25 Hits in 7.2 sec

Securely Outsourcing ID3 Decision Tree in Cloud Computing

Ye Li, Zoe L. Jiang, Xuan Wang, Junbin Fang, En Zhang, Xianmin Wang
2018 Wireless Communications and Mobile Computing  
Cryptography-based privacy-preserving data mining has been proposed to protect the privacy of participating parties' data for this process.  ...  In this paper, we address the challenge of outsourcing ID3 decision tree algorithm in the malicious model.  ...  In 2002, Lindell and Pinkas [1] proposed a secure ID3 decision tree algorithm over horizontally partitioned data.  ... 
doi:10.1155/2018/2385150 fatcat:zsqe7hpnzzatvkawmuguu3fw7q

Secure Retrieval of Sub-Trees over Encrypted Data Stored in Cloud Storage for Prediction

P. Shanthi, A. Umamakeswari
2016 Indian Journal of Science and Technology  
Findings: Our proposed novel approach results in better performance compared to other methods of partitioning. Also securely retrieves subtree over the encrypted data.  ...  Shifting towards the services however leads to some security concerns like data leakage, unauthorized access and data privacy etc.  ...  A decision tree constructed for the distributed dataset preserves the privacy of the data.  ... 
doi:10.17485/ijst/2016/v9i48/108028 fatcat:gf32u6mcgjdebnr46ic44tdneq

SoK: Privacy-Preserving Collaborative Tree-based Model Learning [article]

Sylvain Chatel, Apostolos Pyrgelis, Juan Ramon Troncoso-Pastoriza, Jean-Pierre Hubaux
2021 arXiv   pre-print
The recent orthogonal needs for more data and privacy protection call for collaborative privacy-preserving solutions.  ...  Tree-based models are among the most efficient machine learning techniques for data mining nowadays due to their accuracy, interpretability, and simplicity.  ...  We are also grateful to Giovanni Cherubin, Andrew Janowczyk, Peizhao Hu, and the members of the EPFL Laboratory for Data Security for their helpful comments and suggestions.  ... 
arXiv:2103.08987v2 fatcat:3c6axws5zbeptn5q3bjomusbg4

Distributed Outsourced Privacy-Preserving Gradient Descent Methods among Multiple Parties

Zuowen Tan, Haohan Zhang, Peiyi Hu, Rui Gao
2021 Security and Communication Networks  
To address the data and model's privacy mentioned above, we present two new outsourced privacy-preserving gradient descent (OPPGD) method schemes over horizontally or vertically partitioned data among  ...  multiple parties, respectively.  ...  [34] proposed an outsourced privacy-preserving C4.5 decision tree algorithm over both horizontally and vertically partitioned datasets. ey used the BCP cryptosystem to present an outsourced privacypreserving  ... 
doi:10.1155/2021/8876893 doaj:3acb0f2a817e45ae8c62c0df20d4f06d fatcat:orumjhurmbc67hrv6lezpumd3e

Privacy Preserving Similarity Detection for Data Analysis

Iraklis Leontiadis, Melek Onen, Refik Molva, M.J. Chorley, G.B. Colombo
2013 2013 International Conference on Cloud and Green Computing  
In this paper we propose a mechanism that protects user privacy and preserves data similarity results although encrypted.  ...  Since the third parties are not trusted the data must be protected such that individual data privacy is not compromised but at the same time operations on it would be compatible.  ...  Privacy preserving data classification on horizontally partitioned data has been addressed in [12, 13] as well.  ... 
doi:10.1109/cgc.2013.92 dblp:conf/cgc/LeontiadisOMCC13 fatcat:7oyw6xdii5bsposn2iktgpvpcy

Practical Implementation of Privacy Preserving Clustering Methods Using a Partially Homomorphic Encryption Algorithm

Ferhat Ozgur Catak, Ismail Aydin, Ogerta Elezaj, Sule Yildirim-Yayilgan
2020 Electronics  
Protection of the sensitive data on a system that contains multiple connections with different privacy policies, also brings the need to use proper cryptographic key exchange methods for each party, as  ...  Thus, these methods provide data privacy, as data are processed in the encrypted domain, without the need for a plain form and this allows outsourcing of the computations to cloud systems.  ...  In order to protect the data privacy, Shamir's secret sharing is used with the distributed version of the decision tree learning, ID3 algorithm.  ... 
doi:10.3390/electronics9020229 fatcat:tt7twfvvrfdhtgz7islxja2xeq

Privacy-Preserving Collaborative Prediction using Random Forests [article]

Irene Giacomelli, Somesh Jha, Ross Kleiman, David Page, Kyonghwan Yoon
2018 arXiv   pre-print
We study the problem of privacy-preserving machine learning (PPML) for ensemble methods, focusing our effort on random forests.  ...  This is especially important in privacy sensitive applications such as learning predictive models for clinical decision support from EHR data from different clinics, where each clinic has a responsibility  ...  This work was partially supported by the Clinical and Translational Science Award (CTSA) program, through the NIH National Center for Advancing Translational Sciences (NCATS) grant UL1TR002373, by the  ... 
arXiv:1811.08695v1 fatcat:vm2hwg523na6lfpiaws2tb3fv4

Privacy-preserving Machine Learning as a Service

Ehsan Hesamifard, Hassan Takabi, Mehdi Ghasemi, Rebecca N. Wright
2018 Proceedings on Privacy Enhancing Technologies  
The empirical results show that it provides accurate privacy-preserving training and classification.  ...  However, machine learning algorithms require access to the raw data which is often privacy sensitive and can create potential security and privacy risks.  ...  [64] proposed several blocks for constructing an ID3 algorithm over horizontally partitioned data while preserving the privacy of each part.  ... 
doi:10.1515/popets-2018-0024 dblp:journals/popets/HesamifardTGW18 fatcat:s77yrnez7vhzfgao2tweehtery

Aggregating privatized medical data for secure querying applications

Kalpana Singh, Lynn Batten
2017 Future generations computer systems  
Lindell and Pinkas [LP00] first apply the concept of SMC in the field of data mining and develop a provably secure two-party decision tree using the ID3 algorithm, over horizontally partitioned data  ...  Du & Zhan [DZ02] propose a protocol for making the ID3 algorithm privacy preserving over vertically partitioned data [VC02] .  ...  How to develop a privacy preserving, secure and efficient architecture which aggregates large medical data sets in order to share it to support emergency response to a patient in a remote region?  ... 
doi:10.1016/j.future.2016.11.028 fatcat:fd6kzkwccvhuhltszlq7ysj4yq

Privacy in the Cloud: A Survey of Existing Solutions and Research Challenges

Paulo Silva, Edmundo Monteiro, Paulo Simoes
2021 IEEE Access  
In this article, various privacy threats, concepts, regulations, and personal data types are analyzed.  ...  Private information is often unwillingly collected, sold, or exposed, depriving data owners of their rightful privacy.  ...  With this model, it is also possible to calculate a gain in adversarial knowledge by relating δ with the information gain used by decision tree classifiers (e.g., ID3 and C4.5 by Quinlan [94] ).  ... 
doi:10.1109/access.2021.3049599 fatcat:xo7hvly6mfhw3obudgr3e5eqse

A review on Security in Distributed Information Sharing

Swati Upadhyay, J Maurya
In many cases, multiple parties may wish to share aggregate private data, without disclosing sensitive information at their end.  ...  Over the last few years this has naturally lead to a growing interest in security or privacy issues in data mining.  ...  Privacy preserving data mining method on the decision tree over horizontally partitioned data using (Un-trusted third party)UTP.  ... 

Journal of Computer Science IJCSIS March 2021 Full Volume

2021 Zenodo  
PaperID 01032115: Clustering Massive Packets using a Lock-Free Algorithm of Tree-Based Reduction on GPGPU (pp. 19-24) Ruo Ando, National Institute of Informatics, Center for Cybersecurity Research and  ...  C4.5 decision tree Classifier C4.5 is one of the most widely used decision tree algorithms and is an enhanced version of the ID3 algorithm.  ...  towards privacy irrespective of overall efficiency of privacy preservation model.  ... 
doi:10.5281/zenodo.5571271 fatcat:iao6mhiihfhjlp4b5mcqo3ybta

Report: State of the Art Solutions for Privacy Preserving Machine Learning in the Medical Context [article]

Jasmin Zalonis, Frederik Armknecht, Björn Grohmann, Manuel Koch
Even so privacy-preserving techniques become more important, even necessary due to legal regulations such as the General Data Protection Regulation (GDPR).  ...  One of the main questions concerning this scenario is whether it is possible to process the data for research purposes without violating the privacy of the data owner.  ...  Decision Trees [7] propose a new privacy-preserving solution for training and prediction of tree-based algorithms.  ... 
doi:10.48550/arxiv.2201.11406 fatcat:zunrkufowvdkdjsugbazontvb4

A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc Networks

Vinayak T Patil
2013 IOSR Journal of Computer Engineering  
In a route discovery, broadcasting is a fundamental and effective data dissemination mechanism, where a mobile node blindly rebroadcasts the first received route request packets unless it has a route to  ...  : Provide decision trees for prediction of numerical values.  ...  With all this information the system generates a recommendation consisting of two DM algorithms: the ID3 (decision tree type) and the CN2 (rule induction type).  ... 
doi:10.9790/0661-1260109 fatcat:jundvgfvpjcdpmtloz2z2w6ige

Privacy Preserving Vertical Federated Learning for Tree-based Models [article]

Yuncheng Wu, Shaofeng Cai, Xiaokui Xiao, Gang Chen, Beng Chin Ooi
2020 pre-print
We propose Pivot, a novel solution for privacy preserving vertical decision tree training and prediction, ensuring that no intermediate information is disclosed other than those the clients have agreed  ...  Theoretical and experimental analysis suggest that Pivot is efficient for the privacy achieved.  ...  ACKNOWLEDGEMENTS We thank Xutao Sun for his early contribution to this work.  ... 
doi:10.14778/3407790.3407811 arXiv:2008.06170v1 fatcat:qliiw7td5bg4pixfakppcvklfe
« Previous Showing results 1 — 15 out of 25 results