Privacy-Preserving Decision Tree Mining Based on Random Substitutions

Privacy-preserving decision tree mining is an important problem that has yet to be thoroughly understood. In fact, the privacy-preserving decision tree mining method explored in the pioneer paper [1] was recently showed to be completely broken, because its data perturbation technique is fundamentall...

Full description

Saved in:
Bibliographic Details
Published inEmerging Trends in Information and Communication Security pp. 145 - 159
Main Authors Dowd, Jim, Xu, Shouhuai, Zhang, Weining
Format Book Chapter
LanguageEnglish
Japanese
Published Berlin, Heidelberg Springer Berlin Heidelberg 2006
SeriesLecture Notes in Computer Science
Subjects
Online AccessGet full text
ISBN9783540346401
3540346406
ISSN0302-9743
1611-3349
DOI10.1007/11766155_11

Cover

Abstract Privacy-preserving decision tree mining is an important problem that has yet to be thoroughly understood. In fact, the privacy-preserving decision tree mining method explored in the pioneer paper [1] was recently showed to be completely broken, because its data perturbation technique is fundamentally flawed [2]. However, since the general framework presented in [1] has some nice and useful features in practice, it is natural to ask if it is possible to rescue the framework by, say, utilizing a different data perturbation technique. In this paper, we answer this question affirmatively by presenting such a data perturbation technique based on random substitutions. We show that the resulting privacy-preserving decision tree mining method is immune to attacks (including the one introduced in [2]) that are seemingly relevant. Systematic experiments show that it is also effective.
AbstractList Privacy-preserving decision tree mining is an important problem that has yet to be thoroughly understood. In fact, the privacy-preserving decision tree mining method explored in the pioneer paper [1] was recently showed to be completely broken, because its data perturbation technique is fundamentally flawed [2]. However, since the general framework presented in [1] has some nice and useful features in practice, it is natural to ask if it is possible to rescue the framework by, say, utilizing a different data perturbation technique. In this paper, we answer this question affirmatively by presenting such a data perturbation technique based on random substitutions. We show that the resulting privacy-preserving decision tree mining method is immune to attacks (including the one introduced in [2]) that are seemingly relevant. Systematic experiments show that it is also effective.
Author Xu, Shouhuai
Dowd, Jim
Zhang, Weining
Author_xml – sequence: 1
  givenname: Jim
  surname: Dowd
  fullname: Dowd, Jim
  email: jdowd@cs.utsa.edu
  organization: Department of Computer Science, University of Texas at San Antonio, USA
– sequence: 2
  givenname: Shouhuai
  surname: Xu
  fullname: Xu, Shouhuai
  email: shxu@cs.utsa.edu
  organization: Department of Computer Science, University of Texas at San Antonio, USA
– sequence: 3
  givenname: Weining
  surname: Zhang
  fullname: Zhang, Weining
  email: wzhang@cs.utsa.edu
  organization: Department of Computer Science, University of Texas at San Antonio, USA
BookMark eNpVUMtOwzAQNFAkQsmJH8iVQ8Abv5IjlPKQiqignCPbWaMUcJCdVuLvcQUH2MtIM6PZ0RyTiR88EnIK9BwoVRcASkoQogXYI3mjaiY4ZVzySuyTDCRAyRhvDv5pFCYko4xWZaM4OyJ5jGuajoHiUGdkvgz9VtuvchkwYtj2_rW4RtvHfvDFKiAWD73fkVc6Ylck8kn7bvgonjcmjv24GZMxnpBDp98j5r84JS8389Xsrlw83t7PLhflGhSF0tVdeovUCit4alhJNEI7YyWiE2h2EhOVVaBqCSiYcZqjqIzsnG26ik3J2U9u_AypFIbWDMNbbIG2u4naPxOxb5UzVUg
ContentType Book Chapter
Copyright Springer-Verlag Berlin Heidelberg 2006
Copyright_xml – notice: Springer-Verlag Berlin Heidelberg 2006
DOI 10.1007/11766155_11
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISBN 9783540346425
3540346422
EISSN 1611-3349
Editor Müller, Günter
Editor_xml – sequence: 1
  givenname: Günter
  surname: Müller
  fullname: Müller, Günter
  email: guenter.mueller@iig.uni-freiburg.de
EndPage 159
GroupedDBID -DT
-GH
-~X
1SB
29L
2HA
2HV
5QI
875
AASHB
ABMNI
ACGFS
ADCXD
AEFIE
ALMA_UNASSIGNED_HOLDINGS
EJD
F5P
FEDTE
HVGLF
LAS
LDH
P2P
RNI
RSU
SVGTG
VI1
~02
ID FETCH-LOGICAL-j1701-f8d174e0c5c5435426eb5afbc6eef5eb4e0c352c717861e53bfa4e52b6dfc9d23
ISBN 9783540346401
3540346406
ISSN 0302-9743
IngestDate Wed Sep 17 03:57:01 EDT 2025
IsPeerReviewed false
IsScholarly false
Language English
Japanese
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-j1701-f8d174e0c5c5435426eb5afbc6eef5eb4e0c352c717861e53bfa4e52b6dfc9d23
Notes This work was supported in part by US NFS grant IIS-0524612.
PageCount 15
ParticipantIDs springer_books_10_1007_11766155_11
PublicationCentury 2000
PublicationDate 2006
PublicationDateYYYYMMDD 2006-01-01
PublicationDate_xml – year: 2006
  text: 2006
PublicationDecade 2000
PublicationPlace Berlin, Heidelberg
PublicationPlace_xml – name: Berlin, Heidelberg
PublicationSeriesTitle Lecture Notes in Computer Science
PublicationSubtitle International Conference, ETRICS 2006, Freiburg, Germany, June 6-9, 2006. Proceedings
PublicationTitle Emerging Trends in Information and Communication Security
PublicationYear 2006
Publisher Springer Berlin Heidelberg
Publisher_xml – name: Springer Berlin Heidelberg
RelatedPersons Kleinberg, Jon M.
Mattern, Friedemann
Nierstrasz, Oscar
Tygar, Dough
Steffen, Bernhard
Kittler, Josef
Vardi, Moshe Y.
Weikum, Gerhard
Sudan, Madhu
Naor, Moni
Mitchell, John C.
Terzopoulos, Demetri
Pandu Rangan, C.
Kanade, Takeo
Hutchison, David
RelatedPersons_xml – sequence: 1
  givenname: David
  surname: Hutchison
  fullname: Hutchison, David
  organization: Lancaster University, UK
– sequence: 2
  givenname: Takeo
  surname: Kanade
  fullname: Kanade, Takeo
  organization: Carnegie Mellon University, Pittsburgh, USA
– sequence: 3
  givenname: Josef
  surname: Kittler
  fullname: Kittler, Josef
  organization: University of Surrey, Guildford, UK
– sequence: 4
  givenname: Jon M.
  surname: Kleinberg
  fullname: Kleinberg, Jon M.
  organization: Cornell University, Ithaca, USA
– sequence: 5
  givenname: Friedemann
  surname: Mattern
  fullname: Mattern, Friedemann
  organization: ETH Zurich, Switzerland
– sequence: 6
  givenname: John C.
  surname: Mitchell
  fullname: Mitchell, John C.
  organization: Stanford University, CA, USA
– sequence: 7
  givenname: Moni
  surname: Naor
  fullname: Naor, Moni
  organization: Weizmann Institute of Science, Rehovot, Israel
– sequence: 8
  givenname: Oscar
  surname: Nierstrasz
  fullname: Nierstrasz, Oscar
  organization: University of Bern, Switzerland
– sequence: 9
  givenname: C.
  surname: Pandu Rangan
  fullname: Pandu Rangan, C.
  organization: Indian Institute of Technology, Madras, India
– sequence: 10
  givenname: Bernhard
  surname: Steffen
  fullname: Steffen, Bernhard
  organization: University of Dortmund, Germany
– sequence: 11
  givenname: Madhu
  surname: Sudan
  fullname: Sudan, Madhu
  organization: Massachusetts Institute of Technology, MA, USA
– sequence: 12
  givenname: Demetri
  surname: Terzopoulos
  fullname: Terzopoulos, Demetri
  organization: University of California, Los Angeles, USA
– sequence: 13
  givenname: Dough
  surname: Tygar
  fullname: Tygar, Dough
  organization: University of California, Berkeley, USA
– sequence: 14
  givenname: Moshe Y.
  surname: Vardi
  fullname: Vardi, Moshe Y.
  organization: Rice University, Houston, USA
– sequence: 15
  givenname: Gerhard
  surname: Weikum
  fullname: Weikum, Gerhard
  organization: Max-Planck Institute of Computer Science, Saarbruecken, Germany
SSID ssj0000317418
ssj0002792
Score 1.4635993
Snippet Privacy-preserving decision tree mining is an important problem that has yet to be thoroughly understood. In fact, the privacy-preserving decision tree mining...
SourceID springer
SourceType Publisher
StartPage 145
SubjectTerms data mining
decision tree
matrix
perturbation
Privacy-preservation
Title Privacy-Preserving Decision Tree Mining Based on Random Substitutions
URI http://link.springer.com/10.1007/11766155_11
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1bSysxEA61IogP3s7BO-HgW9lD95K0PvigtiJF5SBe-laSbBYr2AW7VdQ_70wua2tFPL4sJdvtpvPtTiZf5psQsisEryuRhgFWwQ4SoerwzsVRkEqpRKRi3jTbdJ6d85OrpNNl3UrldVxdUsi_6uVTXclPUIU2wBVVsv-BbPmj0ACfAV84AsJw_BD8TtKslkdH4SRO9N_TWp22qPApxhPqD0etFyWH3sqfDLyd_r1v6o4MG3qbj25Hoj9FKt9os53E-GP276H_KNRzgKkc6HagPy23bQ92DJyGuaR2CKNliisTF9Cx_N44LJOlUPKFaDE93D91ixrneWFyxWp-3wnvhr7kKTxPWfuijJejoeKEJ-5Kp-wCrw3zHusItXXUHMsvxrbcqXO-oS1M6cbx0FYanxoibFZIiIUxIZbqoS58Bu5bJbMH7c7pdUnQgbfDyj7lsI6VFu2SlO2MEwqZzvK5kkOznXdKUBRpjt1parXdBDGXS2QBhS0UFSdgzmVS0YMVsujNS515V0l7GlPqMaWIKbWYUoMphUaLKZ3A9Be5Om5fHp0EbreN4A5r8gdZM4U_rOuKKQYxNERuWjKRScW1zpiWeAqidQXz_yYPNYtlJhLNIsnTTO2lUfybVAf5QK8RGomswRtaCZHUk1Q1ZBIppnXIVCMOMy7XyR9vhx6-P8OeL549ZqyN73xpk8y_P2tbpFo8jPQ2RImF3HF4vgGWhmQG
linkProvider Library Specific Holdings
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.title=Emerging+Trends+in+Information+and+Communication+Security&rft.au=Dowd%2C+Jim&rft.au=Xu%2C+Shouhuai&rft.au=Zhang%2C+Weining&rft.atitle=Privacy-Preserving+Decision+Tree+Mining+Based+on+Random+Substitutions&rft.series=Lecture+Notes+in+Computer+Science&rft.date=2006-01-01&rft.pub=Springer+Berlin+Heidelberg&rft.isbn=9783540346401&rft.issn=0302-9743&rft.eissn=1611-3349&rft.spage=145&rft.epage=159&rft_id=info:doi/10.1007%2F11766155_11
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0302-9743&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0302-9743&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0302-9743&client=summon