Abstract
In data analysis, providing privacy to the customer data is an important issue. In this paper, a large number of customers are surveyed to learn the rules of classification on their data while preserving privacy of the customers. Randomization techniques were proposed to address this problem. These techniques provide more accuracy for less privacy of customers, conversely less accuracy for more privacy of the customers. In this paper, we propose a cryptographic approach with strong privacy and no loss of accuracy as a cost of privacy for continuous data. Our approach uses naive Bayes classification algorithm using frequency mining. The result shows the efficiency of our approach.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Gentry, C. A fully homomorphic encryption scheme. PhD thesis, Stanford University, 2009. crypto.stanford.edu/craig.
Rivest, Ronald. L, Leonard Adleman, and Michael L. Dertouzos. “On Data Banks and Privacy Homomorphisms”, chapter On Data Banks and Privacy Homomorphisms, pages 169–180. Academic Press, 1978.
Liew C. K., Choi U. J. & Liew C. J. (1985). A Data Distortion by Probability Distribution. ACM Transactions on Database Systems (TODS), Vol 10, No 3, pp. 395–411.
Sweeney L.(2002). k-Anonymity: a Model for Protecting Privacy. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, Vol 10, No 5, pp. 557–570.
Kim J. J. & Winkler W. E. (2003). Multiplicative Noise for Masking Continuous Data. Technical Report Statistics #2003-01, Statistical Research Division, U.S. Bureau of the Census, Washington D.C.
Verykios V.S., Bertino E., Fovino I.N., Provenza L.P., Saygin, Y. & Theodoridis Y. (2004a). State-of-the-art in privacy preserving data mining, SIGMOD Record, Vol. 33, No. 1, pp. 50–57.
Verykios V. S., Elmagarmid A. K., Bertino E., Saygin Y. & Dasseni E. (2004b). Association Rule Hiding. IEEE Transactions on Knowledge and Data Engineering, Vol 16, Issue 4, pp. 434–447, ISSN 1041-4347.
Fienberg S. E. & McIntyre J.(2004). Data Swapping: Variations on a Theme by Dalenius and Reiss. Privacy in Statistical Databases (PSD), pp. 14–29, Barcelona, Spain.
Li X.B. and Sarkar S. (2006). A Tree-based Data Perturbation Approach for Privacy-Preserving Data Mining. IEEE Transactions on Knowledge and Data Engineering, Vol 18, No 9, pp. 1278–1283, ISSN 1041-4347.
Muralidhar K.& Sarathy R.(2006). Data shuffling a new masking approach for numerical data. Management Science, Vol 52, No 5, pp. 658–670.
Agarwal, D and Agarwal, C. On the design and quantification of privacy preserving data mining algorithms. In Proc. of the 20th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, pages 247–255 ACM Press, 2001.
Agarwal, R and Srikant, R. Privacy preserving data mining. In Proc. of ACM SIGMOD Conference on Management of Data, pages 439–450 ACM Press, May 2000.
Evfimievski, A, Srikant, R, Agarwal, R and Gehrke, J. Privacy preserving mining of association rules. In Proc. of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pages 217–228. ACM Press, 2002.
Evfimievski, A, Gehrke, J and Srikant, R. Limiting privacy breaches in privacy preserving data mining. In Proc. of the 22nd ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems, pages 211–222. ACM Press, 2003.
Du, W and Zhan, Z. Using randomized response techniques for privacy-preserving data mining. In Proc. of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pages 505–510. ACM Press, 2003.
Kargupta, H, Datta, H, Wang, Q and Sivakumar, K. On the privacy preserving properties of random data perturbation techniques. In The Third IEEE International Conference on Data Mining, 2003.
Yao, A. Protocols for Secure Computation. FOCS 1982, 1982.
O. Goldreich (1998) “Secure multi-party computation”, (working draft).
Lindell, Y and Pinkas, B. Privacy preserving data mining. J. Cryptology, 15(3):177–206, 2002.
Vaidya, J and Clifton, C. Privacy-preserving k-means clustering over vertically partitioned data. In Proc. of the Ninth ACM SIGKDD international conference on Knowledge discovery and data mining, pages 206–215. ACM Press, 2003.
Vaidya, J and Clifton, C. Privacy preserving association rule mining in vertically partitioned data. In Proc. of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pages 639–644. ACM Press, 2002.
Vaidya, J and Clifton, C. Privacy preserving naive Bayes classifier on vertically partitioned data. In 2004 SIAM International Conference on Data Mining, 2004.
Kantarcioglu, M and Vaidya, J. Privacy preserving naive Bayes classifier for horizontally partitioned data. In IEEE Workshop on Privacy Preserving Data Mining, 2003.
Kantarcioglu, M and Vaidya, J. Architecture for privacy-preserving mining of client information. In IEEE ICDM Workshop on Privacy, Security and Data Mining, pages 37–42, 2002.
Wright, R & Yang, Z. Privacy-preserving Bayesian network structure computation on distributed heterogeneous data. In Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining Pages 713–718.
Yang, Z, Wright, R. Privacy-Preserving Classification of Customer Data without Loss of Accuracy. In Proceedings of the 2005 SIAM International Conference on Data Mining.
Zhan, J. Using Homomorphic Encryption For Privacy-Preserving Collaborative Decision Tree Classification. IEEE Symposium on Computational Intelligence and Data Mining 2007.
Yinian Qi and Atallah, M. Efficient Privacy-Preserving k-Nearest Neighbour Search. IEEE ICDCS ’08, 2008, pp. 311–3193.
Chen, Tingting and Zhong, Sheng. Privacy-preserving backpropagation neural network learning. Neural Networks, IEEE Transactions on, 20(10):1554–1564, 2009.
Aslett, Louis JM, Esperanc¸a, Pedro M, and Holmes, Chris C. Encrypted statistical machine learning: new privacy preserving methods. arXiv preprint arXiv:1508.06845, 2015a.
Aslett, Louis JM, Esperanc¸a, Pedro M, and Holmes, Chris C. A review of homomorphic encryption and software tools for encrypted statistical machine learning. arXiv preprint arXiv:1508.06574, 2015b.
Kaleli, C and Polat, H. Privacy-Preserving Naïve Bayesian Classifier–Based Recommendations on Distributed Data. Computational Intelligent, Vol. 31 Nov 1 2015.
Huai Mengdi, Huang Liusheng, Yang Wei, Li Lu and Qi Mingyu. Privacy Preserving Naive Bayes Classification. In Proc. of International Conference Knowledge Science, Engineering and Management, Volume 9403 of Lecturer Notes in Computer Science, pages 627–638, 3rd November 2015.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Durga Prasad, K., Adi Narayana Reddy, K., Vasumathi, D. (2019). Privacy-Preserving Naive Bayesian Classifier for Continuous Data and Discrete Data. In: Bapi, R., Rao, K., Prasad, M. (eds) First International Conference on Artificial Intelligence and Cognitive Computing . Advances in Intelligent Systems and Computing, vol 815. Springer, Singapore. https://doi.org/10.1007/978-981-13-1580-0_28
Download citation
DOI: https://doi.org/10.1007/978-981-13-1580-0_28
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-1579-4
Online ISBN: 978-981-13-1580-0
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)