Skip to main content

Privacy-Preserving Sharing of Horizontally-Distributed Private Data for Constructing Accurate Classifiers

  • Conference paper
Privacy, Security, and Trust in KDD (PInKDD 2007)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 4890))

Included in the following conference series:

Abstract

Data mining tasks such as supervised classification can often benefit from a large training dataset. However, in many application domains, privacy concerns can hinder the construction of an accurate classifier by combining datasets from multiple sites. In this work, we propose a novel privacy-preserving distributed data sanitization algorithm that randomizes the private data at each site independently before the data is pooled to form a classifier at a centralized site. Distance-preserving perturbation approaches have been proposed by other researchers but we show that they can be susceptible to security risks. To enhance security, we require a unique non-distance-preserving approach. We use Kernel Density Estimation (KDE) Resampling, where samples are drawn independently from a distribution that is approximately equal to the original data’s distribution. KDE Resampling provides consistent density estimates with randomized samples that are asymptotically independent of the original samples. This ensures high accuracy, especially when a large number of samples is available, with low privacy loss. We evaluated our approach on five standard datasets in a distributed setting using three different classifiers. The classification errors only deteriorated by 3% (in the worst case) when we used the randomized data instead of the original private data. With a large number of samples, KDE Resampling effectively preserves privacy (due to the asymptotic independence property) and also maintains the necessary data integrity for constructing accurate classifiers (due to consistency).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Agrawal, D., Aggarwal, C.C.: On the design and quantification of privacy preserving data mining algorithms. In: Proc. of Symposium on Principles of Database Systems, pp. 247–255 (2001)

    Google Scholar 

  2. Agrawal, R., Srikant, R.: Privacy-preserving data mining. In: In Proc. of ACM SIGMOD Conf. on Management of Data, pp. 439–450 (2000)

    Google Scholar 

  3. Atallah, M., Bertino, E., Elmagarmid, A., Ibrahim, M., Verykios, V.: Disclosure limitation of sensitive rules. In: Proc. of Knowledge and Data Engineering Exchange, 1999 (KDEX 1999), pp. 45–52 (1999)

    Google Scholar 

  4. Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness theorems for cryptographic fault-tolerant distributed computation. In: Proc. of 20th ACM Symposium on the Theory of Computation (STOC), pp. 1–10 (1988)

    Google Scholar 

  5. Caetano, T.: Graphical Models and Point Set Matching. PhD thesis, Universidade Federal do Rio Grande do Sul (UFRGS) (2004)

    Google Scholar 

  6. Chang, C.C., Lin, C.J.: LIBSVM: A library for support vector machines (2001), http://www.csie.ntu.edu.tw/~cjlin/libsvm

  7. Chen, K., Liu, L.: Privacy preserving data classification with rotation perturbation. In: Proc. of 5th IEEE Int. Conf. on Data Mining (ICDM 2005), Houston, TX, pp. 589–592 (2005)

    Google Scholar 

  8. Devroye, L.: Sample-based non-uniform random variate generation. In: 18th conference on Winter simulation (1985)

    Google Scholar 

  9. Devroye, L.: Non-Uniform Random Variate Generation. Springer, New York (1986)

    MATH  Google Scholar 

  10. Devroye, L., Gyorfi, L.: Non-parametric Density Estimation. The L1 View. Wiley, Chichester (1955)

    Google Scholar 

  11. Du, W., Han, Y.S., Chen, S.: Privacy-preserving multivariate statistical analysis: Linear regression and classification. In: Jonker, W., Petković, M. (eds.) SDM 2004. LNCS, vol. 3178, pp. 83–99. Springer, Heidelberg (2004)

    Google Scholar 

  12. Duda, R.O., Hart, P.E., Stork, D.G.: Pattern Classification. Wiley, Chichester (2000)

    Google Scholar 

  13. Dwork, C., Kenthapadi, K., McSherry, F., Mironov, I., Naor, M.: Our Data, Ourselves: Privacy Via Distributed Noise Generation. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 486–503. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  14. Evfimievski, A.: Randomization in privacy preserving data mining. ACM SIGKDD Explorations Newsletter 4, 43–48 (2002)

    Article  Google Scholar 

  15. Evfimievski, A., Srikant, R., Agrawal, R., Gehrke, J.: Privacy preserving mining of association rules. In: Proc. of 8th ACM SIGKDD Int. Conf. on Knowledge Discovery in Databases and Data Mining, pp. 217–228 (2002)

    Google Scholar 

  16. Fukunaga, K., Hostetler, L.D.: The estimation of gradient of a density function with applications to pattern recognition. IEEE Transactions on Information Theory 21, 32–40 (1975)

    Article  MATH  MathSciNet  Google Scholar 

  17. Han, J., Kamber, M.: Data Mining: Concepts and Techniques. Morgan Kaufmann Publishers, San Francisco (2000)

    Google Scholar 

  18. Huang, Z., Du, W., Chen, B.: Deriving private information from randomized data. In: Proc. of ACM SIGMOD Conf., Baltimore, MD, pp. 37–48 (2005)

    Google Scholar 

  19. Indyk, P., Woodruff, D.: Polylogarithmic private approximations and efficient matching. In: Proc. of Theory of Cryptography Conf., NY (2006)

    Google Scholar 

  20. Kargupta, H., Datta, S., Wang, Q., Sivakumar, K.: On the privacy preserving properties of random data perturbation techniques. In: Proc. of 3rd IEEE Int. Conf. on Data Mining, Washington, DC, USA, pp. 99–106 (2003)

    Google Scholar 

  21. Kargupta, H., Park, B., Hershbereger, D., Johnson, E.: Collective data mining: A new perspective toward distributed data mining. In: Advances in distributed data mining, pp. 133–184 (1999)

    Google Scholar 

  22. Liew, C.K., Choi, U.J., Liew, C.J.: A data distortion by probability distribution. ACM Trans. Database Systems (TODS) 10, 395–411 (1985)

    Article  MATH  Google Scholar 

  23. Lindell, Y., Pinkas, B.: Privacy Preserving Data Mining. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 36–53. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  24. Liu, K., Kargupta, H., Ryan, J.: Random projection-based multiplicative data perturbation for privacy preserving distributed data mining. IEEE Transactions on Knowledge and Data Engineering (TKDE) 18, 92–106 (2006)

    Article  Google Scholar 

  25. Merugu, S., Ghosh, J.: A privacy-sensitive approach to distributed clustering. Special issue: Advances in pattern recognition 26(4), 399–410 (2005)

    Google Scholar 

  26. Muralidhar, K., Parsa, R., Sarathy, R.: A general additive data perturbation method for database security. Management Science 19, 1399–1415 (1999)

    Article  Google Scholar 

  27. Newman, D.J., Hettich, S., Blake, C.L., Merz, C.J.: UCI Repository of Machine Learning Databases, University of California, Irvine, Dept. of Information and Computer Sciences (1998), http://www.ics.uci.edu/~mlearn/MLRepository.html

  28. Oliveira, S.R., Zaiane, O.R.: A privacy-preserving clustering approach toward secure and effective data analysis for business collaboration. Computers & Security 26(1), 81–93 (2007)

    Article  Google Scholar 

  29. Parzen, E.: On the estimation of a probability density function and mode. Annals of Mathematical Statistics 33, 1065–1076 (1962)

    Article  MathSciNet  MATH  Google Scholar 

  30. Pinkas, B.: Cryptographic techniques for privacy preserving data mining. SIGKDD Explorations 4, 12–19 (2002)

    Article  Google Scholar 

  31. Samarati, P., Sweeney, L.: Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. In: Proc. of the IEEE Symposium on Research in Security and Privacy, Oakland, CA (May 1998)

    Google Scholar 

  32. Scott, D.W.: Multivariate Density Estimation. Theory, Practice and Visualization. Wiley, Chichester (1992)

    MATH  Google Scholar 

  33. Silverman, B.W.: Density Estimation for Statistics and Data Analysis. Chapman & Hall, London (1986)

    MATH  Google Scholar 

  34. Subramaniam, H., Wright, R.N., Yang, Z.: Experimental analysis of privacy-preserving statistics computation. In: Proc. of the Workshop on Secure Data Management (in conjunction with VLDB 2004) (2004)

    Google Scholar 

  35. Sweeney, L.: k-anonymity: A model for protecting privacy. Int. Journal of Uncertainty Fuzziness Knowledge Based Systems 10, 557–570 (2002)

    Article  MATH  MathSciNet  Google Scholar 

  36. Vaidya, J., Clifton, C.: Privacy preserving Naïve Bayes classifier for vertically partitioned data. In: Jonker, W., Petković, M. (eds.) SDM 2004. LNCS, vol. 3178, pp. 330–334. Springer, Heidelberg (2004)

    Google Scholar 

  37. Yao, A.: How to generate and exchange secrets. In: Proc. 27th IEEE Symposium on Foundations of Computer Science, pp. 162–167 (1986)

    Google Scholar 

  38. Zhang, N., Wang, S., Zhao, W.: A new scheme on privacy-preserving data classification. In: Proc. of 11th ACM SIGKDD Int. Conf. on Knowledge Discovery in Data Mining, pp. 374–383 (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Francesco Bonchi Elena Ferrari Bradley Malin Yücel Saygin

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Yan Fu Tan, V., Ng, SK. (2008). Privacy-Preserving Sharing of Horizontally-Distributed Private Data for Constructing Accurate Classifiers. In: Bonchi, F., Ferrari, E., Malin, B., Saygin, Y. (eds) Privacy, Security, and Trust in KDD. PInKDD 2007. Lecture Notes in Computer Science, vol 4890. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-78478-4_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-78478-4_7

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-78477-7

  • Online ISBN: 978-3-540-78478-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics