skip to main content
10.1145/1281192.1281275acmconferencesArticle/Chapter ViewAbstractPublication PageskddConference Proceedingsconference-collections
Article

Privacy-preservation for gradient descent methods

Published:12 August 2007Publication History

ABSTRACT

Gradient descent is a widely used paradigm for solving many optimization problems. Stochastic gradient descent performs a series of iterations to minimize a target function in order to reach a local minimum. In machine learning or data mining, this function corresponds to a decision model that is to be discovered. The gradient descent paradigm underlies many commonly used techniques in data mining and machine learning, such as neural networks, Bayesian networks, genetic algorithms, and simulated annealing. To the best of our knowledge, there has not been any work that extends the notion of privacy preservation or secure multi-party computation to gradient-descent-based techniques. In this paper, we propose a preliminary approach to enable privacy preservation in gradient descent methods in general and demonstrate its feasibility in specific gradient descent methods.

Skip Supplemental Material Section

Supplemental Material

p775-wan-200.mov

mov

36.5 MB

p775-wan-768.mov

mov

124.1 MB

References

  1. W. Du and M. Atallah. Privacy-Preserving Cooperative Statistical Analysis. Proceedings of the 17th Annual Computer Security Applications Conference, pp. 103--110, Louisiana, USA, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. W. Du, Y. S. Han, and S. Chen. Privacy-preserving Multivariate Statistical Analysis: Linear Regression and Classification. Proceedings of the SIAM International Conference on Data Mining, Florida, USA, 2004.Google ScholarGoogle ScholarCross RefCross Ref
  3. W. Du and Z. Zhan. Building Decision Tree Classfier on Private Data. Workshop on Privacy, Security, and Data Mining, held in conjunction with the IEEE International Conference on Data Mining, pp. 1--8, Maebashi City, Japan, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. B. Goethals, S. Laur, H. Lipmaa, and T. Mielik. On Private Scalar Product Computation for Privacy-Preserving Data Mining. Proceedings of the 7th Annual International Conference on Information Security and Cryptology, pp. 104--120, Seoul, Korea, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. O. Goldreich. The Foundations of Cryptography. Cambridge University Press, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. M. Kantarcioglu and C. Clifton. Privacy-Preserving Distributed Mining of Association Rules on Horizontally Partitioned Data. ACM SIGMOD Workshop on Research Issues on Data Mining and Knowledge Discovery, pp. 24--31, 2002.Google ScholarGoogle Scholar
  7. T. Mitchell. Machine Learning. McGraw-Hill, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. S. Russell, J. Binder, D. Koller, and K. Kanazawa. Local Learning in Probabilistic Networks with Hidden Variables. Proceedings of the 14th International Joint Conference on Artificial Intelligence, Montreal, Canada, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. J. Vaidya and C. Clifton. Privacy Preserving Association Rule Mining in Vertically Partitioned Data. Proceedings of the 8th ACM International Conference on Knowledge Discovery and Data Mining, pp. 639--644, Edmonton, Canada, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. J. Vaidya and C. Clifton. Privacy Preserving K-means Clustering over Vertically Partitioned Data. Proceedings of the 9th ACM International Conference on Knowledge Discovery and Data Mining, pp. 206--215, Washington D. C., USA, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. J. Vaidya and C. Clifton. Privacy Preserving Naive Bayes Classifier for Vertically Partitioned Data. Proceedings of the SIAM International Conference on Data Mining, Florida, USA, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. J. Vaidya and C. Clifton. Privacy-Preserving Decision Trees over Vertically Partitioned Data. Proceedings of the 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, USA, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. A. Yao. How to Generate and Exchange Secrtes. Proceedings of the 27th IEEE Symposium on Foundations of Computer Science, pp. 162--167, 1986.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. H. Yu, X. Jiang, and J. Vaidya. Privacy-Preserving SVM using Nonlinear Kernels on Horizontally Partitioned Data. Proceedings of the 21st Annual ACM Symposium on Applied Computing, Dijon, France, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. H. Yu, X. Jiang, and J. Vaidya. Privacy Preserving SVM Classification on Vertically Partitioned Data. Proceedings of the 10th Pacific-Asia Conference on Knowledge Discovery and Data Mining, Singapore, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Privacy-preservation for gradient descent methods

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          KDD '07: Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining
          August 2007
          1080 pages
          ISBN:9781595936097
          DOI:10.1145/1281192

          Copyright © 2007 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 12 August 2007

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • Article

          Acceptance Rates

          KDD '07 Paper Acceptance Rate111of573submissions,19%Overall Acceptance Rate1,133of8,635submissions,13%

          Upcoming Conference

          KDD '24

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader