Approval Sheet
نویسندگان
چکیده
Title of Dissertation: Privacy Preserving Distributed Data Mining based on Multi-objective Optimization and Algorithmic Game Theory Kamalika Das, Doctor of Philosophy, 2009 Thesis directed by: Dr. Hillol Kargupta Professor Department of Computer Science and Electrical Engineering Use of technology for data collection and analysis has seen an unprecedented growth in the last couple of decades. Individuals and organizations generate huge amount of data through everyday activities. This data is either centralized for pattern identification or mined in a distributed fashion for efficient knowledge discovery and collaborative computation. This, obviously, has raised serious concerns about privacy issues. The data mining community has responded to this challenge by developing a new breed of algorithms that are privacy preserving. Specifically, cryptographic techniques for secure multi-party function evaluation form the class of privacy preserving data mining algorithms for distributed computation environments. However, these algorithms require all participants in the distributed system to follow a monolithic privacy model and also make strong assumptions about the behavior of participating entities. These conditions do not necessarily hold true in practice. Therefore, most of the existing work in privacy preserving distributed data mining fail to serve the purpose when applied to large real-world distributed data mining applications. In this dissertation we develop a novel framework for privacy preserving distributed data mining that allows personalization of privacy requirements for individuals in a large distributed system and removes certain assumptions regarding participant behavior, thereby making the framework efficient and real-world adaptable. First, we propose the idea of personalized privacy for individuals in a large distributed system based on the fact that privacy is a social concept. Different parties in a distributed computing environment have varied privacy requirements for their data, and also varying availability of computation and communication resources. Therefore, we model privacy as a multi-objective optimization function where each party attempts to find the optimal choice between two conflicting objectives — (i) maximizing the data privacy, and (ii) minimizing the cost associated with the privacy guarantee. Each party optimizes its own objective to define the privacy model parameter that satisfies its privacy and cost requirements and then participates in the collaborative computation. Secondly, to address the issue of assumptions regarding user behavior in cryptographybased privacy preservation techniques, we formulate privacy preserving distributed data mining as a game. The participating entities are the players of the game and the strategies they adopt in communicating their data, doing necessary computations and attacking others data to reveal personal information, decide the result of the game in terms of the quality of the data mining results. Knowing that, in the absence of a supervisor, the tendency of any player in this game would be to cheat, we design a penalizing mechanism and blend it with the distributed data mining algorithm for getting a self-correcting system that forces parties to follow the protocol and not cheat. The framework that we have proposed is independent of the choice of the privacy model for the distributed computation and also applicable to any privacy preserving data mining application involving multi-party function evaluation in a distributed environment. To demonstrate the working of our framework, we have adapted it to work for some real life distributed data mining applications such as web advertisement ranking, distributed feature selection, and online similarity identification in browsing patterns. We have designed mechanisms for privacy preserving sum computation and inner product computation in a distributed environment and adapted the framework to work for Bayes optimal model of privacy and ǫ-differential privacy model. We have simulated the working of the distributed applications and presented experimental results for each of the algorithms developed, using the Distributed Data Mining Toolkit (DDMT) developed by the DIADIC laboratory at UMBC.
منابع مشابه
APPROVAL SHEET Title of Thesis : " The Impact of Family Environment on Disordered Eating in Overweight Adolescents
متن کامل
APPROVAL SHEET Title of Dissertation : " The Neuromatrix Theory of Pain and Angina during Exercise Stress Testing : Results from the PIMI
متن کامل
Georgia Institute of Technology Office of Contract Administration Notice of Project Closeout
Defense Priority Rating: Military Security Classification: Unclassified (or) Company/Industrial-Proprietary: _ RESTRICTIONS See Attached Gov' t Supplemental Information Sheet for Additional Requirements. Travel: Foreign travel must have prior approval — Contact OCA in each caie. Doniestic traverreouires sponsor approval where total will exceed greater of $500 or 125% of approved proposal budget...
متن کاملIntegrated Safeguards Data Sheet (Initial)
Authorized to Appraise Date: October 6, 2003 IBRD Amount ($m): Bank Approval: February 27, 2004 IDA Amount ($m): Global Supplemental Amount ($m): 5.50 Managing Unit: AFTES Lending Instrument: Specific Investment Loan (SIL) Status: Lending Sector: General agriculture, fishing and forestry sector Theme: Biodiversity (P); Other environment and natural resources management (P); Environmental polici...
متن کاملArticular cartilage regeneration using cell sheet technology.
Cartilage damage is typically treated by chondrocyte transplantation, mosaicplasty, or microfracture. Recent advances in tissue engineering have prompted research on techniques to repair articular cartilage damage using a variety of transplanted cells. We studied the repair and regeneration of cartilage damage using layered chondrocyte sheets prepared in a temperature-responsive culture dish. W...
متن کاملDesign of an Iris Verification System on Embedded Blackfin Processor for Access Control Application Richard Ng Yew Fatt Master of Engineering Science Faculty of Engineering and Science Universiti
ii ACKNOWLEDGEMENTS iii APPROVAL SHEET iv SUBMISSION SHEET v DECLARATION vi LIST OF TABLES x LIST OF FIGURES xi LIST OF ABBREVIATIONS xiii CHAPTER 1.0 INTRODUCTION 1 1.1 Background 1 1.2 Motivation 2 1.3 Scope of Work 3 1.4 Objective 4 1.5 Thesis Outline 5 2.0 LITERATURE REVIEW 7 2.1 Image Preprocessing 7 2.1.1 Iris Localization 8 2.1.1.1 Integro-differential operator 8 2.1.1.2 Hough Transform ...
متن کامل