induction of decision trees. Machine Learning, 1(1):81--106, 1986.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. J. Vaidya and C. Clifton. Privacy preserving naïve bayes classifier for vertically partitioned data. In Proceedings of the 4th SIAM Conference on Data Mining, pages 330--334. SIAM Press, 2004.]]Google ScholarGoogle ScholarCross RefCross Ref
  17. N. Zhang, S. Wang, and W. Zhao. A new scheme on privacy preserving association rule mining. In Proceedings of the 7th European Conference on Principles and Practice of Knowledge Discovery in Databases. Springer Verlag, 2004.]] Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. A new scheme on privacy-preserving data classification

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          KDD '05: Proceedings of the eleventh ACM SIGKDD international conference on Knowledge discovery in data mining
          August 2005
          844 pages
          ISBN:159593135X
          DOI:10.1145/1081870

          Copyright © 2005 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 21 August 2005

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • Article

          Acceptance Rates

          Overall Acceptance Rate1,133of8,635submissions,13%

          Upcoming Conference

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader