Research on Privacy Preserving Classification Algorithm

Article Preview

Abstract:

In the process of data mining, how to operate the data mining as well as protect the private data is a problem must be solved. This paper proposed an improvement of decision tree classification algorithm. Homomorphism encryption system, digital envelopes technology and secret sorting are applied to protect the data privacy. Our contribution is a privacy preserving protocol consist of homomorphism encryption system and secret sorting. Analysis shows that this algorithm can get right results as well as protect the privacy of the private data.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1863-1867

Citation:

Online since:

January 2015

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2015 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Rakesh Agrawal and Rama Krishnan Srikant, Privacy-Preserving Data Mining, Dallas, TX, USA, 2009, pp.439-450.

Google Scholar

[2] Yehuda Lindell and Benny Pinkas, Privacy-Preserving Data Mining, Santa Barbara, CA, USA, 2010, pp.36-54.

Google Scholar

[3] Somesh Jha, Louis Kruger, and Patrick Me Daniel, Privacy Presevring Clustering, Milan, Italy, 2010, pp.397-417.

Google Scholar

[4] Jaideep Vaidya and Chris Clifton, Privacy-Preserving k-means Clustering over Vertically Partitioned Data, Washington DC, USA, 2012, pp.206-215.

DOI: 10.1145/956750.956776

Google Scholar

[5] C. Clifton, M. Kantarcioglu, and J. Vaidya, Defining Privacy For Data Mining, Baltimore, MD, USA, 2009, pp.126-133.

Google Scholar

[6] Murat Kantarcioglu and Chris Clifton, Privacy Preserving Distributed Mining of Association Rules on Horizontal Partitioned Data, 16 (2009) 1026-1037.

DOI: 10.1109/tkde.2004.45

Google Scholar

[7] Saeed Samet and Ali Miri, Privacy Preserving Protocols for Perception Learning Algorithm in Neural Networks, Varna, Bulgaria, 2008, pp.1065-1070.

Google Scholar

[8] Zhiqiang Yang and Rebacca N. Wright, Privacy-Preserving Computation of Bayesian Networks on Vertically Partitioned Data, 18 (2010) 1253-1264.

DOI: 10.1109/tkde.2006.147

Google Scholar

[9] R. Rivest, L. Adleman, and M. Dertouzos, On data banks and privacy homomorphisms, R.A. DeMillo (Eds. ), In Foundations of Secure Computation, Academic Press, 1988, pp.169-179.

Google Scholar

[10] P. Paillier, Public-key cryptosystems based on composite degree residuosity classes, Prague, Czech Republic, 1999, pp.223-238.

DOI: 10.1007/3-540-48910-x_16

Google Scholar

[11] J. Zhan, Privacy Preserving Collaborative Data Mining. PhD thesis, Depatrment of Computer Science, University of Ottawa, (2009).

Google Scholar

[12] J. Vaidya, H. Yu and X. Jiang, Privacy-preserving svm classification, Knowl. Inf. Syst., 14 (2008) 161-178.

DOI: 10.1007/s10115-007-0073-7

Google Scholar

[13] T. Chen and S. Zhong, Privacy-preserving backpropagation neural network learning, Trans. Neur. Netw., 20 (2009) 1554–1564.

DOI: 10.1109/tnn.2009.2026902

Google Scholar

[14] W. Du and Z. Zhan, Building decision tree classifier on private data, In IEEE Intertional Workshop on Privacy, Security, and Data Mining, Maebashi City, Japan, (2009).

Google Scholar

[15] Madhushri Banerjee, Zhiyuan Chen, Aryya Gangopadhyay, A generic and distributed privacy preserving classification method with a worst-privacy guarantee, America, 2013, pp.5-35.

DOI: 10.1007/s10619-013-7126-6

Google Scholar