Open Access   Article Go Back

A Survey on Privacy Preserving Machine Learning Techniques for Distributed Data Mining

S. B. Javheri1 , U. V. Kulkarni2

Section:Survey Paper, Product Type: Journal Paper
Volume-6 , Issue-6 , Page no. 1130-1139, Jun-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i6.11301139

Online published on Jun 30, 2018

Copyright © S. B. Javheri, U. V. Kulkarni . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: S. B. Javheri, U. V. Kulkarni, “A Survey on Privacy Preserving Machine Learning Techniques for Distributed Data Mining,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.1130-1139, 2018.

MLA Style Citation: S. B. Javheri, U. V. Kulkarni "A Survey on Privacy Preserving Machine Learning Techniques for Distributed Data Mining." International Journal of Computer Sciences and Engineering 6.6 (2018): 1130-1139.

APA Style Citation: S. B. Javheri, U. V. Kulkarni, (2018). A Survey on Privacy Preserving Machine Learning Techniques for Distributed Data Mining. International Journal of Computer Sciences and Engineering, 6(6), 1130-1139.

BibTex Style Citation:
@article{Javheri_2018,
author = {S. B. Javheri, U. V. Kulkarni},
title = {A Survey on Privacy Preserving Machine Learning Techniques for Distributed Data Mining},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {6 2018},
volume = {6},
Issue = {6},
month = {6},
year = {2018},
issn = {2347-2693},
pages = {1130-1139},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2315},
doi = {https://doi.org/10.26438/ijcse/v6i6.11301139}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i6.11301139}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2315
TI - A Survey on Privacy Preserving Machine Learning Techniques for Distributed Data Mining
T2 - International Journal of Computer Sciences and Engineering
AU - S. B. Javheri, U. V. Kulkarni
PY - 2018
DA - 2018/06/30
PB - IJCSE, Indore, INDIA
SP - 1130-1139
IS - 6
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
545 538 downloads 127 downloads
  
  
           

Abstract

In the age of computer driven decision making the Data Science has become a vital important area for the parties storing the data. For the efficient use of available data; users need to excel in better Data Mining through robust Machine Learning techniques. Data mining applications are intensively used in government and corporate sector to analyze data for prediction, pattern recognitions, and classification. Accuracy of data mining algorithm depends on volume of training data. Advancement in computer and communication technologies allowed distributed computing environment, where multiple clients/parties can conduct joint learning process by incorporating distributed data. Distributed data may be arbitrary partitioned among parties. Recent data mining application uses power of cloud computing to execute complex computation involved in learning process. Despite of these advancements, individual or organizations holding data are reluctant to share their sensitive data due to fear of privacy breach and losses. Privacy Preserving Data Mining (PPDM) is solution to protect personal information while sharing it in distributed environment. Privacy preservation is achieved by data randomization or encryption techniques. Robust security to personal information and more accuracy in mining applications, offer more popularity to privacy preservation encryption techniques than data randomization techniques. Homomorphic encryption is one of the popular encryption techniques, where users can perform operations on cipher text; the results are similar to operations on their respective plaintexts. In present survey paper some data mining techniques like- ANN, RDT, SVM and Deep Learning, based on distributed partitioned data such are reviewed in special context to privacy preservation.

Key-Words / Index Term

Data mining, Privacy preservation, homomorphic encryption, ANN, RDT, SVM, Deep Learning

References

[1] L. Xu, C. Jiang, J. Wang, J. Yuan, and Y. Ren, “Information security in big data: Privacy and data mining,” IEEE Access, vol. 2, pp. 1151–1178, 2014.
[2] J. P. J. Han, M. Kamber, Data Mining: Concepts and Techniques. San Mateo: Morgan Kaufmann, 2006.
[3] J. Yuan and S. Yu, “Privacy Preserving Back-Propagation Neural Network Learning Made Practical with Cloud Computing,” Tpds, vol. 25, no. 1, pp. 212–221, 2014.
[4] Y. Zhang and S. Zhong, “A privacy-preserving algorithm for distributed training of neural network ensembles,” Neural Comput. Appl., vol. 22, no. S1, pp. 269–282, 2012.
[5] A. Bansal, T. Chen, and S. Zhong, “Privacy preserving Back-propagation neural network learning over arbitrarily partitioned data,” Neural Comput. Appl., vol. 20, no. 1, pp. 143–150, 2011.
[6] M. Chicurel, “Databasing the brain.,” Nature, vol. 406, no. 6798, pp. 822–5, Aug. 2000.
[7] K. Flouri, B. Beferull-Lozano, and P. Tsakalides, “Training a SVM-based classifier in distributed sensor networks,” Eur. Signal Process. Conf., pp. 1–5, 2006.
[8] Q. Zhang, L. T. Yang, and Z. Chen, “Privacy Preserving Deep Computational Model on Cloud for Big Data Feature Learning,” vol. 65, no. 5, pp. 1–11, 2015.
[9] R. L. Grossman, “The case for cloud computing,” IT Prof., vol. 11, no. 2, pp. 23–27, 2009.
[10] R. L. Grossman and Y. Gu, “Data Mining Using High Performance Data Clouds: Experimental Studies Using Sector and Sphere,” Proc. 14th ACM SIGKDD Int. Conf. Knowl. Discov. data Min., pp. 920–927, 2008.
[11] M. Rajarajan, K. Cumanan, S. Veluru, R. C.-W. Phan, and Y. Rahulamathavan, “Privacy-Preserving Multi-Class Support Vector Machine for Outsourcing the Data Classification in Cloud,” IEEE Trans. Dependable Secur. Comput., vol. 11, no. 5, pp. 467–479, 2013.
[12] J. Vaidya and C. Clifton, “Privacy-Preserving Data Mining: Why, How, and When,” IEEE Secur. {&} Priv., vol. 2, no. 6, pp. 19–27, 2004.
[13] “Your Rights Under HIPAA | HHS.gov.” [Online]. Available: http://www.hhs.gov/hipaa/for-individuals/ guidance-materials-for-consumers/index.html. [Accessed: 13-May-2016].
[14] T. Chen and S. Zhong, “Privacy-preserving backpropagation neural network learning.,” IEEE Trans. Neural Netw., vol. 20, no. 10, pp. 1554–64, 2009.
[15] C. Gentry, “Fully Homomorphic Encryption without Bootstrapping,” Security, vol. 111, no. 111, pp. 309–325, 2011.
[16] R. Agrawal and R. Srikant, “Privacy-preserving data mining,” Proc. 2000 ACM SIGMOD Int. Conf. Manag. data - SIGMOD ’00, vol. 29, no. 2, pp. 439–450, 2000.
[17] A. C. Yao, “Protocols for secure computations,” 23rd Annu. Symp. Found. Comput. Sci. (sfcs 1982), pp. 1–5, 1982.
[18] O. Goldreich, S. Micali, and A. Wigderson, “How to Play any Mental Game,” Stoc ’87, pp. 218–229, 1987.
[19] Y. Lindell and B. Pinkas, “Privacy Preserving Data Mining,” J. Cryptol., vol. 15, no. 3, pp. 177–206, 2002.
[20] J. Sen, “Homomorphic Encryption: Theory & Applications,” arXiv Prepr. arXiv1305.5886, pp. 1–32, 2013.
[21] R. L. Rivest, L. Adleman, and M. L. Dertouzos, “On Data Banks and Privacy Homomorphisms,” Found. Secur. Comput. Acad. Press, pp. 169–179, 1978.
[22] R. L. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems,” Commun. ACM, vol. 21, no. 2, pp. 120–126, 1978.
[23] T. Okamoto and S. Uchiyama, “A new public-key cryptosystem as secure as factoring,” Advance Cryptology—EUROCRYPT’ 1998, Lect. Notes Comput. Sci., vol. 1403, pp. 308–318, 1998.
[24] P. Paillier, “Public-Key Cryptosystems Based on Composite Degree Residuosity Classes,” Adv. Cryptol. — EUROCRYPT ’99, vol. 1592, pp. 223–238, 1999.
[25] T. ElGamal, “A public key cryptosystem and a signature scheme based on discrete logarithms,” Inf. Theory, IEEE Trans., vol. 31, no. 4, pp. 469–472, 1985.
[26] C. Gentry, “Fully homomorphic encryption using ideal lattices,” Proc. 41st Annu. ACM Symp. Symp. theory Comput. STOC 09, vol. 19, no. September, p. 169, 2009.
[27] Z. Brakerski, “Fully homomorphic encryption without modulus switching from classical GapSVP,” Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 7417 LNCS, pp. 868–886, 2012.
[28] N. Schlitter, “A Protocol for Privacy Preserving Neural Network Learning on Horizontally Partitioned Data,” 2008.
[29] D. Boneh, E. Goh, and K. Nissim, “Evaluating 2-DNF formulas on ciphertexts,” Theory Cryptogr., pp. 325–341, 2005.
[30] B. Schneier, “Applied Cryptography,” Electr. Eng., vol. 1, no. [32, pp. 429–455, 1996.
[31] J. Vaidya, B. Shafiq, W. Fan, D. Mehmood, and D. Lorenzi, “A Random Decision Tree Framework for Privacy-Preserving Data Mining,” IEEE Trans. Dependable Secur. Comput., vol. 11, no. 5, pp. 399–411, 2014.


Authors Profile
S. B. Javheri in pursed Bachelor of Engineering from North Maharashtra University, Jalgaon, Marashatra, India in 1998 and Master of Engineering from B. V. D. University, Pune, Maharashtra, India in year 2009. He is currently pursuing Ph.D. from S.G.G.S.I.E.& T., Nanded, Maharashtra, India and currently working as Associate Professor in Department of Computer Engineering , JSPM’s Rajarshi Shahu College of Engineering, Pune since 2004. He has published 12 research papers in reputed international journals/conferences. His main research work focuses on information security, machine learning, Neural network. He has 19 years of teaching experience.

U. V. Kulkarni has obtained Bachelor of Engin- eering degree in Electronics from Marathwada University, Aurangabad, Maharashtra, India in 1987. He completed Master of Engineering in system software from Dr. Babasaheb Ambedkar Marathwada University, Aurangabad, Maharashtra, India in 1992. He has completed his Ph.D. in Electronics and Computer Science Engineering in 2002 from Swami Ramanand Teerth Marathwada University Nanded, Maharashtra, India. He is currently working as Professor and Head in Computer Science and Engineering Department at SGGSIE&T (Autonomous), Nanded, Maharashtra, India. He has received National Level Gold Medal and Computer Engineering Division Prize for the paper published in the Journal of Institution of Engineers, titled as Fuzzy Hypersphere Neural Network Classifier, May 2004 and the best paper award for the research paper presented in international conference held at Imperial College London, U.K., 2014. He has published many research papers in reputed National and International Journals. His areas of interest include Microprocessors, Data Structures, Distributed Systems, Fuzzy Neural Networks, and Pattern Classification. He has more than 30 years of teaching experience.