Abstract
Data mining tasks such as supervised classification can often benefit from a large training dataset. However, in many application domains, privacy concerns can hinder the construction of an accurate classifier by combining datasets from multiple sites. In this work, we propose a novel privacy-preserving distributed data sanitization algorithm that randomizes the private data at each site independently before the data is pooled to form a classifier at a centralized site. Distance-preserving perturbation approaches have been proposed by other researchers but we show that they can be susceptible to security risks. To enhance security, we require a unique non-distance-preserving approach. We use Kernel Density Estimation (KDE) Resampling, where samples are drawn independently from a distribution that is approximately equal to the original data’s distribution. KDE Resampling provides consistent density estimates with randomized samples that are asymptotically independent of the original samples. This ensures high accuracy, especially when a large number of samples is available, with low privacy loss. We evaluated our approach on five standard datasets in a distributed setting using three different classifiers. The classification errors only deteriorated by 3% (in the worst case) when we used the randomized data instead of the original private data. With a large number of samples, KDE Resampling effectively preserves privacy (due to the asymptotic independence property) and also maintains the necessary data integrity for constructing accurate classifiers (due to consistency).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Agrawal, D., Aggarwal, C.C.: On the design and quantification of privacy preserving data mining algorithms. In: Proc. of Symposium on Principles of Database Systems, pp. 247–255 (2001)
Agrawal, R., Srikant, R.: Privacy-preserving data mining. In: In Proc. of ACM SIGMOD Conf. on Management of Data, pp. 439–450 (2000)
Atallah, M., Bertino, E., Elmagarmid, A., Ibrahim, M., Verykios, V.: Disclosure limitation of sensitive rules. In: Proc. of Knowledge and Data Engineering Exchange, 1999 (KDEX 1999), pp. 45–52 (1999)
Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness theorems for cryptographic fault-tolerant distributed computation. In: Proc. of 20th ACM Symposium on the Theory of Computation (STOC), pp. 1–10 (1988)
Caetano, T.: Graphical Models and Point Set Matching. PhD thesis, Universidade Federal do Rio Grande do Sul (UFRGS) (2004)
Chang, C.C., Lin, C.J.: LIBSVM: A library for support vector machines (2001), http://www.csie.ntu.edu.tw/~cjlin/libsvm
Chen, K., Liu, L.: Privacy preserving data classification with rotation perturbation. In: Proc. of 5th IEEE Int. Conf. on Data Mining (ICDM 2005), Houston, TX, pp. 589–592 (2005)
Devroye, L.: Sample-based non-uniform random variate generation. In: 18th conference on Winter simulation (1985)
Devroye, L.: Non-Uniform Random Variate Generation. Springer, New York (1986)
Devroye, L., Gyorfi, L.: Non-parametric Density Estimation. The L1 View. Wiley, Chichester (1955)
Du, W., Han, Y.S., Chen, S.: Privacy-preserving multivariate statistical analysis: Linear regression and classification. In: Jonker, W., Petković, M. (eds.) SDM 2004. LNCS, vol. 3178, pp. 83–99. Springer, Heidelberg (2004)
Duda, R.O., Hart, P.E., Stork, D.G.: Pattern Classification. Wiley, Chichester (2000)
Dwork, C., Kenthapadi, K., McSherry, F., Mironov, I., Naor, M.: Our Data, Ourselves: Privacy Via Distributed Noise Generation. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 486–503. Springer, Heidelberg (2006)
Evfimievski, A.: Randomization in privacy preserving data mining. ACM SIGKDD Explorations Newsletter 4, 43–48 (2002)
Evfimievski, A., Srikant, R., Agrawal, R., Gehrke, J.: Privacy preserving mining of association rules. In: Proc. of 8th ACM SIGKDD Int. Conf. on Knowledge Discovery in Databases and Data Mining, pp. 217–228 (2002)
Fukunaga, K., Hostetler, L.D.: The estimation of gradient of a density function with applications to pattern recognition. IEEE Transactions on Information Theory 21, 32–40 (1975)
Han, J., Kamber, M.: Data Mining: Concepts and Techniques. Morgan Kaufmann Publishers, San Francisco (2000)
Huang, Z., Du, W., Chen, B.: Deriving private information from randomized data. In: Proc. of ACM SIGMOD Conf., Baltimore, MD, pp. 37–48 (2005)
Indyk, P., Woodruff, D.: Polylogarithmic private approximations and efficient matching. In: Proc. of Theory of Cryptography Conf., NY (2006)
Kargupta, H., Datta, S., Wang, Q., Sivakumar, K.: On the privacy preserving properties of random data perturbation techniques. In: Proc. of 3rd IEEE Int. Conf. on Data Mining, Washington, DC, USA, pp. 99–106 (2003)
Kargupta, H., Park, B., Hershbereger, D., Johnson, E.: Collective data mining: A new perspective toward distributed data mining. In: Advances in distributed data mining, pp. 133–184 (1999)
Liew, C.K., Choi, U.J., Liew, C.J.: A data distortion by probability distribution. ACM Trans. Database Systems (TODS) 10, 395–411 (1985)
Lindell, Y., Pinkas, B.: Privacy Preserving Data Mining. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 36–53. Springer, Heidelberg (2000)
Liu, K., Kargupta, H., Ryan, J.: Random projection-based multiplicative data perturbation for privacy preserving distributed data mining. IEEE Transactions on Knowledge and Data Engineering (TKDE) 18, 92–106 (2006)
Merugu, S., Ghosh, J.: A privacy-sensitive approach to distributed clustering. Special issue: Advances in pattern recognition 26(4), 399–410 (2005)
Muralidhar, K., Parsa, R., Sarathy, R.: A general additive data perturbation method for database security. Management Science 19, 1399–1415 (1999)
Newman, D.J., Hettich, S., Blake, C.L., Merz, C.J.: UCI Repository of Machine Learning Databases, University of California, Irvine, Dept. of Information and Computer Sciences (1998), http://www.ics.uci.edu/~mlearn/MLRepository.html
Oliveira, S.R., Zaiane, O.R.: A privacy-preserving clustering approach toward secure and effective data analysis for business collaboration. Computers & Security 26(1), 81–93 (2007)
Parzen, E.: On the estimation of a probability density function and mode. Annals of Mathematical Statistics 33, 1065–1076 (1962)
Pinkas, B.: Cryptographic techniques for privacy preserving data mining. SIGKDD Explorations 4, 12–19 (2002)
Samarati, P., Sweeney, L.: Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. In: Proc. of the IEEE Symposium on Research in Security and Privacy, Oakland, CA (May 1998)
Scott, D.W.: Multivariate Density Estimation. Theory, Practice and Visualization. Wiley, Chichester (1992)
Silverman, B.W.: Density Estimation for Statistics and Data Analysis. Chapman & Hall, London (1986)
Subramaniam, H., Wright, R.N., Yang, Z.: Experimental analysis of privacy-preserving statistics computation. In: Proc. of the Workshop on Secure Data Management (in conjunction with VLDB 2004) (2004)
Sweeney, L.: k-anonymity: A model for protecting privacy. Int. Journal of Uncertainty Fuzziness Knowledge Based Systems 10, 557–570 (2002)
Vaidya, J., Clifton, C.: Privacy preserving Naïve Bayes classifier for vertically partitioned data. In: Jonker, W., Petković, M. (eds.) SDM 2004. LNCS, vol. 3178, pp. 330–334. Springer, Heidelberg (2004)
Yao, A.: How to generate and exchange secrets. In: Proc. 27th IEEE Symposium on Foundations of Computer Science, pp. 162–167 (1986)
Zhang, N., Wang, S., Zhao, W.: A new scheme on privacy-preserving data classification. In: Proc. of 11th ACM SIGKDD Int. Conf. on Knowledge Discovery in Data Mining, pp. 374–383 (2005)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Yan Fu Tan, V., Ng, SK. (2008). Privacy-Preserving Sharing of Horizontally-Distributed Private Data for Constructing Accurate Classifiers. In: Bonchi, F., Ferrari, E., Malin, B., Saygin, Y. (eds) Privacy, Security, and Trust in KDD. PInKDD 2007. Lecture Notes in Computer Science, vol 4890. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-78478-4_7
Download citation
DOI: https://doi.org/10.1007/978-3-540-78478-4_7
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-78477-7
Online ISBN: 978-3-540-78478-4
eBook Packages: Computer ScienceComputer Science (R0)