Privacy-Preserving Decision Tree Mining Based on Random Substitutions
Privacy-preserving decision tree mining is an important problem that has yet to be thoroughly understood. In fact, the privacy-preserving decision tree mining method explored in the pioneer paper [1] was recently showed to be completely broken, because its data perturbation technique is fundamentall...
Saved in:
| Published in | Emerging Trends in Information and Communication Security pp. 145 - 159 |
|---|---|
| Main Authors | , , |
| Format | Book Chapter |
| Language | English Japanese |
| Published |
Berlin, Heidelberg
Springer Berlin Heidelberg
2006
|
| Series | Lecture Notes in Computer Science |
| Subjects | |
| Online Access | Get full text |
| ISBN | 9783540346401 3540346406 |
| ISSN | 0302-9743 1611-3349 |
| DOI | 10.1007/11766155_11 |
Cover
| Summary: | Privacy-preserving decision tree mining is an important problem that has yet to be thoroughly understood. In fact, the privacy-preserving decision tree mining method explored in the pioneer paper [1] was recently showed to be completely broken, because its data perturbation technique is fundamentally flawed [2]. However, since the general framework presented in [1] has some nice and useful features in practice, it is natural to ask if it is possible to rescue the framework by, say, utilizing a different data perturbation technique. In this paper, we answer this question affirmatively by presenting such a data perturbation technique based on random substitutions. We show that the resulting privacy-preserving decision tree mining method is immune to attacks (including the one introduced in [2]) that are seemingly relevant. Systematic experiments show that it is also effective. |
|---|---|
| Bibliography: | This work was supported in part by US NFS grant IIS-0524612. |
| ISBN: | 9783540346401 3540346406 |
| ISSN: | 0302-9743 1611-3349 |
| DOI: | 10.1007/11766155_11 |