A Utility-Aware and Holistic Approach for Privacy Preserving Distributed Mining With Worst Case Privacy Guarantee

Organizations often want to predict some attribute values collaboratively. However, they are often unwilling or not allowed to directly share their private data. Thus there is great need for distributed privacy preserving techniques. There exists a rich body of work based on Secure Multi-Party Computation techniques. However, most such techniques are tied to a specific mining algorithm and users have to run a different protocol for each mining algorithm. A holistic approach was proposed in which all parties first use a SMC protocol to generate a synthetic data set and then share this data for different mining algorithms.

Provided by: University of Maryland Topic: Big Data Date Added: Oct 2010 Format: PDF

Download Now

Find By Topic