Privacy-Preserving Decision Tree Solution in the 2-Part Fully Distributed Setting

Authors

  • Vu Thi Van
  • Luong The Dung
  • Hoang Van Quan
  • Tran Thi Luong
  • Hoang Duc Tho

DOI:

https://doi.org/10.54654/isj.v1i15.848

Keywords:

Privacy-Preserving Data Mining, ID3, Decision tree, Elliptic curve

Tóm tắt

Abstract Data mining has emerged as an
important technology for obtaining knowledge
from big data. However, there are growing
concerns that the use of this technology is infringing
on privacy. This work proposes a decision tree
mining solution according to the ID3 algorithm that
ensures privacy in the 2-Part Fully Distributed
setting.
Tóm tắt Khai phá dữ liệu đã nổi lên như một công
nghệ quan trọng để thu thập kiến thức từ lượng dữ
liệu khổng lồ. Tuy nhiên, ngày càng có nhiều lo ngại
rằng việc sử dụng công nghệ này đang vi phạm
quyền riêng tư của cá nhân. Bài báo này đề xuất giải
pháp khai phá cây quyết định theo thuật toán ID3
có đảm bảo tính riêng tư trong mô hình phân tán
đầy đủ hai bên.

Downloads

Download data is not yet available.

References

Agrawal R., Srikant R, "Privacy-Preserving Data

Mining," in The ACM SIGMOD Conference, 2000.

Vassilios S. Verykios, Elisa Bertino, Igor Nai

Fovino, Loredana Parasiliti Provenza, Yucel

Saygin, Yannis Theodoridis, "State-of-the-art in

Privacy Preserving Data Mining," SIGMOD Rec.,

vol. 33, no. 1, 2004.

S. Mehnaz, and G. Bellala and E. Bertino, "A secure

sum protocol and its application to privacypreserving multi-party analytics," in Proc. of the

nd ACM on Symposium on Access Control

Models and Technologies, 2017.

Supriya, "A Survey on Privacy Preserving Data

Mining Techniques," International Journal of

Emerging Technology and Advanced Engineering,

pp. 119-122, 2015.

R. Mendes and J. P. Vilela, "Privacy-preserving data

mining: methods," in IEEE Access, 2017.

The Dung Luong, Tu Bao Ho, "Privacy Preserving

Frequency Mining in 2-Part Fully Distributed,"

IEICE Transactions on Information and Systems, pp.

-2708, 2010.

Y. Lindell and B. Pinkas, "Privacy preserving data

mining," in Annual International Cryptology

Conference, 2000.

"Privacy preserving ID3 algorithm over horizontally

partitioned data," in Parallel and Distributed

Computing, Applications and Technologies, 2005.

PDCAT 2005. Sixth International Conference on,

Saeed Samet and Ali Miri, "Privacy preserving ID3

using Gini index over horizontally partitioned data,"

in Computer Systems and Applications, 2008.

AICCSA 2008. IEEE/ACS International Conference

on, 2008.

de Hoogh S., Schoenmakers B., Chen P., op den

Akker H., " Practical Secure Decision Tree Learning

in a Teletreatment Application," in Financial

Cryptography and Data Security. FC 2014. Lecture

Notes in Computer Science, vol 8437, Springer,

Berlin, Heidelberg, 2014.

Ye Li, Xuan Wang, Zoe L. Jiang, S.M. Yiu,

"Outsourcing privacy-preserving ID3 decision tree

over horizontally partitioned data for multiple

parties," International Journal of High Performance

Computing and Networking (IJHPCN), vol. 12, no.

,

pp. 207-215, 2018.

Ye Li, Zoe L. Jiang , Xuan Wang , Junbin Fang, En

Zhang , and Xianmin Wang, "Securely Outsourcing

ID3 Decision Tree in Cloud Computing," Wireless

Communications and Mobile Computing, vol. 2018,

pp. Article ID 2385150, 10 pages, 2018.

Stacey Truex, Nathalie Baracaldo, Ali Anwar,

Thomas Steinke. Heiko Ludwig and Rui Zhang, "A

Hybrid Approach to Privacy-Preserving Federated

Learning," CoRR, vol. abs/1812.03224, p. 11

pages, 2018.

Bart Kuijpers, Vanessa Lemmens, Bart Moelans

and Karl Tuyls, "Privacy Preserving ID3 over

Horizontally, Vertically and Grid Partitioned Data,"

CoRR, vol. abs/0803.1555, 2008.

Kamini D. Tandel and Jignasa N. Patel, "Privacy

Preserving Decision Tree Classification on

Horizontal Partition Data," in International Journal

of Engineering Research & Technology (IJERT),

Justin Zhan, Stan Matwin, and LiWu Chang,

"Privacy-Preserving Decision Tree Classification,"

in Proceedings of the Fifth International Conference

on Electronic Business, 2005, pp. 470 - 476.

Vaidya, Jaideep and Clifton, Chris and

Kantarcioglu, Murat and Patterson, A. Scott,

"Privacy-Preserving Decision Trees over Vertically

Partitioned Data," ACM Trans. Knowl. Discov.

Data, vol. 2, no. 3, p. 1–27, 2008.

Fang, Weiwei and Yang, Bingru, "Privacy

Preserving Decision Tree Learning over Vertically

Partitioned Data," in 2008 International Conference

on Computer Science and Software Engineering,

, pp. 1049-1052.

Shuguo HAN, and Wee Keong NG, "Multi-Party

Privacy-Preserving Decision Trees for Arbitrarily

Partitioned Data," INTERNATIONAL JOURNAL

OF INTELLIGENT CONTROL AND SYSTEMS,

vol. 2, no. 4, pp. 351-358, 2007.

Thi Van Vu, The Dung Luong, Van Quan Hoang,

"An Elliptic Curve-based Protocol for Privacy

Preserving Frequency Computation in 2-Part Fully

Distributed Setting," in 12th International

Conference on Knowledge and Systems

Engineering (KSE), Can Tho, 2020.

Christof Paar and Jan Pelzl, Understanding

Cryptography, Springer, Berlin, Heidelberg, 2010.

Canetti, Ran, "Decisional Diffie-Hellman

Assumption," in Encyclopedia of Cryptography

and Security, Boston, MA, Springer US, 2005, pp.

-142.

Steven D. Galbraith, Ping Wang and Fangguo

Zhang, "Computing Elliptic Curve Discrete

Logarithms with Improved," Cryptology ePrint

Archive, 2015.

Siraj, Maheyzah Md and Rahmat, Nurul Adibah

and Din, Mazura Mat, "A Survey on Privacy

Preserving Data Mining Approaches and

Techniques," in Proceedings of the 2019 8th

International Conference on Software and Computer

Applications, New York, NY, USA, Association for

Computing Machinery, 2019, p. 65–69.

Chris Clifton, Murat Kantarcioglu,Jaideep Vaidya,

Xiaodong Lin, Michael Y. Zhu, "Tools for Privacy

Preserving Distributed Data Mining," SIGKDD

Explorations, vol. 4, no. 2, pp. 1-5, 2002.

Babak Siabi, Mehdi Berenjkoub, Willy Susilo,

"Optimally Efficient Secure Scalar Product With

Applications in Cloud Computing," IEEE Access,

vol. 7, no. 1, pp. 42798 - 42815, 29 3 2019.

C. Dong, L. Chen, "A Fast Secure Dot Product

Protocol with Application to Privacy Preserving

Association Rule Mining," in Proc. of Pacific-Asia

Conference on Knowledge Discovery and Data

Mining, 2014.

Y. Zhu,T. Takagi, "Efficient scalar product protocol

and its privacypreserving application," in

International J. of Electronic Security and Digital

Forensics, Vol. 7, No. 1, 2015.

Goethals, Bart and Laur, Sven and Lipmaa, Helger

and Mielikainen, Taneli, "On private scalar product

computation for privacy-preserving data mining," in

Proc. of International Conference on Information

Security and Cryptology, 2004.

V.Duy-Hien, L.The-Dung, H.Tu-Bao, "An Efficient

Approach for Secure Multiparty Computation

without Authenticated Channel," in Information

Science, 2019

Downloads

Abstract views: 0 / PDF downloads: 0

Published

2022-06-08

How to Cite

Van, V. T. ., Dung, L. T., Quan, H. V., Luong, T. T., & Tho, H. D. (2022). Privacy-Preserving Decision Tree Solution in the 2-Part Fully Distributed Setting. Journal of Science and Technology on Information Security, 1(15), 92-101. https://doi.org/10.54654/isj.v1i15.848

Issue

Section

Papers