Skip to main content
Log in

Privacy-preserving horizontally partitioned linear programs

  • Original Paper
  • Published:
Optimization Letters Aims and scope Submit manuscript

Abstract

We propose a simple privacy-preserving reformulation of a linear program whose equality constraint matrix is partitioned into groups of rows. Each group of matrix rows and its corresponding right hand side vector are owned by a distinct private entity that is unwilling to share or make public its row group or right hand side vector. By multiplying each privately held constraint group by an appropriately generated and privately held random matrix, the original linear program is transformed into an equivalent one that does not reveal any of the privately held data or make it public. The solution vector of the transformed secure linear program is publicly generated and is available to all entities.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Bednarz, A., Bean, N., Roughan, M.: Hiccups on the road to privacy-preserving linear programming. In: Proceedings of the 8th ACM Workshopon on Privacy in the Electronic Society, pp. 117–120 (2009)

  2. Chen, K., Liu, L.: Privacy preserving data classification with rotation perturbation. In: Proceedings of the Fifth International Conference of Data Mining (ICDM’05), pp. 589–592. IEEE (2005)

  3. Du, W.: A study of several specific secure two-party computation problems. Technical report, Purdue University, West Lafayette, IN (2001). PhD Dissertation. http://www.cis.syr.edu/~wedu/Research/paper/duthesis.ps

  4. Du, W., Zahn, Z.: A practical approach to solve secure multi-party computation problems. In: Proceedings of the 2002 Workshop on New Security Paradigms, pp. 127–135 (2002)

  5. Feng X., Zhang Z.: The rank of a random matrix. Appl. Math. Comput. 185, 689–694 (2007)

    Article  MathSciNet  MATH  Google Scholar 

  6. ILOG, Incline Village, Nevada: ILOG CPLEX 9.0 User’s Manual (2003) http://www.ilog.com/products/cplex/

  7. Laur, S., Lipmaa, H., Mielikäinen, T.: Cryptographically private support vector machines. In: KDD ’06: Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 618–624. ACM, New York, NY, USA (2006)

  8. Mangasarian, O.L.: Privacy-preserving linear programming. Optim. Lett. (2010, to appear). Technical Report 10-01. Data Mining Institute, Computer Sciences Department, University of Wisconsin, Madison, Wisconsin, March ftp://ftp.cs.wisc.edu/pub/dmi/tech-reports/10-01.pdf

  9. Mangasarian, O.L., Wild, E.W.: Privacy-preserving classification of horizontally partitioned data via random kernels. In: Stahlbock, R., Crone S.V., Lessman, S. (eds.) Proceedings of the 2008 International Conference on Data Mining, DMIN08, vol. II, pp. 473–479, Las Vegas July (2008). Technical Report 07-03, Data Mining Institute, Computer Sciences Department, University of Wisconsin, Madison, Wisconsin, November (2007)

  10. Mangasarian, O.L., Wild, E.W.: Privacy-preserving random kernel classification of checkerboard partitioned data. Ann. Info. Syst. XIII, 375–387 (2010). Technical Report 08-02. Data Mining Institute, Computer Sciences Department, University of Wisconsin, Madison, Wisconsin, September 2008

  11. Mangasarian, O.L., Wild, E.W., Fung, G.M.: Privacy-preserving classification of vertically partitioned data via random kernels. ACM Trans. Knowl. Discov. Data (TKDD) 2(3) (2008). Technical Report 07-02, Data Mining Institute, Computer Sciences Department, University of Wisconsin, Madison, Wisconsin, September 2007.

  12. MATLAB: User’s Guide. The MathWorks, Inc., Natick, MA 01760 (1994–2006). http://www.mathworks.com

  13. Vaidya J., Clifton C., Zu M.: Privacy Preserving Data Mining. Springer, New York (2009)

    Google Scholar 

  14. Xiao, M.-J., Huang, L.-S., Shen, H. Luo, Y.-L.: Privacy preserving id3 algorithm over horizontally partitioned data. In: Sixth International Conference on Parallel and Distributed Computing Applications and Technologies (PDCAT’05), pp. 239–243. IEEE Computer Society (2005)

  15. Yu, H., Jiang, X., Vaidya, J.: Privacy-preserving SVM using nonlinear kernels on horizontally partitioned data. In: SAC ’06: Proceedings of the 2006 ACM symposium on Applied computing. pp. 603–610. ACM Press, New York, NY, USA (2006)

  16. Yu, H., Vaidya, J., Jiang, X.: Privacy-preserving svm classification on vertically partitioned data. In: Proceedings of PAKDD ’06. LNCS: Lecture Notes in Computer Science, vol. 3918, pp. 647–656. Springer, Berlin (2006)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Olvi L. Mangasarian.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Mangasarian, O.L. Privacy-preserving horizontally partitioned linear programs. Optim Lett 6, 431–436 (2012). https://doi.org/10.1007/s11590-010-0268-9

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11590-010-0268-9

Keywords