Skip to main content

Privacy-Preserving Naive Bayesian Classification over Horizontally Partitioned Data

  • Chapter

Part of the book series: Studies in Computational Intelligence ((SCI,volume 118))

Recent advances1 in computer networking and database technologies have resulted in creation of large quantities of data which are located in different sites. Data mining is a useful tool to extract valuable knowledge from this data. Well known data mining algorithms include association rule mining, classification, clustering, outlier detection, etc. However, extracting useful knowledge from distributed sites is often challenging due to real world constraints such as privacy, communication and computation overhead.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. G. Aggarwal, N. Mishra, and B. Pinkas. Secure computation of the k th-ranked element. In EUROCRYPT pp 40–55, 2004.

    Google Scholar 

  2. R. Agrawal and R. Srikant. Privacy-preserving data mining. In Proceedings of the ACM SIGMOD Conference on Management of Data, pp 439–450. ACM, May 2000.

    Google Scholar 

  3. J. Benaloh. Dense probabilistic encryption. In Proceedings of the Workshop on Selected Areas of Cryptography, pp 120–128, Kingston, Ontario, May 1994.

    Google Scholar 

  4. J. Domingo-Ferrer. A provably secure additive and multiplicative privacy homomorphism. In Information Security Conference, pp 471–483, 2002.

    Google Scholar 

  5. W. Du and Z. Zhan. Using randomized response techniques for privacy-preserving data mining. In Proceedings of The 9th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, August 24–27 2003.

    Google Scholar 

  6. C. Dwork and K. Nissim. Privacy-preserving datamining on vertically partitioned databases. In CRYPTO 2004, pp 528–544.

    Google Scholar 

  7. A. Evfmievski, J. Gehrke, and R. Srikant. Limiting privacy breaches in privacy preserving data mining. In Proceedings of the 22nd ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, pp 211–222, San Diego, CA, June 9–12, 2003.

    Google Scholar 

  8. M. Franklin, Z. Galil, and M. Yung. An overview of secure distributed computing. Technical Report TR CUCS-00892, Department of Computer Science, Columbia University, 1992.

    Google Scholar 

  9. B. Goethals, S. Laur, H. Lipmaa, and T. Mielikainen. On secure scalar product computation for privacy-preserving data mining. In Proceedings of The 7th Annual International Conference in Information Security and Cryptology (ICISC 2004), Volume 3506 of Lecture Notes in Computer Science, pp 104–120, Seoul, Korea, December 2–3, 2004, Springer, Berlin Heidelberg New York, 2004.

    Google Scholar 

  10. O. Goldreich. Secure multi-party computation (working draft). http://www.wisdom.weizmann.ac.il/home/oded/public_html/foc.html, 1998.

  11. O. Goldreich, S. Micali, and A. Wigderson. How to play any mental game. In Proceedings of the 19th Annual ACM Symposium on Theory of Computing, pp 218–229, 1987.

    Google Scholar 

  12. S. Goldwasser. Multi-party computations: Past and present. In Proceedings of the 16th Annual ACM Symposium on Principles of Distributed Computing, Santa Barbara, CA USA, August 21–24, 1997.

    Google Scholar 

  13. Y. Lindell and B. Pinkas. Privacy preserving data mining. In Advances in Cryptology – Crypto2000, Lecture Notes in Computer Science, Volume 1880, 2000.

    Google Scholar 

  14. D. Naccache and J. Stern. A new public key cryptosystem based on higher residues. In Proceedings of the 5th ACM conference on Computer and Communication Security, pp 59–66, San Francisco, California, United States, 1998.

    Google Scholar 

  15. T. Okamoto and S. Uchiyama. A new public-key cryptosystem as secure as factoring. In Eurocrypt’98, LNCS 1403, pp 308–318, 1998.

    Google Scholar 

  16. P. Paillier. Public key cryptosystems based on composite degree residuosity classes. In In Advances in Cryptology – Eurocrypt’99 Proceedings, LNCS 1592, pp 223–238, Springer, Berlin Heidelberg New York, 1999.

    Google Scholar 

  17. R. Rivest, L. Adleman, and M. Dertouzos. On data banks and privacy homomorphisms. In Foundations of Secure Computation, eds. R. A. DeMillo et al., Academic Press, pp 169–179, 1978.

    Google Scholar 

  18. S. Rizvi and J.R. Haritsa. Maintaining data privacy in association rule mining. In Proceedings of the 28th VLDB Conference, Hong Kong, China, 2002.

    Google Scholar 

  19. L. Sweeney. k-anonymity: a model for protecting privacy. In International Journal on Uncertainty, Fuzziness and Knowledge-based Systems 10(5), 557–570, 2002.

    Article  MATH  MathSciNet  Google Scholar 

  20. J. Vaidya and C. Clifton. Privacy preserving association rule mining in vertically partitioned data. In Proceedings of the 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp 639–644, Edmonton, Alberta, Canada, July 23–26, 2002.

    Google Scholar 

  21. A. C. Yao. Protocols for secure computations. In Proceedings of the 23rd Annual IEEE Symposium on Foundations of Computer Science, 1982.

    Google Scholar 

  22. J. Zhan and S. Matwin. Privacy-preserving nave bayesian classification over vertically partitioned data. In IEEE ICDM Workshop on Foundations of Semantic Oriented Data and Web Mining, Houston, Texas, USA, November 27–30, 2005.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Zhan, J., Matwin, S., Chang, L.W. (2008). Privacy-Preserving Naive Bayesian Classification over Horizontally Partitioned Data. In: Lin, T.Y., Xie, Y., Wasilewska, A., Liau, CJ. (eds) Data Mining: Foundations and Practice. Studies in Computational Intelligence, vol 118. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-78488-3_31

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-78488-3_31

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-78487-6

  • Online ISBN: 978-3-540-78488-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics