A Game Theoretic Perspective Toward Practical Privacy Preserving Data Mining
نویسندگان
چکیده
Analysis of privacy-sensitive data in a multi-party environment often assumes that the parties are well-behaved and they abide by the protocols. Parties compute whatever is needed, communicate correctly following the rules, and do not collude with other parties for exposing third party sensitive data. This paper argues that most of these assumptions fall apart in real-life applications of privacypreserving distributed data mining (PPDM). It offers a more realistic formulation of the PPDM problem as a multi-party game where each party tries to maximize its own objectives. The paper uses this game-theoretic framework for doing equilibrium-analyses of existing PPDM algorithms. It then modifies these algorithms using the concept of mechanism design and shows how introduction of penalty forces dishonest rational participants to follow the protocol. It illustrates this using the secure sum computation protocol. Finally, this paper discusses the open questions in this work and future research directions.
منابع مشابه
Technical Report TR-CS_01_07 A Game Theoretic Approach toward Multi-Party Privacy-Preserving Distributed Data Mining
Analysis of privacy-sensitive data in a multi-party environment often assumes that the parties are well-behaved and they abide by the protocols. Parties compute whatever is needed, communicate correctly following the rules, and do not collude with other parties for exposing third party sensitive data. This paper argues that most of these assumptions fall apart in real-life applications of priva...
متن کاملA Game Theoretic Approach toward Multi-Party Privacy-Preserving Distributed Data Mining
Analysis of privacy-sensitive data in a multi-party environment often assumes that the parties are well-behaved and they abide by the protocols. Parties compute whatever is needed, communicate correctly following the rules, and do not collude with other parties for exposing third party sensitive data. This paper argues that most of these assumptions fall apart in real-life applications of priva...
متن کاملPrivacy-Preserving Data Mining: A Game-Theoretic Approach
Privacy-preserving data mining has been an active research area in recent years due to privacy concerns in many distributed data mining settings. Protocols for privacy-preserving data mining have considered semi-honest, malicious, and covert adversarial models in cryptographic settings, whereby an adversary is assumed to follow, arbitrarily deviate from the protocol, or behaving somewhere in be...
متن کاملOn the Performance Measurements for Privacy Preserving Data Mining
This paper establishes the foundation for the performance measurements of privacy preserving data mining techniques. The performance is measured in terms of the accuracy of data mining results and the privacy protection of sensitive data. On the accuracy side, we address the problem of previous measures and propose a new measure, named “effective sample size”, to solve this problem. We show tha...
متن کاملPerformance Measurements for Privacy Preserving Data Mining
This paper establishes the foundation for the performance measurements of privacy preserving data mining techniques. The performance is measured in terms of the accuracy of data mining results and the privacy protection of sensitive data. On the accuracy side, we address the problem of previous measures and propose a new measure, named “effective sample size”, to solve this problem. We show tha...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2007