Skip to main content
Top

2018 | OriginalPaper | Chapter

6. Privacy-Accuracy Trade-Off in Distributed Data Mining

Authors : Lei Xu, Chunxiao Jiang, Yi Qian, Yong Ren

Published in: Data Privacy Games

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

An important issue in distributed data mining is privacy. It is necessary for each participant to make sure that its privacy is not disclosed to other participants or a third party. To protect privacy, one can apply a differential privacy approach to perturb the data before sharing them with others, which generally hurts the mining result. That is to say, the participant faces a trade-off between privacy and the mining result. In this chapter, we study a distributed classification scenario where a mediator builds a classifier based on the perturbed query results returned by a number of users. A game theoretical approach is proposed to analyze how users choose their privacy budgets. Specifically, interactions among users are modeled as a game in satisfaction form. And an algorithm is proposed for users to learn the satisfaction equilibrium (SE) of the game. Experimental results demonstrate that, when the differences among users’ expectations are not significant, the proposed learning algorithm can converge to an SE, at which every user achieves a balance between the accuracy of the classifier and the preserved privacy.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference B.-H. Park and H. Kargupta, “Distributed data mining: Algorithms, systems, and applications,” 2002, pp. 341–358. B.-H. Park and H. Kargupta, “Distributed data mining: Algorithms, systems, and applications,” 2002, pp. 341–358.
2.
go back to reference L. Xu, C. Jiang, J. Wang, J. Yuan, and Y. Ren, “Information security in big data: Privacy and data mining,” IEEE Access, vol. 2, pp. 1149–1176, 2014. L. Xu, C. Jiang, J. Wang, J. Yuan, and Y. Ren, “Information security in big data: Privacy and data mining,” IEEE Access, vol. 2, pp. 1149–1176, 2014.
3.
go back to reference R. N., S. K., and A. Arul, “Survey on privacy preserving data mining techniques using recent algorithms,” International Journal of Computer Science and Information Technolo, vol. 24, no. 9, pp. 1–7, 2017. R. N., S. K., and A. Arul, “Survey on privacy preserving data mining techniques using recent algorithms,” International Journal of Computer Science and Information Technolo, vol. 24, no. 9, pp. 1–7, 2017.
4.
go back to reference K. Liu, H. Kargupta, and J. Ryan, “Random projection-based multiplicative data perturbation for privacy preserving distributed data mining,” IEEE Transactions on Knowledge and Data Engineering, vol. 18, no. 1, pp. 92–106, Jan 2006.CrossRef K. Liu, H. Kargupta, and J. Ryan, “Random projection-based multiplicative data perturbation for privacy preserving distributed data mining,” IEEE Transactions on Knowledge and Data Engineering, vol. 18, no. 1, pp. 92–106, Jan 2006.CrossRef
5.
go back to reference M. Kantarcioglu and C. Clifton, “Privacy-preserving distributed mining of association rules on horizontally partitioned data,” IEEE Transactions on Knowledge and Data Engineering, vol. 16, no. 9, pp. 1026–1037, Sept 2004.CrossRef M. Kantarcioglu and C. Clifton, “Privacy-preserving distributed mining of association rules on horizontally partitioned data,” IEEE Transactions on Knowledge and Data Engineering, vol. 16, no. 9, pp. 1026–1037, Sept 2004.CrossRef
6.
go back to reference C. C. Aggarwal and P. S. Yu, “A general survey of privacy-preserving data mining models and algorithms,” Journal of Vascular Surgery, vol. 8, no. 1, p. 6470, 2008. C. C. Aggarwal and P. S. Yu, “A general survey of privacy-preserving data mining models and algorithms,” Journal of Vascular Surgery, vol. 8, no. 1, p. 6470, 2008.
7.
go back to reference R. Cramer, I. B. Damgrd, and J. B. Nielsen, Secure Multiparty Computation and Secret Sharing, 1st ed. New York, NY, USA: Cambridge University Press, 2015. R. Cramer, I. B. Damgrd, and J. B. Nielsen, Secure Multiparty Computation and Secret Sharing, 1st ed. New York, NY, USA: Cambridge University Press, 2015.
8.
go back to reference Y. Lindell and B. Pinkas, “Secure multiparty computation for privacy-preserving data mining,” Journal of Privacy and Confidentiality, vol. 25, no. 2, pp. 761–766, 2009. Y. Lindell and B. Pinkas, “Secure multiparty computation for privacy-preserving data mining,” Journal of Privacy and Confidentiality, vol. 25, no. 2, pp. 761–766, 2009.
9.
go back to reference N. R. Nanavati and D. C. Jinwala, “A novel privacypreserving scheme for collaborative frequent itemset mining across vertically partitioned data,” Security and Communication Networks, vol. 8, no. 18, pp. 4407–4420, 2015.CrossRef N. R. Nanavati and D. C. Jinwala, “A novel privacypreserving scheme for collaborative frequent itemset mining across vertically partitioned data,” Security and Communication Networks, vol. 8, no. 18, pp. 4407–4420, 2015.CrossRef
10.
go back to reference M. Sheikhalishahi and F. Martinelli, “Privacy-utility feature selection as a privacy mechanism in collaborative data classification,” in 2017 IEEE 26th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE), June 2017, pp. 244–249. M. Sheikhalishahi and F. Martinelli, “Privacy-utility feature selection as a privacy mechanism in collaborative data classification,” in 2017 IEEE 26th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE), June 2017, pp. 244–249.
11.
go back to reference C. Dwork, A. Roth et al., “The algorithmic foundations of differential privacy,” Foundations and Trends® in Theoretical Computer Science, vol. 9, no. 3–4, pp. 211–407, 2014.MathSciNetCrossRef C. Dwork, A. Roth et al., “The algorithmic foundations of differential privacy,” Foundations and Trends® in Theoretical Computer Science, vol. 9, no. 3–4, pp. 211–407, 2014.MathSciNetCrossRef
12.
go back to reference C. Dwork, “Differential privacy: A survey of results,” in International Conference on Theory and Applications of Models of Computation. Springer, 2008, pp. 1–19. C. Dwork, “Differential privacy: A survey of results,” in International Conference on Theory and Applications of Models of Computation. Springer, 2008, pp. 1–19.
13.
go back to reference R. Gibbons, A primer in game theory. Harvester Wheatsheaf Hertfordshire, 1992. R. Gibbons, A primer in game theory. Harvester Wheatsheaf Hertfordshire, 1992.
14.
go back to reference L. Xu, C. Jiang, J. Li, Y. Zhao, and Y. Ren, “Privacy preserving distributed classification: A satisfaction equilibrium approach,” in IEEE GLOBECOM 2017, Dec 2017, to appear. L. Xu, C. Jiang, J. Li, Y. Zhao, and Y. Ren, “Privacy preserving distributed classification: A satisfaction equilibrium approach,” in IEEE GLOBECOM 2017, Dec 2017, to appear.
15.
go back to reference S. Ross and B. Chaib-draa, “Satisfaction equilibrium: Achieving cooperation in incomplete information games,” in Advances in Artificial Intelligence. Springer, 2006, pp. 61–72.CrossRef S. Ross and B. Chaib-draa, “Satisfaction equilibrium: Achieving cooperation in incomplete information games,” in Advances in Artificial Intelligence. Springer, 2006, pp. 61–72.CrossRef
16.
go back to reference S. M. Perlaza, H. Tembine, S. Lasaulce, and M. Debbah, “Quality-of-service provisioning in decentralized networks: A satisfaction equilibrium approach,” Selected Topics in Signal Processing, IEEE Journal of, vol. 6, no. 2, pp. 104–116, 2012.CrossRef S. M. Perlaza, H. Tembine, S. Lasaulce, and M. Debbah, “Quality-of-service provisioning in decentralized networks: A satisfaction equilibrium approach,” Selected Topics in Signal Processing, IEEE Journal of, vol. 6, no. 2, pp. 104–116, 2012.CrossRef
17.
go back to reference J. Marden, H. Young, and L. Pao, “Achieving pareto optimality through distributed learning,” in Decision and Control (CDC), 2012 IEEE 51st Annual Conference on, Dec 2012, pp. 7419–7424. J. Marden, H. Young, and L. Pao, “Achieving pareto optimality through distributed learning,” in Decision and Control (CDC), 2012 IEEE 51st Annual Conference on, Dec 2012, pp. 7419–7424.
18.
go back to reference H. Kargupta, K. Das, and K. Liu, Multi-party, Privacy-Preserving Distributed Data Mining Using a Game Theoretic Framework. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007, pp. 523–531. H. Kargupta, K. Das, and K. Liu, Multi-party, Privacy-Preserving Distributed Data Mining Using a Game Theoretic Framework. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007, pp. 523–531.
19.
go back to reference A. Miyaji and M. S. Rahman, Privacy-Preserving Data Mining: A Game-Theoretic Approach. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011, pp. 186–200. A. Miyaji and M. S. Rahman, Privacy-Preserving Data Mining: A Game-Theoretic Approach. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011, pp. 186–200.
20.
go back to reference X. Ge, L. Yan, J. Zhu, and W. Shi, “Privacy-preserving distributed association rule mining based on the secret sharing technique,” in Software Engineering and Data Mining (SEDM), 2010 2nd International Conference on. IEEE, 2010, pp. 345–350. X. Ge, L. Yan, J. Zhu, and W. Shi, “Privacy-preserving distributed association rule mining based on the secret sharing technique,” in Software Engineering and Data Mining (SEDM), 2010 2nd International Conference on. IEEE, 2010, pp. 345–350.
21.
go back to reference N. R. Nanavati and D. C. Jinwala, “A novel privacy preserving game theoretic repeated rational secret sharing scheme for distributed data mining,” dcj, vol. 91, p. 9426611777, 2013. N. R. Nanavati and D. C. Jinwala, “A novel privacy preserving game theoretic repeated rational secret sharing scheme for distributed data mining,” dcj, vol. 91, p. 9426611777, 2013.
22.
go back to reference L. Xu, C. Jiang, J. Wang, Y. Ren, J. Yuan, and M. Guizani, “Game theoretic data privacy preservation: Equilibrium and pricing,” in 2015 IEEE International Conference on Communications (ICC), June 2015, pp. 7071–7076. L. Xu, C. Jiang, J. Wang, Y. Ren, J. Yuan, and M. Guizani, “Game theoretic data privacy preservation: Equilibrium and pricing,” in 2015 IEEE International Conference on Communications (ICC), June 2015, pp. 7071–7076.
23.
go back to reference D. C. Parkes, “Iterative combinatorial auctions: Achieving economic and computational efficiency,” Ph.D. dissertation, University of Pennsylvania, 2001. D. C. Parkes, “Iterative combinatorial auctions: Achieving economic and computational efficiency,” Ph.D. dissertation, University of Pennsylvania, 2001.
24.
go back to reference R. Nix and M. Kantarciouglu, “Incentive compatible privacy-preserving distributed classification,” IEEE Transactions on Dependable and Secure Computing, vol. 9, no. 4, pp. 451–462, 2012.CrossRef R. Nix and M. Kantarciouglu, “Incentive compatible privacy-preserving distributed classification,” IEEE Transactions on Dependable and Secure Computing, vol. 9, no. 4, pp. 451–462, 2012.CrossRef
25.
go back to reference A. Panoui, S. Lambotharan, and R. C.-W. Phan, “Vickrey-clarke-groves for privacy-preserving collaborative classification,” in Computer Science and Information Systems (FedCSIS), 2013 Federated Conference on. IEEE, 2013, pp. 123–128. A. Panoui, S. Lambotharan, and R. C.-W. Phan, “Vickrey-clarke-groves for privacy-preserving collaborative classification,” in Computer Science and Information Systems (FedCSIS), 2013 Federated Conference on. IEEE, 2013, pp. 123–128.
26.
go back to reference T. M. Mitchell, Machine Learning, 1st ed. New York, NY, USA: McGraw-Hill, Inc., 1997. T. M. Mitchell, Machine Learning, 1st ed. New York, NY, USA: McGraw-Hill, Inc., 1997.
27.
go back to reference S. Ross and B. Chaib-draa, “Learning to play a satisfaction equilibrium,” in Workshop on Evolutionary Models of Collaboration, 2007. S. Ross and B. Chaib-draa, “Learning to play a satisfaction equilibrium,” in Workshop on Evolutionary Models of Collaboration, 2007.
28.
go back to reference R. Southwell, X. Chen, and J. Huang, “Quality of service games for spectrum sharing,” IEEE Journal on Selected Areas in Communications, vol. 32, no. 3, pp. 589–600, March 2014.CrossRef R. Southwell, X. Chen, and J. Huang, “Quality of service games for spectrum sharing,” IEEE Journal on Selected Areas in Communications, vol. 32, no. 3, pp. 589–600, March 2014.CrossRef
29.
go back to reference Y. Sun, Y. Zhu, Z. Feng, and J. Yu, “Sensing processes participation game of smartphones in participatory sensing systems,” in 2014 Eleventh Annual IEEE International Conference on Sensing, Communication, and Networking (SECON), June 2014, pp. 239–247. Y. Sun, Y. Zhu, Z. Feng, and J. Yu, “Sensing processes participation game of smartphones in participatory sensing systems,” in 2014 Eleventh Annual IEEE International Conference on Sensing, Communication, and Networking (SECON), June 2014, pp. 239–247.
30.
go back to reference L. Xu, C. Jiang, Y. Chen, Y. Ren, and K. J. R. Liu, “User participation game in collaborative filtering,” in 2014 IEEE Global Conference on Signal and Information Processing (GlobalSIP), Dec 2014, pp. 263–267. L. Xu, C. Jiang, Y. Chen, Y. Ren, and K. J. R. Liu, “User participation game in collaborative filtering,” in 2014 IEEE Global Conference on Signal and Information Processing (GlobalSIP), Dec 2014, pp. 263–267.
Metadata
Title
Privacy-Accuracy Trade-Off in Distributed Data Mining
Authors
Lei Xu
Chunxiao Jiang
Yi Qian
Yong Ren
Copyright Year
2018
DOI
https://doi.org/10.1007/978-3-319-77965-2_6

Premium Partner