Skip to main content

Enhancing the Efficiency in Privacy Preserving Learning of Decision Trees in Partitioned Databases

  • Conference paper
Privacy in Statistical Databases (PSD 2012)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 7556))

Included in the following conference series:

Abstract

This paper considers a scenario where two parties having private databases wish to cooperate by computing a data mining algorithm on the union of their databases without revealing any unnecessary information. In particular, they want to apply the decision tree learning algorithm ID3 in a privacy preserving manner. Lindell and Pinkas (2002) have presented a protocol for this purpose, which enjoys a formal proof of privacy and is considerably more efficient than generic solutions. The crucial point of their protocol is the approximation of the logarithm function by a truncated Taylor series. The present paper improves this approximation by using a suitable Chebyshev expansion. This approach results in a considerably more efficient new version of the protocol.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Algesheimer, J., Camenisch, J.L., Shoup, V.: Efficient Computation Modulo a Shared Secret with Application to the Generation of Shared Safe-Prime Products. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 417–432. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  2. Bulirsch, R., Stoer, J.: Darstellung von Funktionen in Rechenautomaten. In: Sauer, R., Szabó, I. (eds.) Mathematische Hilfsmittel des Ingenieurs. Grundlehren der mathematischen Wissenschaften, vol. 141, pp. 352–446. Springer, Berlin (1968)

    Chapter  Google Scholar 

  3. Catalano, D.: Efficient distributed computation modulo a shared secret. In: Catalano, D., Cramer, R., Damgård, I., Di Crescenco, G., Pointcheval, D., Takagi, T. (eds.) Contemporary Cryptology. Advanced Courses in Mathematics, CRM Barcelona, pp. 1–39. Birkhäuser, Basel (2005)

    Google Scholar 

  4. Du, W., Zhan, Z.: Bulding decision tree classifier on private data. In: Proceedings of the IEEE International Conference on Data Mining (ICDM), Workshop on Privacy, Security and Data Mining, Maebashi City, Japan (2002)

    Google Scholar 

  5. Gennaro, R., Rabin, M.O., Rabin, T.: Simplified VSS and fast-track multiparty computations with applications to threshold cryptography. In: Coan, B., Afek, Y. (eds.) Proceedings of the 17th ACM Symposium on Principles of Distributed Computing (PODC 1998), pp. 101–111. ACM Press (1998)

    Google Scholar 

  6. Kiltz, E., Leander, G., Malone-Lee, J.: Secure Computation of the Mean and Related Statistics. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 283–302. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  7. Koschuch, M., Hudler, M., Krüger, M., Lory, P., Wenzl, J.: Optimizing cryptographic threshold schemes for the use in wireless sensor networks. In: Obaidat, M.S., Sevillano, J.L., Ortega, E.C. (eds.) Proceedings of DCNET 2011 – International Conference on Data Communication Networking, Seville, Spain, pp. 75–78 (2011)

    Google Scholar 

  8. Lindell, Y., Pinkas, B.: Privacy preserving data mining. Journal of Cryptology 15, 177–206 (2002)

    Article  MathSciNet  MATH  Google Scholar 

  9. Lindell, Y., Pinkas, B.: Secure multiparty computation for privacy-preserving data mining. Journal of Privacy and Confidentiality 1(1), 59–98 (2009)

    Google Scholar 

  10. Lory, P.: Reducing the complexity in the distributed multiplication protocol of two polynomially shared values. In: Proceedings of the 3rd IEEE International Symposium on Security in Networks and Distributed Systems (SSNDS 207), vol. 1 of AINA 2007, pp. 404–408. IEEE Computer Society (2007)

    Google Scholar 

  11. Mason, J.C., Handscomb, D.C.: Chebyshev Polynomials. Chapman & Hall/CRC, Boca Raton (2003)

    MATH  Google Scholar 

  12. Mitchell, T.M.: Machine Learning. McGraw-Hill, New York (1997)

    MATH  Google Scholar 

  13. Naor, M., Pinkas, B.: Oblivious transfer and polynomial evaluation. In: Vitter, J.S., Larmore, L., Leighton, T. (eds.) Proceedings of the 31st ACM Symposium on Theory of Computing (STOC 1999), pp. 245–254. ACM Press (1999)

    Google Scholar 

  14. Naor, M., Pinkas, B.: Oblivious polynomial evaluation. SIAM Journal on Computing 35(5), 1254–1281 (2006)

    Article  MathSciNet  MATH  Google Scholar 

  15. Pinkas, B.: Cryptographic techniques for privacy-preserving data mining. ACM SIGKDD Explorations Newsletter 4(2), 12–19 (2003)

    Article  Google Scholar 

  16. Quinlan, J.R.: Introduction to decision trees. Machine Learning 1(1), 81–106 (1986)

    Google Scholar 

  17. Shamir, A.: How to share a secret. Communications of the ACM 22(11), 612–613 (1979)

    Article  MathSciNet  MATH  Google Scholar 

  18. Wu, X., Kumar, V., Quinlan, J.R., Ghosh, J., Yang, Q., Motoda, H., McLachlan, G.J., Ng, A., Liu, B., Yu, P.S., Zhou, Z.-H., Steinbach, M., Hand, D.J., Steinberg, D.: Top 10 algorithms in data mining. Knowl. Inf. Syst. 14, 1–37 (2008)

    Article  Google Scholar 

  19. Yao, A.C.: How to generate and exchange secrets. In: Proceedings of the 27th Symposium on Foundations of Computer Science (FOCS), pp. 162–167. IEEE (1986)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lory, P. (2012). Enhancing the Efficiency in Privacy Preserving Learning of Decision Trees in Partitioned Databases. In: Domingo-Ferrer, J., Tinnirello, I. (eds) Privacy in Statistical Databases. PSD 2012. Lecture Notes in Computer Science, vol 7556. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-33627-0_25

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-33627-0_25

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-33626-3

  • Online ISBN: 978-3-642-33627-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics