Privacy Preserving Decision Tree Mining from Perturbed Data

Privacy preserving data mining has been investigated extensively. The previous works mainly fall into two categories, perturbation and randomization based approaches and secure multi-party computation based approaches. The earlier perturbation and randomization approaches have a step to reconstruct the original data distribution. The new research in this area adopts different data distortion methods or modifies the data mining techniques to make it more suitable to the perturbation scenario. Secure multi-party computation approaches which employ cryptographic tools to build data mining models face high communication and computation costs, especially when the number of parties participating in the computation is large. In this paper, we propose a new perturbation based technique. In our solution, we modify the data mining algorithms so that they can be directly used on the perturbed data. In other words, we directly build a classifier for the original data set from the perturbed training data set.
Date: January 05, 2009
Book Title: Hawaii International International Conference on Systems Science
Type: InProceedings
Edition: 42
Pages: 1-10
Address: Big Island, Hi, USA
Downloads: 404

Has 1 soft copy


remote link

Bibtex


@InProceedings{Privacy_Preserving_Decision_Tree_Mining_,
  author = "Li Liu and Murat Kantarcioglu and Xiaohu Li",
  title = "{Privacy Preserving Decision Tree Mining from Perturbed Data}",
  month = "January",
  year = "2009",
  edition = "42",
  address = ", Big Island, Hi, USA",
  pages = "1-10",
  booktitle = "Hawaii International International Conference on Systems Science",
}