Abstract
We propose a simple privacy-preserving reformulation of a linear program whose equality constraint matrix is partitioned into groups of rows. Each group of matrix rows and its corresponding right hand side vector are owned by a distinct private entity that is unwilling to share or make public its row group or right hand side vector. By multiplying each privately held constraint group by an appropriately generated and privately held random matrix, the original linear program is transformed into an equivalent one that does not reveal any of the privately held data or make it public. The solution vector of the transformed secure linear program is publicly generated and is available to all entities.
Similar content being viewed by others
References
Bednarz, A., Bean, N., Roughan, M.: Hiccups on the road to privacy-preserving linear programming. In: Proceedings of the 8th ACM Workshopon on Privacy in the Electronic Society, pp. 117–120 (2009)
Chen, K., Liu, L.: Privacy preserving data classification with rotation perturbation. In: Proceedings of the Fifth International Conference of Data Mining (ICDM’05), pp. 589–592. IEEE (2005)
Du, W.: A study of several specific secure two-party computation problems. Technical report, Purdue University, West Lafayette, IN (2001). PhD Dissertation. http://www.cis.syr.edu/~wedu/Research/paper/duthesis.ps
Du, W., Zahn, Z.: A practical approach to solve secure multi-party computation problems. In: Proceedings of the 2002 Workshop on New Security Paradigms, pp. 127–135 (2002)
Feng X., Zhang Z.: The rank of a random matrix. Appl. Math. Comput. 185, 689–694 (2007)
ILOG, Incline Village, Nevada: ILOG CPLEX 9.0 User’s Manual (2003) http://www.ilog.com/products/cplex/
Laur, S., Lipmaa, H., Mielikäinen, T.: Cryptographically private support vector machines. In: KDD ’06: Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 618–624. ACM, New York, NY, USA (2006)
Mangasarian, O.L.: Privacy-preserving linear programming. Optim. Lett. (2010, to appear). Technical Report 10-01. Data Mining Institute, Computer Sciences Department, University of Wisconsin, Madison, Wisconsin, March ftp://ftp.cs.wisc.edu/pub/dmi/tech-reports/10-01.pdf
Mangasarian, O.L., Wild, E.W.: Privacy-preserving classification of horizontally partitioned data via random kernels. In: Stahlbock, R., Crone S.V., Lessman, S. (eds.) Proceedings of the 2008 International Conference on Data Mining, DMIN08, vol. II, pp. 473–479, Las Vegas July (2008). Technical Report 07-03, Data Mining Institute, Computer Sciences Department, University of Wisconsin, Madison, Wisconsin, November (2007)
Mangasarian, O.L., Wild, E.W.: Privacy-preserving random kernel classification of checkerboard partitioned data. Ann. Info. Syst. XIII, 375–387 (2010). Technical Report 08-02. Data Mining Institute, Computer Sciences Department, University of Wisconsin, Madison, Wisconsin, September 2008
Mangasarian, O.L., Wild, E.W., Fung, G.M.: Privacy-preserving classification of vertically partitioned data via random kernels. ACM Trans. Knowl. Discov. Data (TKDD) 2(3) (2008). Technical Report 07-02, Data Mining Institute, Computer Sciences Department, University of Wisconsin, Madison, Wisconsin, September 2007.
MATLAB: User’s Guide. The MathWorks, Inc., Natick, MA 01760 (1994–2006). http://www.mathworks.com
Vaidya J., Clifton C., Zu M.: Privacy Preserving Data Mining. Springer, New York (2009)
Xiao, M.-J., Huang, L.-S., Shen, H. Luo, Y.-L.: Privacy preserving id3 algorithm over horizontally partitioned data. In: Sixth International Conference on Parallel and Distributed Computing Applications and Technologies (PDCAT’05), pp. 239–243. IEEE Computer Society (2005)
Yu, H., Jiang, X., Vaidya, J.: Privacy-preserving SVM using nonlinear kernels on horizontally partitioned data. In: SAC ’06: Proceedings of the 2006 ACM symposium on Applied computing. pp. 603–610. ACM Press, New York, NY, USA (2006)
Yu, H., Vaidya, J., Jiang, X.: Privacy-preserving svm classification on vertically partitioned data. In: Proceedings of PAKDD ’06. LNCS: Lecture Notes in Computer Science, vol. 3918, pp. 647–656. Springer, Berlin (2006)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Mangasarian, O.L. Privacy-preserving horizontally partitioned linear programs. Optim Lett 6, 431–436 (2012). https://doi.org/10.1007/s11590-010-0268-9
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11590-010-0268-9