A Utility-Aware and Holistic Approach for Privacy Preserving Distributed Mining with Worst Case Privacy Guarantee

dc.contributor.authorBanerjee, Madhushri
dc.contributor.authorChen, Zhiyuan
dc.contributor.authorGangopadhyay, Aryya
dc.date.accessioned2025-06-05T14:02:56Z
dc.date.available2025-06-05T14:02:56Z
dc.description.abstractOrganizations often want to predict some attribute values collaboratively. However, they are often unwilling or not allowed to directly share their private data. Thus there is great need for distributed privacy preserving techniques. There exists a rich body of work based on Secure MultiParty Computation techniques. However, most such techniques are tied to a specific mining algorithm and users have to run a different protocol for each mining algorithm. A holistic approach was proposed in which all parties first use a SMC protocol to generate a synthetic data set and then share this data for different mining algorithms. However, this approach has two major drawbacks: 1) it provides no worst case privacy guarantee, 2) parties involved in the mining process often know what attribute to predict, but the holistic approach does not take this into account. In this paper, we propose a method that addresses these shortcomings. Experimental results demonstrate the benefits of the proposed solution.
dc.description.urihttps://userpages.umbc.edu/~zhchen/papers/chen-skm-privacy.pdf
dc.format.extent6 pages
dc.genrejournal articles
dc.genrepreprints
dc.identifierdoi:10.13016/m2y7x6-ivpd
dc.identifier.urihttp://hdl.handle.net/11603/38627
dc.language.isoen_US
dc.relation.isAvailableAtThe University of Maryland, Baltimore County (UMBC)
dc.relation.ispartofUMBC Faculty Collection
dc.relation.ispartofUMBC College of Engineering and Information Technology Dean's Office
dc.relation.ispartofUMBC Center for Real-time Distributed Sensing and Autonomy
dc.relation.ispartofUMBC Information Systems Department
dc.relation.ispartofUMBC Student Collection
dc.rightsThis item is likely protected under Title 17 of the U.S. Copyright Law. Unless on a Creative Commons license, for uses protected by Copyright Law, contact the copyright holder or the author.
dc.subjectUMBC Mobile, Pervasive and Sensor Computing Lab (MPSC Lab)
dc.subjectUMBC Cybersecurity Institute
dc.subjectUMBC Accelerated Cognitive Cybersecurity Laboratory
dc.subjectUMBC Center for Cybersecurity
dc.subjectUMBC College of Engineering and Information Technology Center for Research in Emergent Manufacturing
dc.titleA Utility-Aware and Holistic Approach for Privacy Preserving Distributed Mining with Worst Case Privacy Guarantee
dc.typeText
dcterms.creatorhttps://orcid.org/0000-0002-6984-7248
dcterms.creatorhttps://orcid.org/0000-0002-7553-7932

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
chenskmprivacy.pdf
Size:
147.67 KB
Format:
Adobe Portable Document Format