Skip to main content

Privacy Preserving Naive Bayes Classification

  • Conference paper
Advanced Data Mining and Applications (ADMA 2005)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 3584))

Included in the following conference series:

  • 2464 Accesses

Abstract

Privacy preserving data mining is to discover accurate patterns without precise access to the original data. In this paper, we combine the two strategies of data transform and data hiding to propose a new randomization method, Randomized Response with Partial Hiding (RRPH), for distorting the original data. Then, an effective naive Bayes classifier is presented to predict the class labels for unknown samples according to the distorted data by RRPH. Shown in the analytical and experimental results, our method can obtain significant improvements in terms of privacy, accuracy, and applicability.

This work is supported by the National Natural Science Foundation of China under Grant No.60403041.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Verykios, V.S., Bertino, E., Fovino, I.N., Provenza, L.P., Saygin, Y., Theodoridis, Y.: State-of-the-art in Privacy Preserving Data Mining. SIGMOD Record 33(1) (2004)

    Google Scholar 

  2. Agrawal, R., Srikant, R.: Privacy-Preserving Data Mining. In: Proceedings of the ACM SIGMOD Conference on Management of Data (2000)

    Google Scholar 

  3. Agrawal, D., Aggarwal, C.C.: On the Design and Quantification of Privacy Preserving Data Mining Algorithms. In: Proceedings of the 20th ACM Symposium on PODS (2001)

    Google Scholar 

  4. Du, W., Zhan, Z.: Using Randomized Response Techniques for Privacy-Preserving Data Mining. In: Proceedings of the 9th ACM SIGKDD International Conference on KDD (2003)

    Google Scholar 

  5. Johnsten, T., Raghavan, V.V.: A Methodology for Hiding Knowledge in Databases. In: Proceedings of the IEEE ICDM Workshop on Privacy, Security and Data Mining (2002)

    Google Scholar 

  6. Clifton, C.: Using Sample Size to Limit Exposure to Data Mining. Journal of Computer Security 8(4) (2000)

    Google Scholar 

  7. Du, W., Zhan, Z.: Building Decision Tree Classifier on Private Data. In: Proceedings of the IEEE ICDM Workshop on Privacy, Security and Data Mining (2002)

    Google Scholar 

  8. Pinkas, B.: Cryptographic Techniques for Privacy-Preserving Data Mining. SIGKDD Explorations 4(2) (2002)

    Google Scholar 

  9. Kantarcoglu, M., Vaidya, J.: Privacy Preserving Naive Bayes Classifier for Horizontally Pertitioned Data. In: IEEE ICDM Workshop on Privacy Preserving Data Mining (2003)

    Google Scholar 

  10. Vaidya, J., Clifton, C.: Privacy Preserving Naive Bayes Classifier for Vertically Partitioned Data. In: Proceedings of the 4th SIAM International Conference on DM (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zhang, P., Tong, Y., Tang, S., Yang, D. (2005). Privacy Preserving Naive Bayes Classification. In: Li, X., Wang, S., Dong, Z.Y. (eds) Advanced Data Mining and Applications. ADMA 2005. Lecture Notes in Computer Science(), vol 3584. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11527503_88

Download citation

  • DOI: https://doi.org/10.1007/11527503_88

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-27894-8

  • Online ISBN: 978-3-540-31877-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics