Privacy Preserving Aggregation of Secret Classifiers
نویسندگان
چکیده
In this paper, we address the issue of privacy preserving data-mining. Specifically, we consider a scenario where each member j of T parties has its own private database. The party j builds a private classifier hj for predicting a binary class variable y. The aim of this paper consists of aggregating these classifiers hj in order to improve individual predictions. More precisely, the parties wish to compute an efficient linear combination over their classifier in a secure manner.
منابع مشابه
Privacy Preserving Aggregation of Distributed Mobility Data Streams
Proliferation of pervasive devices capturing sensible data streams, e.g. mobility records, raise concerns on individual privacy. Even if the data is aggregated at a central server, location data may identify a particular person. Thus, the transmitted data must be guarded against reidentification and an un-trusted server. This paper overcomes limitations of previous works and provides a privacy ...
متن کاملPrivacy Preserving Centralized Counting of Moving Objects
Proliferation of pervasive devices capturing sensible data streams, e.g. mobility records, raise concerns on individual privacy. Even if the data is aggregated at a central server, location data may identify a particular person. Thus, the transmitted data must be guarded against re-identification and an un-trusted server. This paper overcomes limitations of previous works and provides a privacy...
متن کاملPrivacy Preserving Data Mining
Through data mining collect large amount of data in many organizations. A key value of huge databases today is technical or financial research. In a huge collection of data there arises a key issue that is privacy. Due to personal interests, medical databases or business interests privacy is needed. Due to privacy infringement while performing the data mining operations this is often not possib...
متن کاملPrivacy Preserving Distributed K-Means Clustering in Malicious Model Using Verifiable Secret Sharing Scheme
In this article, the authors propose an approach for privacy preserving distributed clustering that assumes malicious model. In the literature, there do exist, numerous approaches that assume a semi honest model. However, such an assumption is, at best, reasonable in experimentations; rarely true in real world. Hence, it is essential to investigate approaches for privacy preservation using a ma...
متن کاملSeparating indexes from data: a distributed scheme for secure database outsourcing
Database outsourcing is an idea to eliminate the burden of database management from organizations. Since data is a critical asset of organizations, preserving its privacy from outside adversary and untrusted server should be warranted. In this paper, we present a distributed scheme based on storing shares of data on different servers and separating indexes from data on a distinct server. Shamir...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Trans. Data Privacy
دوره 4 شماره
صفحات -
تاریخ انتشار 2011