Skip to main content

2018 | OriginalPaper | Buchkapitel

6. Privacy-Accuracy Trade-Off in Distributed Data Mining

verfasst von : Lei Xu, Chunxiao Jiang, Yi Qian, Yong Ren

Erschienen in: Data Privacy Games

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

An important issue in distributed data mining is privacy. It is necessary for each participant to make sure that its privacy is not disclosed to other participants or a third party. To protect privacy, one can apply a differential privacy approach to perturb the data before sharing them with others, which generally hurts the mining result. That is to say, the participant faces a trade-off between privacy and the mining result. In this chapter, we study a distributed classification scenario where a mediator builds a classifier based on the perturbed query results returned by a number of users. A game theoretical approach is proposed to analyze how users choose their privacy budgets. Specifically, interactions among users are modeled as a game in satisfaction form. And an algorithm is proposed for users to learn the satisfaction equilibrium (SE) of the game. Experimental results demonstrate that, when the differences among users’ expectations are not significant, the proposed learning algorithm can converge to an SE, at which every user achieves a balance between the accuracy of the classifier and the preserved privacy.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat B.-H. Park and H. Kargupta, “Distributed data mining: Algorithms, systems, and applications,” 2002, pp. 341–358. B.-H. Park and H. Kargupta, “Distributed data mining: Algorithms, systems, and applications,” 2002, pp. 341–358.
2.
Zurück zum Zitat L. Xu, C. Jiang, J. Wang, J. Yuan, and Y. Ren, “Information security in big data: Privacy and data mining,” IEEE Access, vol. 2, pp. 1149–1176, 2014. L. Xu, C. Jiang, J. Wang, J. Yuan, and Y. Ren, “Information security in big data: Privacy and data mining,” IEEE Access, vol. 2, pp. 1149–1176, 2014.
3.
Zurück zum Zitat R. N., S. K., and A. Arul, “Survey on privacy preserving data mining techniques using recent algorithms,” International Journal of Computer Science and Information Technolo, vol. 24, no. 9, pp. 1–7, 2017. R. N., S. K., and A. Arul, “Survey on privacy preserving data mining techniques using recent algorithms,” International Journal of Computer Science and Information Technolo, vol. 24, no. 9, pp. 1–7, 2017.
4.
Zurück zum Zitat K. Liu, H. Kargupta, and J. Ryan, “Random projection-based multiplicative data perturbation for privacy preserving distributed data mining,” IEEE Transactions on Knowledge and Data Engineering, vol. 18, no. 1, pp. 92–106, Jan 2006.CrossRef K. Liu, H. Kargupta, and J. Ryan, “Random projection-based multiplicative data perturbation for privacy preserving distributed data mining,” IEEE Transactions on Knowledge and Data Engineering, vol. 18, no. 1, pp. 92–106, Jan 2006.CrossRef
5.
Zurück zum Zitat M. Kantarcioglu and C. Clifton, “Privacy-preserving distributed mining of association rules on horizontally partitioned data,” IEEE Transactions on Knowledge and Data Engineering, vol. 16, no. 9, pp. 1026–1037, Sept 2004.CrossRef M. Kantarcioglu and C. Clifton, “Privacy-preserving distributed mining of association rules on horizontally partitioned data,” IEEE Transactions on Knowledge and Data Engineering, vol. 16, no. 9, pp. 1026–1037, Sept 2004.CrossRef
6.
Zurück zum Zitat C. C. Aggarwal and P. S. Yu, “A general survey of privacy-preserving data mining models and algorithms,” Journal of Vascular Surgery, vol. 8, no. 1, p. 6470, 2008. C. C. Aggarwal and P. S. Yu, “A general survey of privacy-preserving data mining models and algorithms,” Journal of Vascular Surgery, vol. 8, no. 1, p. 6470, 2008.
7.
Zurück zum Zitat R. Cramer, I. B. Damgrd, and J. B. Nielsen, Secure Multiparty Computation and Secret Sharing, 1st ed. New York, NY, USA: Cambridge University Press, 2015. R. Cramer, I. B. Damgrd, and J. B. Nielsen, Secure Multiparty Computation and Secret Sharing, 1st ed. New York, NY, USA: Cambridge University Press, 2015.
8.
Zurück zum Zitat Y. Lindell and B. Pinkas, “Secure multiparty computation for privacy-preserving data mining,” Journal of Privacy and Confidentiality, vol. 25, no. 2, pp. 761–766, 2009. Y. Lindell and B. Pinkas, “Secure multiparty computation for privacy-preserving data mining,” Journal of Privacy and Confidentiality, vol. 25, no. 2, pp. 761–766, 2009.
9.
Zurück zum Zitat N. R. Nanavati and D. C. Jinwala, “A novel privacypreserving scheme for collaborative frequent itemset mining across vertically partitioned data,” Security and Communication Networks, vol. 8, no. 18, pp. 4407–4420, 2015.CrossRef N. R. Nanavati and D. C. Jinwala, “A novel privacypreserving scheme for collaborative frequent itemset mining across vertically partitioned data,” Security and Communication Networks, vol. 8, no. 18, pp. 4407–4420, 2015.CrossRef
10.
Zurück zum Zitat M. Sheikhalishahi and F. Martinelli, “Privacy-utility feature selection as a privacy mechanism in collaborative data classification,” in 2017 IEEE 26th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE), June 2017, pp. 244–249. M. Sheikhalishahi and F. Martinelli, “Privacy-utility feature selection as a privacy mechanism in collaborative data classification,” in 2017 IEEE 26th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE), June 2017, pp. 244–249.
11.
Zurück zum Zitat C. Dwork, A. Roth et al., “The algorithmic foundations of differential privacy,” Foundations and Trends® in Theoretical Computer Science, vol. 9, no. 3–4, pp. 211–407, 2014.MathSciNetCrossRef C. Dwork, A. Roth et al., “The algorithmic foundations of differential privacy,” Foundations and Trends® in Theoretical Computer Science, vol. 9, no. 3–4, pp. 211–407, 2014.MathSciNetCrossRef
12.
Zurück zum Zitat C. Dwork, “Differential privacy: A survey of results,” in International Conference on Theory and Applications of Models of Computation. Springer, 2008, pp. 1–19. C. Dwork, “Differential privacy: A survey of results,” in International Conference on Theory and Applications of Models of Computation. Springer, 2008, pp. 1–19.
13.
Zurück zum Zitat R. Gibbons, A primer in game theory. Harvester Wheatsheaf Hertfordshire, 1992. R. Gibbons, A primer in game theory. Harvester Wheatsheaf Hertfordshire, 1992.
14.
Zurück zum Zitat L. Xu, C. Jiang, J. Li, Y. Zhao, and Y. Ren, “Privacy preserving distributed classification: A satisfaction equilibrium approach,” in IEEE GLOBECOM 2017, Dec 2017, to appear. L. Xu, C. Jiang, J. Li, Y. Zhao, and Y. Ren, “Privacy preserving distributed classification: A satisfaction equilibrium approach,” in IEEE GLOBECOM 2017, Dec 2017, to appear.
15.
Zurück zum Zitat S. Ross and B. Chaib-draa, “Satisfaction equilibrium: Achieving cooperation in incomplete information games,” in Advances in Artificial Intelligence. Springer, 2006, pp. 61–72.CrossRef S. Ross and B. Chaib-draa, “Satisfaction equilibrium: Achieving cooperation in incomplete information games,” in Advances in Artificial Intelligence. Springer, 2006, pp. 61–72.CrossRef
16.
Zurück zum Zitat S. M. Perlaza, H. Tembine, S. Lasaulce, and M. Debbah, “Quality-of-service provisioning in decentralized networks: A satisfaction equilibrium approach,” Selected Topics in Signal Processing, IEEE Journal of, vol. 6, no. 2, pp. 104–116, 2012.CrossRef S. M. Perlaza, H. Tembine, S. Lasaulce, and M. Debbah, “Quality-of-service provisioning in decentralized networks: A satisfaction equilibrium approach,” Selected Topics in Signal Processing, IEEE Journal of, vol. 6, no. 2, pp. 104–116, 2012.CrossRef
17.
Zurück zum Zitat J. Marden, H. Young, and L. Pao, “Achieving pareto optimality through distributed learning,” in Decision and Control (CDC), 2012 IEEE 51st Annual Conference on, Dec 2012, pp. 7419–7424. J. Marden, H. Young, and L. Pao, “Achieving pareto optimality through distributed learning,” in Decision and Control (CDC), 2012 IEEE 51st Annual Conference on, Dec 2012, pp. 7419–7424.
18.
Zurück zum Zitat H. Kargupta, K. Das, and K. Liu, Multi-party, Privacy-Preserving Distributed Data Mining Using a Game Theoretic Framework. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007, pp. 523–531. H. Kargupta, K. Das, and K. Liu, Multi-party, Privacy-Preserving Distributed Data Mining Using a Game Theoretic Framework. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007, pp. 523–531.
19.
Zurück zum Zitat A. Miyaji and M. S. Rahman, Privacy-Preserving Data Mining: A Game-Theoretic Approach. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011, pp. 186–200. A. Miyaji and M. S. Rahman, Privacy-Preserving Data Mining: A Game-Theoretic Approach. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011, pp. 186–200.
20.
Zurück zum Zitat X. Ge, L. Yan, J. Zhu, and W. Shi, “Privacy-preserving distributed association rule mining based on the secret sharing technique,” in Software Engineering and Data Mining (SEDM), 2010 2nd International Conference on. IEEE, 2010, pp. 345–350. X. Ge, L. Yan, J. Zhu, and W. Shi, “Privacy-preserving distributed association rule mining based on the secret sharing technique,” in Software Engineering and Data Mining (SEDM), 2010 2nd International Conference on. IEEE, 2010, pp. 345–350.
21.
Zurück zum Zitat N. R. Nanavati and D. C. Jinwala, “A novel privacy preserving game theoretic repeated rational secret sharing scheme for distributed data mining,” dcj, vol. 91, p. 9426611777, 2013. N. R. Nanavati and D. C. Jinwala, “A novel privacy preserving game theoretic repeated rational secret sharing scheme for distributed data mining,” dcj, vol. 91, p. 9426611777, 2013.
22.
Zurück zum Zitat L. Xu, C. Jiang, J. Wang, Y. Ren, J. Yuan, and M. Guizani, “Game theoretic data privacy preservation: Equilibrium and pricing,” in 2015 IEEE International Conference on Communications (ICC), June 2015, pp. 7071–7076. L. Xu, C. Jiang, J. Wang, Y. Ren, J. Yuan, and M. Guizani, “Game theoretic data privacy preservation: Equilibrium and pricing,” in 2015 IEEE International Conference on Communications (ICC), June 2015, pp. 7071–7076.
23.
Zurück zum Zitat D. C. Parkes, “Iterative combinatorial auctions: Achieving economic and computational efficiency,” Ph.D. dissertation, University of Pennsylvania, 2001. D. C. Parkes, “Iterative combinatorial auctions: Achieving economic and computational efficiency,” Ph.D. dissertation, University of Pennsylvania, 2001.
24.
Zurück zum Zitat R. Nix and M. Kantarciouglu, “Incentive compatible privacy-preserving distributed classification,” IEEE Transactions on Dependable and Secure Computing, vol. 9, no. 4, pp. 451–462, 2012.CrossRef R. Nix and M. Kantarciouglu, “Incentive compatible privacy-preserving distributed classification,” IEEE Transactions on Dependable and Secure Computing, vol. 9, no. 4, pp. 451–462, 2012.CrossRef
25.
Zurück zum Zitat A. Panoui, S. Lambotharan, and R. C.-W. Phan, “Vickrey-clarke-groves for privacy-preserving collaborative classification,” in Computer Science and Information Systems (FedCSIS), 2013 Federated Conference on. IEEE, 2013, pp. 123–128. A. Panoui, S. Lambotharan, and R. C.-W. Phan, “Vickrey-clarke-groves for privacy-preserving collaborative classification,” in Computer Science and Information Systems (FedCSIS), 2013 Federated Conference on. IEEE, 2013, pp. 123–128.
26.
Zurück zum Zitat T. M. Mitchell, Machine Learning, 1st ed. New York, NY, USA: McGraw-Hill, Inc., 1997. T. M. Mitchell, Machine Learning, 1st ed. New York, NY, USA: McGraw-Hill, Inc., 1997.
27.
Zurück zum Zitat S. Ross and B. Chaib-draa, “Learning to play a satisfaction equilibrium,” in Workshop on Evolutionary Models of Collaboration, 2007. S. Ross and B. Chaib-draa, “Learning to play a satisfaction equilibrium,” in Workshop on Evolutionary Models of Collaboration, 2007.
28.
Zurück zum Zitat R. Southwell, X. Chen, and J. Huang, “Quality of service games for spectrum sharing,” IEEE Journal on Selected Areas in Communications, vol. 32, no. 3, pp. 589–600, March 2014.CrossRef R. Southwell, X. Chen, and J. Huang, “Quality of service games for spectrum sharing,” IEEE Journal on Selected Areas in Communications, vol. 32, no. 3, pp. 589–600, March 2014.CrossRef
29.
Zurück zum Zitat Y. Sun, Y. Zhu, Z. Feng, and J. Yu, “Sensing processes participation game of smartphones in participatory sensing systems,” in 2014 Eleventh Annual IEEE International Conference on Sensing, Communication, and Networking (SECON), June 2014, pp. 239–247. Y. Sun, Y. Zhu, Z. Feng, and J. Yu, “Sensing processes participation game of smartphones in participatory sensing systems,” in 2014 Eleventh Annual IEEE International Conference on Sensing, Communication, and Networking (SECON), June 2014, pp. 239–247.
30.
Zurück zum Zitat L. Xu, C. Jiang, Y. Chen, Y. Ren, and K. J. R. Liu, “User participation game in collaborative filtering,” in 2014 IEEE Global Conference on Signal and Information Processing (GlobalSIP), Dec 2014, pp. 263–267. L. Xu, C. Jiang, Y. Chen, Y. Ren, and K. J. R. Liu, “User participation game in collaborative filtering,” in 2014 IEEE Global Conference on Signal and Information Processing (GlobalSIP), Dec 2014, pp. 263–267.
Metadaten
Titel
Privacy-Accuracy Trade-Off in Distributed Data Mining
verfasst von
Lei Xu
Chunxiao Jiang
Yi Qian
Yong Ren
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-77965-2_6

Premium Partner