Privacy-Preserving Decision Tree Mining Based on Random Substitutions
Privacy-preserving decision tree mining is an important problem that has yet to be thoroughly understood. In fact, the privacy-preserving decision tree mining method explored in the pioneer paper [1] was recently showed to be completely broken, because its data perturbation technique is fundamentall...
Saved in:
| Published in | Emerging Trends in Information and Communication Security pp. 145 - 159 |
|---|---|
| Main Authors | , , |
| Format | Book Chapter |
| Language | English Japanese |
| Published |
Berlin, Heidelberg
Springer Berlin Heidelberg
2006
|
| Series | Lecture Notes in Computer Science |
| Subjects | |
| Online Access | Get full text |
| ISBN | 9783540346401 3540346406 |
| ISSN | 0302-9743 1611-3349 |
| DOI | 10.1007/11766155_11 |
Cover
| Abstract | Privacy-preserving decision tree mining is an important problem that has yet to be thoroughly understood. In fact, the privacy-preserving decision tree mining method explored in the pioneer paper [1] was recently showed to be completely broken, because its data perturbation technique is fundamentally flawed [2]. However, since the general framework presented in [1] has some nice and useful features in practice, it is natural to ask if it is possible to rescue the framework by, say, utilizing a different data perturbation technique. In this paper, we answer this question affirmatively by presenting such a data perturbation technique based on random substitutions. We show that the resulting privacy-preserving decision tree mining method is immune to attacks (including the one introduced in [2]) that are seemingly relevant. Systematic experiments show that it is also effective. |
|---|---|
| AbstractList | Privacy-preserving decision tree mining is an important problem that has yet to be thoroughly understood. In fact, the privacy-preserving decision tree mining method explored in the pioneer paper [1] was recently showed to be completely broken, because its data perturbation technique is fundamentally flawed [2]. However, since the general framework presented in [1] has some nice and useful features in practice, it is natural to ask if it is possible to rescue the framework by, say, utilizing a different data perturbation technique. In this paper, we answer this question affirmatively by presenting such a data perturbation technique based on random substitutions. We show that the resulting privacy-preserving decision tree mining method is immune to attacks (including the one introduced in [2]) that are seemingly relevant. Systematic experiments show that it is also effective. |
| Author | Xu, Shouhuai Dowd, Jim Zhang, Weining |
| Author_xml | – sequence: 1 givenname: Jim surname: Dowd fullname: Dowd, Jim email: jdowd@cs.utsa.edu organization: Department of Computer Science, University of Texas at San Antonio, USA – sequence: 2 givenname: Shouhuai surname: Xu fullname: Xu, Shouhuai email: shxu@cs.utsa.edu organization: Department of Computer Science, University of Texas at San Antonio, USA – sequence: 3 givenname: Weining surname: Zhang fullname: Zhang, Weining email: wzhang@cs.utsa.edu organization: Department of Computer Science, University of Texas at San Antonio, USA |
| BookMark | eNpVUMtOwzAQNFAkQsmJH8iVQ8Abv5IjlPKQiqignCPbWaMUcJCdVuLvcQUH2MtIM6PZ0RyTiR88EnIK9BwoVRcASkoQogXYI3mjaiY4ZVzySuyTDCRAyRhvDv5pFCYko4xWZaM4OyJ5jGuajoHiUGdkvgz9VtuvchkwYtj2_rW4RtvHfvDFKiAWD73fkVc6Ylck8kn7bvgonjcmjv24GZMxnpBDp98j5r84JS8389Xsrlw83t7PLhflGhSF0tVdeovUCit4alhJNEI7YyWiE2h2EhOVVaBqCSiYcZqjqIzsnG26ik3J2U9u_AypFIbWDMNbbIG2u4naPxOxb5UzVUg |
| ContentType | Book Chapter |
| Copyright | Springer-Verlag Berlin Heidelberg 2006 |
| Copyright_xml | – notice: Springer-Verlag Berlin Heidelberg 2006 |
| DOI | 10.1007/11766155_11 |
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISBN | 9783540346425 3540346422 |
| EISSN | 1611-3349 |
| Editor | Müller, Günter |
| Editor_xml | – sequence: 1 givenname: Günter surname: Müller fullname: Müller, Günter email: guenter.mueller@iig.uni-freiburg.de |
| EndPage | 159 |
| GroupedDBID | -DT -GH -~X 1SB 29L 2HA 2HV 5QI 875 AASHB ABMNI ACGFS ADCXD AEFIE ALMA_UNASSIGNED_HOLDINGS EJD F5P FEDTE HVGLF LAS LDH P2P RNI RSU SVGTG VI1 ~02 |
| ID | FETCH-LOGICAL-j1701-f8d174e0c5c5435426eb5afbc6eef5eb4e0c352c717861e53bfa4e52b6dfc9d23 |
| ISBN | 9783540346401 3540346406 |
| ISSN | 0302-9743 |
| IngestDate | Wed Sep 17 03:57:01 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | false |
| Language | English Japanese |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-j1701-f8d174e0c5c5435426eb5afbc6eef5eb4e0c352c717861e53bfa4e52b6dfc9d23 |
| Notes | This work was supported in part by US NFS grant IIS-0524612. |
| PageCount | 15 |
| ParticipantIDs | springer_books_10_1007_11766155_11 |
| PublicationCentury | 2000 |
| PublicationDate | 2006 |
| PublicationDateYYYYMMDD | 2006-01-01 |
| PublicationDate_xml | – year: 2006 text: 2006 |
| PublicationDecade | 2000 |
| PublicationPlace | Berlin, Heidelberg |
| PublicationPlace_xml | – name: Berlin, Heidelberg |
| PublicationSeriesTitle | Lecture Notes in Computer Science |
| PublicationSubtitle | International Conference, ETRICS 2006, Freiburg, Germany, June 6-9, 2006. Proceedings |
| PublicationTitle | Emerging Trends in Information and Communication Security |
| PublicationYear | 2006 |
| Publisher | Springer Berlin Heidelberg |
| Publisher_xml | – name: Springer Berlin Heidelberg |
| RelatedPersons | Kleinberg, Jon M. Mattern, Friedemann Nierstrasz, Oscar Tygar, Dough Steffen, Bernhard Kittler, Josef Vardi, Moshe Y. Weikum, Gerhard Sudan, Madhu Naor, Moni Mitchell, John C. Terzopoulos, Demetri Pandu Rangan, C. Kanade, Takeo Hutchison, David |
| RelatedPersons_xml | – sequence: 1 givenname: David surname: Hutchison fullname: Hutchison, David organization: Lancaster University, UK – sequence: 2 givenname: Takeo surname: Kanade fullname: Kanade, Takeo organization: Carnegie Mellon University, Pittsburgh, USA – sequence: 3 givenname: Josef surname: Kittler fullname: Kittler, Josef organization: University of Surrey, Guildford, UK – sequence: 4 givenname: Jon M. surname: Kleinberg fullname: Kleinberg, Jon M. organization: Cornell University, Ithaca, USA – sequence: 5 givenname: Friedemann surname: Mattern fullname: Mattern, Friedemann organization: ETH Zurich, Switzerland – sequence: 6 givenname: John C. surname: Mitchell fullname: Mitchell, John C. organization: Stanford University, CA, USA – sequence: 7 givenname: Moni surname: Naor fullname: Naor, Moni organization: Weizmann Institute of Science, Rehovot, Israel – sequence: 8 givenname: Oscar surname: Nierstrasz fullname: Nierstrasz, Oscar organization: University of Bern, Switzerland – sequence: 9 givenname: C. surname: Pandu Rangan fullname: Pandu Rangan, C. organization: Indian Institute of Technology, Madras, India – sequence: 10 givenname: Bernhard surname: Steffen fullname: Steffen, Bernhard organization: University of Dortmund, Germany – sequence: 11 givenname: Madhu surname: Sudan fullname: Sudan, Madhu organization: Massachusetts Institute of Technology, MA, USA – sequence: 12 givenname: Demetri surname: Terzopoulos fullname: Terzopoulos, Demetri organization: University of California, Los Angeles, USA – sequence: 13 givenname: Dough surname: Tygar fullname: Tygar, Dough organization: University of California, Berkeley, USA – sequence: 14 givenname: Moshe Y. surname: Vardi fullname: Vardi, Moshe Y. organization: Rice University, Houston, USA – sequence: 15 givenname: Gerhard surname: Weikum fullname: Weikum, Gerhard organization: Max-Planck Institute of Computer Science, Saarbruecken, Germany |
| SSID | ssj0000317418 ssj0002792 |
| Score | 1.4635993 |
| Snippet | Privacy-preserving decision tree mining is an important problem that has yet to be thoroughly understood. In fact, the privacy-preserving decision tree mining... |
| SourceID | springer |
| SourceType | Publisher |
| StartPage | 145 |
| SubjectTerms | data mining decision tree matrix perturbation Privacy-preservation |
| Title | Privacy-Preserving Decision Tree Mining Based on Random Substitutions |
| URI | http://link.springer.com/10.1007/11766155_11 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1bSysxEA61IogP3s7BO-HgW9lD95K0PvigtiJF5SBe-laSbBYr2AW7VdQ_70wua2tFPL4sJdvtpvPtTiZf5psQsisEryuRhgFWwQ4SoerwzsVRkEqpRKRi3jTbdJ6d85OrpNNl3UrldVxdUsi_6uVTXclPUIU2wBVVsv-BbPmj0ACfAV84AsJw_BD8TtKslkdH4SRO9N_TWp22qPApxhPqD0etFyWH3sqfDLyd_r1v6o4MG3qbj25Hoj9FKt9os53E-GP276H_KNRzgKkc6HagPy23bQ92DJyGuaR2CKNliisTF9Cx_N44LJOlUPKFaDE93D91ixrneWFyxWp-3wnvhr7kKTxPWfuijJejoeKEJ-5Kp-wCrw3zHusItXXUHMsvxrbcqXO-oS1M6cbx0FYanxoibFZIiIUxIZbqoS58Bu5bJbMH7c7pdUnQgbfDyj7lsI6VFu2SlO2MEwqZzvK5kkOznXdKUBRpjt1parXdBDGXS2QBhS0UFSdgzmVS0YMVsujNS515V0l7GlPqMaWIKbWYUoMphUaLKZ3A9Be5Om5fHp0EbreN4A5r8gdZM4U_rOuKKQYxNERuWjKRScW1zpiWeAqidQXz_yYPNYtlJhLNIsnTTO2lUfybVAf5QK8RGomswRtaCZHUk1Q1ZBIppnXIVCMOMy7XyR9vhx6-P8OeL549ZqyN73xpk8y_P2tbpFo8jPQ2RImF3HF4vgGWhmQG |
| linkProvider | Library Specific Holdings |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.title=Emerging+Trends+in+Information+and+Communication+Security&rft.au=Dowd%2C+Jim&rft.au=Xu%2C+Shouhuai&rft.au=Zhang%2C+Weining&rft.atitle=Privacy-Preserving+Decision+Tree+Mining+Based+on+Random+Substitutions&rft.series=Lecture+Notes+in+Computer+Science&rft.date=2006-01-01&rft.pub=Springer+Berlin+Heidelberg&rft.isbn=9783540346401&rft.issn=0302-9743&rft.eissn=1611-3349&rft.spage=145&rft.epage=159&rft_id=info:doi/10.1007%2F11766155_11 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0302-9743&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0302-9743&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0302-9743&client=summon |