skip to main content
10.1145/3200947.3201030acmotherconferencesArticle/Chapter ViewAbstractPublication PagessetnConference Proceedingsconference-collections
research-article

On Using Linear Diophantine Equations for Efficient Hiding of Decision Tree Rules

Published: 09 July 2018 Publication History

Abstract

Data sharing among organizations has become an increasingly common procedure in several areas like advertising, marketing, e-commerce and banking, but any organization will probably attempt to keep some patterns as hidden as possible when it shares its datasets with others. This paper focuses on preserving the privacy of sensitive patterns when inducing decision trees. We adopt a record augmentation approach for hiding sensitive classification rules in binary datasets. Such a hiding methodology is preferred over other heuristic solutions like output perturbation or crypto-graphic techniques - which restrict the usability of the data - since the raw data itself is readily available for public use. We propose a look-ahead approach using linear Diophantine equations in order to add the appropriate number of instances while maintaining the initial entropy of the nodes. This technique can be used to hide one or more decision tree rules in an optimal way.

References

[1]
Verykios, V.S., Bertino, E., Fovino, I.N., Provenza, L.P., Saygin, Y. and Theodoridis, Y. 2004. State of the Art Privacy Preserving Data Mining. SIGMOD Record 33(1), 50--57
[2]
Agrawal, R. and Srikant, R. 2000. Privacy-Preserving Data Mining. In: ACM SIGMOD Conference of Management of Data, pp. 439--450
[3]
Gkoulalas-Divanis, A., and Verykios, V.S. 2009. Privacy Preserving Data Mining: How far can we go? In Handbook of Research on Data Mining in Public and Private Sectors: Organizational and Government Applications. Eds. A. Syvajarvi and J. Stenvall. IGI Global.
[4]
Estivill-Castro, V., and Brankovic, L. 1999. Data swapping: Balancing privacy against precision in mining for logic rules. In: First International Conference on Data Warehousing and Knowledge Discovery.
[5]
Chang, L.W., and Moskowitz, I.S. 1998. Parsimonious Downgrading and Decision Trees applied to the Inference Problem. In: New Security Paradigms Workshop, pp. 82--89
[6]
Natwichai, J., Li, X., and Orlowska, M. 2005. Hiding Classification Rules for Data Sharing with Privacy Preservation. In: 7th International Conference on Data Warehousing and Knowledge Discovery, pp. 468--467.
[7]
Natwichai, J., Li, X., and Orlowska, M. 2006. A Reconstruction-based Algorithm for Classification Rules Hiding. In: 17th Australasian Database Conference, pp. 49--58.
[8]
Quinlan, J.R. C4.5. 1993. Programs for Machine Learning. Morgan Kaufmann.
[9]
Cohen, W.W. 1995. Fast effective rule induction. In: Machine Learning: the 12th International Conference.
[10]
Katsarou, A., Gkouvalas-Divanis, A., and Verykios, V. S. 2009. Reconstruction-based Classification Rule Hiding through Controlled Data Modification. In: IFIP International Federation for Information Processing 296, 449--458.
[11]
Natwichai, J., Sun, X., and Li, X.: Data Reduction Approach for Sensitive Associative Classification Rule Hiding. In: 19th Australian Database Conference (2008).
[12]
Wang, K., Fung, B.C.M., and Yu, P.S. 2005. Template-Based Privacy Preservation in Classification Problems. In:5th IEEE International Conference on Data Mining, pp. 466--473.
[13]
Delis, A., Verykios, V.S., and Tsitsonis, A. 2010. A Data Perturbation Approach to Sensitive Classification Rule Hiding. In:25th Symposium On Applied Computing.
[14]
Kalles, D., Verykios, V.S., Feretzakis, G., and Papagelis, A. 2016. Data set operations to hide decision tree rules. In: Twenty-second European Conference on Artificial Intelligence.
[15]
Kalles, D., Verykios, V.S., Feretzakis, G., and Papagelis, A. 2016. Data set operations to hide decision tree rules. In: 1st International Workshop on AI for Privacy and Security. Article No. 10.
[16]
Li, R., de Vries D., and Roddick J. 2011. Bands of Privacy Preserving Objectives: Classification of PPDM Strategies. In: 9th Australasian Data Mining Conference, pp. 137--151.
[17]
Kalles, D., and Morris, D.T. 1996. Efficient Incremental Induction of Decision Trees. Machine Learning 24(3), 231--242.
[18]
Kalles, D., and Papagelis, A. 2000. Stable decision trees: Using local anarchy for efficient incremental learning. International Journal on Artificial Intelligence Tools 9(1), 79--95.
[19]
Kalles, D., and Papagelis, A. 2010. Lossless fitness inheritance in genetic algorithms for decision trees. Soft Computing 14(9), 973--993.
[20]
Zantema, H., and Bodlaender, H.L. 2000. Finding Small Equivalent Decision Trees is Hard. International Journal of Foundations of Computer Science 11(2), 343--354.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
SETN '18: Proceedings of the 10th Hellenic Conference on Artificial Intelligence
July 2018
339 pages
ISBN:9781450364331
DOI:10.1145/3200947
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

In-Cooperation

  • EETN: Hellenic Artificial Intelligence Society
  • UOP: University of Patras
  • University of Thessaly: University of Thessaly, Volos, Greece

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 09 July 2018

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Data Sharing
  2. Decision Trees
  3. Diophantine Equations
  4. Hiding Rules
  5. Privacy Preserving

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

SETN '18

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 07 Jan 2025

Other Metrics

Citations

Cited By

View all

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media