Privacy Preserving Naive Bayes Classification

  • Peng Zhang
  • Yunhai Tong
  • Shiwei Tang
  • Dongqing Yang
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3584)

Abstract

Privacy preserving data mining is to discover accurate patterns without precise access to the original data. In this paper, we combine the two strategies of data transform and data hiding to propose a new randomization method, Randomized Response with Partial Hiding (RRPH), for distorting the original data. Then, an effective naive Bayes classifier is presented to predict the class labels for unknown samples according to the distorted data by RRPH. Shown in the analytical and experimental results, our method can obtain significant improvements in terms of privacy, accuracy, and applicability.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Verykios, V.S., Bertino, E., Fovino, I.N., Provenza, L.P., Saygin, Y., Theodoridis, Y.: State-of-the-art in Privacy Preserving Data Mining. SIGMOD Record 33(1) (2004)Google Scholar
  2. 2.
    Agrawal, R., Srikant, R.: Privacy-Preserving Data Mining. In: Proceedings of the ACM SIGMOD Conference on Management of Data (2000)Google Scholar
  3. 3.
    Agrawal, D., Aggarwal, C.C.: On the Design and Quantification of Privacy Preserving Data Mining Algorithms. In: Proceedings of the 20th ACM Symposium on PODS (2001)Google Scholar
  4. 4.
    Du, W., Zhan, Z.: Using Randomized Response Techniques for Privacy-Preserving Data Mining. In: Proceedings of the 9th ACM SIGKDD International Conference on KDD (2003)Google Scholar
  5. 5.
    Johnsten, T., Raghavan, V.V.: A Methodology for Hiding Knowledge in Databases. In: Proceedings of the IEEE ICDM Workshop on Privacy, Security and Data Mining (2002)Google Scholar
  6. 6.
    Clifton, C.: Using Sample Size to Limit Exposure to Data Mining. Journal of Computer Security 8(4) (2000)Google Scholar
  7. 7.
    Du, W., Zhan, Z.: Building Decision Tree Classifier on Private Data. In: Proceedings of the IEEE ICDM Workshop on Privacy, Security and Data Mining (2002)Google Scholar
  8. 8.
    Pinkas, B.: Cryptographic Techniques for Privacy-Preserving Data Mining. SIGKDD Explorations 4(2) (2002)Google Scholar
  9. 9.
    Kantarcoglu, M., Vaidya, J.: Privacy Preserving Naive Bayes Classifier for Horizontally Pertitioned Data. In: IEEE ICDM Workshop on Privacy Preserving Data Mining (2003)Google Scholar
  10. 10.
    Vaidya, J., Clifton, C.: Privacy Preserving Naive Bayes Classifier for Vertically Partitioned Data. In: Proceedings of the 4th SIAM International Conference on DM (2004)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Peng Zhang
    • 1
    • 2
  • Yunhai Tong
    • 1
    • 2
  • Shiwei Tang
    • 1
    • 2
  • Dongqing Yang
    • 1
    • 2
  1. 1.School of EECSPeking UniversityBeijingChina
  2. 2.National Lab on Machine PerceptionPeking UniversityBeijingChina

Personalised recommendations