Privacy-Preserving Decision Tree Mining Using A Random Replacement Perturbation
نویسندگان
چکیده
Privacy-preserving data mining has become an important topic, and many methods have been proposed for a diverse set of privacy-preserving data mining tasks. However, privacy-preserving decision tree mining pioneered by [1] still remains to be elusive. Indeed, the work of [1] was recently showed to be awed [2], meaning that an adversary can actually recover the original data from the perturbed ones. This naturally triggers the following question: Is the data mining approach of [1] still useful despite that its speci c perturbation method (called adding noise) is awed? In this paper we resolve this issue by exploring a di erent perturbation method for privacy-preserving decision tree mining. In particular, we show that this perturbation method is immune to attacks including that of [2]. Besides, we thoroughly investigate the parameter selections that are useful in guiding privacy-preserving decision tree mining practice. Systematic experiments show that our method is e ective.
منابع مشابه
An Improvement of Privacy-Preserving Scheme Based on Random Substitutions
Data perturbation techniques are one of the most popular models for privacy-preserving data mining due to their practical utility [1]. In a typical data perturbation, before the data owner publishes the data, they randomly change the data in certain way to disguise the private information while preserving some statistical properties for obtaining meaningful data mining models. Agrawal and Harit...
متن کاملPrivacy-Preserving Decision Tree Mining Based on Random Substitutions
Privacy-preserving decision tree mining is an important problem that has yet to be thoroughly understood. In fact, the privacypreserving decision tree mining method explored in the pioneer paper [1] was recently showed to be completely broken, because its data perturbation technique is fundamentally flawed [2]. However, since the general framework presented in [1] has some nice and useful featu...
متن کاملPrivacy Preserving Data Mining using Random Decision Tree
Data processing with information privacy and information utility has been emerged to manage distributed information expeditiously. In this paper, to deal with this advancement in privacy protective data processing technology victimization intensify approach of Random Decision Tree (RDT). Random Decision Tree provides higher potency and information privacy than Privacy secured Data mining Techni...
متن کاملPrivacy Preserving Data Mining in Electronic Health Record using K- anonymity and Decision Tree
In this paper, we present an accurate and efficient privacy preserving data mining technique in Electronic Health Record (EHR) by using k –anonymity and decision tree C4.5 that is useful to generate pattern for medical research or any clinical trials. It is analyzed that anonymization offers better privacy rather than other privacy preserving method like that randomization, cryptography, pertur...
متن کاملOn Random Additive Perturbation for Privacy Preserving Data Mining
Title of Thesis: On Random Additive Perturbation for Privacy Preserving Data Mining Author: Souptik Datta, Master of Science, 2004 Thesis directed by: Dr. Hillol Kargupta, Associate Professor Department of Computer Science and Electrical Engineering Privacy is becoming an increasingly important issue in many data mining applications. This has triggered the development of many privacy-preserving...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006