Privacy-Preserving Decision Tree Mining Based on Random Substitutions
Privacy-preserving decision tree mining is an important problem that has yet to be thoroughly understood. In fact, the privacy-preserving decision tree mining method explored in the pioneer paper [1] was recently showed to be completely broken, because its data perturbation technique is fundamentall...
        Saved in:
      
    
          | Published in | Emerging Trends in Information and Communication Security pp. 145 - 159 | 
|---|---|
| Main Authors | , , | 
| Format | Book Chapter | 
| Language | English Japanese  | 
| Published | 
        Berlin, Heidelberg
          Springer Berlin Heidelberg
    
        2006
     | 
| Series | Lecture Notes in Computer Science | 
| Subjects | |
| Online Access | Get full text | 
| ISBN | 9783540346401 3540346406  | 
| ISSN | 0302-9743 1611-3349  | 
| DOI | 10.1007/11766155_11 | 
Cover
| Summary: | Privacy-preserving decision tree mining is an important problem that has yet to be thoroughly understood. In fact, the privacy-preserving decision tree mining method explored in the pioneer paper [1] was recently showed to be completely broken, because its data perturbation technique is fundamentally flawed [2]. However, since the general framework presented in [1] has some nice and useful features in practice, it is natural to ask if it is possible to rescue the framework by, say, utilizing a different data perturbation technique. In this paper, we answer this question affirmatively by presenting such a data perturbation technique based on random substitutions. We show that the resulting privacy-preserving decision tree mining method is immune to attacks (including the one introduced in [2]) that are seemingly relevant. Systematic experiments show that it is also effective. | 
|---|---|
| Bibliography: | This work was supported in part by US NFS grant IIS-0524612. | 
| ISBN: | 9783540346401 3540346406  | 
| ISSN: | 0302-9743 1611-3349  | 
| DOI: | 10.1007/11766155_11 |