A Game Theoretic Perspective Toward Practical Privacy Preserving Data Mining

نویسندگان

  • Kamalika Das
  • Kun Liu
  • Hillol Kargupta
چکیده

Analysis of privacy-sensitive data in a multi-party environment often assumes that the parties are well-behaved and they abide by the protocols. Parties compute whatever is needed, communicate correctly following the rules, and do not collude with other parties for exposing third party sensitive data. This paper argues that most of these assumptions fall apart in real-life applications of privacypreserving distributed data mining (PPDM). It offers a more realistic formulation of the PPDM problem as a multi-party game where each party tries to maximize its own objectives. The paper uses this game-theoretic framework for doing equilibrium-analyses of existing PPDM algorithms. It then modifies these algorithms using the concept of mechanism design and shows how introduction of penalty forces dishonest rational participants to follow the protocol. It illustrates this using the secure sum computation protocol. Finally, this paper discusses the open questions in this work and future research directions.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Technical Report TR-CS_01_07 A Game Theoretic Approach toward Multi-Party Privacy-Preserving Distributed Data Mining

Analysis of privacy-sensitive data in a multi-party environment often assumes that the parties are well-behaved and they abide by the protocols. Parties compute whatever is needed, communicate correctly following the rules, and do not collude with other parties for exposing third party sensitive data. This paper argues that most of these assumptions fall apart in real-life applications of priva...

متن کامل

A Game Theoretic Approach toward Multi-Party Privacy-Preserving Distributed Data Mining

Analysis of privacy-sensitive data in a multi-party environment often assumes that the parties are well-behaved and they abide by the protocols. Parties compute whatever is needed, communicate correctly following the rules, and do not collude with other parties for exposing third party sensitive data. This paper argues that most of these assumptions fall apart in real-life applications of priva...

متن کامل

Privacy-Preserving Data Mining: A Game-Theoretic Approach

Privacy-preserving data mining has been an active research area in recent years due to privacy concerns in many distributed data mining settings. Protocols for privacy-preserving data mining have considered semi-honest, malicious, and covert adversarial models in cryptographic settings, whereby an adversary is assumed to follow, arbitrarily deviate from the protocol, or behaving somewhere in be...

متن کامل

On the Performance Measurements for Privacy Preserving Data Mining

This paper establishes the foundation for the performance measurements of privacy preserving data mining techniques. The performance is measured in terms of the accuracy of data mining results and the privacy protection of sensitive data. On the accuracy side, we address the problem of previous measures and propose a new measure, named “effective sample size”, to solve this problem. We show tha...

متن کامل

Performance Measurements for Privacy Preserving Data Mining

This paper establishes the foundation for the performance measurements of privacy preserving data mining techniques. The performance is measured in terms of the accuracy of data mining results and the privacy protection of sensitive data. On the accuracy side, we address the problem of previous measures and propose a new measure, named “effective sample size”, to solve this problem. We show tha...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007