Skip to main content
Log in

Providing predictions on distributed HMMs with privacy

  • Published:
Artificial Intelligence Review Aims and scope Submit manuscript

Abstract

As forecasting is increasingly becoming important, hidden Markov models (HMMs) are widely used for prediction in many applications such as finance, marketing, bioinformatics, speech recognition, and so on. After creating an HMM, the model owner can start providing predictions. When the model is owned by one party, predictions can be easily provided. However, it becomes a challenge when the model is horizontally or vertically distributed between various parties, even competing companies. The parties want to integrate the split models they own for better forecasting purposes. Due to privacy, financial, and legal reasons; however, they do not want to share their models. We investigate how such parties produce predictions on the distributed model without violating their privacy. We then analyze our proposed schemes in terms of accuracy, privacy, and performance; and finally present our findings.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  • Begletier R, El-Yaniv R, Yona G (2004) On prediction using variable order Markov models. JAIR 22: 385–421

    Google Scholar 

  • Benaloh J (1994) Dense probabilistic encryption. In: Proceedings of the workshop on selected areas of cryptography, pp 120–128

  • Canny J (2002) Collaborative filtering with privacy. In: Proceedings of the IEEE symposium on security and privacy, pp 45–57

  • Clifton C, Kantarcioglu M, Doan A, Schadow G, Vaidya J, Elmagarmid A, Suciu D (2004) Privacy-preserving data integration and sharing. In: Proceedings of the 9th ACM SIGMOD workshop on research issues in data mining and knowledge discovery, pp 19–26

  • Clifton C, Kantarcioglu M, Vaidya J, Lin X, Zhu M (2003) Tools for privacy-preserving distributed data mining. ACM SIGKDD Explor 4(2): 1–7

    Google Scholar 

  • Cranor LF, Reagle J, Ackerman MS (1999) Beyond concern: understanding net users’ attitudes about online privacy. Available from http://www.research.att.com/resources/trs/TRs/99/99.4/99.4.3/report.htm

  • Cranor LF (2003) ‘I didn’t buy it for myself’ privacy and e-commerce personalization. In: Proceedings of the 2003 ACM workshop on privacy in the electronic society, pp 111–117

  • De Fonzo V, Aluffi-Pentini F, Parisi V (2007) Hidden Markov models in bioinformatics. Curr Bioinform 2(1): 49–61

    Article  Google Scholar 

  • Dugad R, Desai UB (1996) A tutorial on hidden Markov models. Technical Report SPANN-96.1, Indian Institute of Technology

  • González AM, Roque AMS, García-González J (2005) Modeling and forecasting electricity prices with input/output hidden Markov models. IEEE Trans Power Syst 20(1): 13–24

    Article  Google Scholar 

  • Hassan R, Nath B (2005) Stock market forecasting using hidden Markov model: a new approach. In: Proceedings of the 2005 5th international conference on intelligent systems design and applications, pp 192–196

  • Henderson J, Salzberg S, Fasman K (1996) Finding genes in human DNA with a hidden Markov model. J Comput Biol 4: 127–141

    Article  Google Scholar 

  • Kaleli C, Polat H (2007) Providing naïve Bayesian classifier-based private recommendations on partitioned data. LNAI 4702: 515–522

    Google Scholar 

  • Kantarcioglu M, Vaidya JS (2003) Privacy-preserving naïve Bayes classifier for horizontally partitioned data. In: Proceedings of the 3rd IEEE international conference on data mining, workshop on privacy-preserving data mining, pp 3–9

  • Kantarcioglu M, Clifton C (2004) Privacy-preserving distributed mining of association rules on horizontally partitioned data. IEEE TKDE 16(9): 1026–1037

    Google Scholar 

  • Merugu S, Ghosh J (2003) Privacy-preserving distributed clustering using generative models. In: Proceedings of the 3rd IEEE international conference on data mining, pp 211–218

  • Naccache D, Stern J (1998) A new public key cryptosystem based on higher residues. In: Proceedings of the 5th ACM conference on computer and communication security, pp 59–66

  • Paillier P (1999) Public-key cryptosystems based on composite degree residue classes. LNCS 1592: 223–238

    MathSciNet  Google Scholar 

  • Polat H, Du W (2005a) Privacy-preserving collaborative filtering on vertically partitioned data. LNCS 3721: 651–658

    Google Scholar 

  • Polat H, Du W (2005b) Privacy-preserving top-N recommendation on horizontally partitioned data. In: Proceedings of the 2005 IEEE/WIC/ACM international conference on web intelligence, pp 725–731

  • Rabiner LR (1989) A tutorial on hidden Markov models and selected applications in speech recognition. Proc IEEE 77(2): 257–286

    Article  Google Scholar 

  • Vaidya JS, Clifton C (2004) Privacy-preserving naïve Bayes classifier for vertically partitioned data. In: Proceedings of the 2004 SIAM conference on data mining, pp 522–526

  • Verykios VS, Bertino E, Fovino IN, Provenza LP, Saygin Y, Theodoridis Y (2004) State-of-the-art in privacy-preserving data mining. ACM SIGMOD Rec 3(1): 50–57

    Article  Google Scholar 

  • Zhang Y (2004) Prediction of financial time series with hidden Markov models. Master Thesis, Simon Fraser University

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Huseyin Polat.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Renckes, S., Polat, H. & Oysal, Y. Providing predictions on distributed HMMs with privacy. Artif Intell Rev 28, 343–362 (2007). https://doi.org/10.1007/s10462-009-9106-9

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10462-009-9106-9

Keywords

Navigation