skip to main content
10.1145/3411408.3411419acmotherconferencesArticle/Chapter ViewAbstractPublication PagessetnConference Proceedingsconference-collections
research-article

Local Distortion Hiding (LDH) Algorithm: a Java-based prototype

Published:02 September 2020Publication History

ABSTRACT

Data sharing among organizations has become an increasingly common process, but any part will most likely try to hide some sensitive patterns before it shares its data with others. In this article, we present a java application based on Local Distortion Hiding (LDH) algorithm that is being used to hide decision tree (DT) rules using Java, integrated with the Waikato Environment for Knowledge Analysis (Weka) data mining software library. Users may select a data set, and by visualizing it as a J48 decision tree could perform the hiding procedure of the LDH algorithm and consequently produce the modified data set, which ultimately leads to a DT that the sensitive pattern has been successfully hidden.

References

  1. Verykios, V.S.; Bertino, E.; Fovino, I.; Provenza, L.; Saygin, Y.;Theodoridis, Y. State-of-the-art in privacy-preserving data mining. ACM SIGMOD Record 2004, 33, 50, doi:10.1145/974121.974131.Google ScholarGoogle Scholar
  2. Brumen, B.; Heričko, M.; Sevčnikar, A.; Završnik, J.; Hölbl, M.; Outsourcing Medical Data Analyses: Can Technology Overcome Legal, Privacy, and Confidentiality Issues? J. Med. Int. Res. 2013, 15, e283, doi:10.2196/jmir.2471.Google ScholarGoogle ScholarCross RefCross Ref
  3. Agrawal, R.; Srikant, R. Privacy-preserving data mining. In Proceedings Of the 2000 ACM SIGMOD International Conference On Management Of Data—SIGMOD '00, Dallas, Texas, USA, May 15 - 18, 2000; doi:10.1145/342009.335438.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Gkoulalas-Divanis, A.; Verykios, V.S. Privacy-Preserving Data Mining: How far can we go?, pages 1-21. Handbook of Research on Data Mining In Public And Private Sectors: Organizational and Governmental Applications. IGI Global, 2009; doi:10.4018/9781605669069.ch007.Google ScholarGoogle Scholar
  5. Estivill-Castro, V.; Brankovic, L. 1999. Data swapping: Balancing privacy against precision in mining for logic rules. In DaWaK '99, Proceedings of the First International Conference on Data Warehousing and Knowledge Discovery, Florence, Italy, August 30 - September 1, 1999; Springer-Verlag London, UK, 1999; pp. 389–398.Google ScholarGoogle Scholar
  6. Chang, L.; Moskowitz, I. Parsimonious downgrading and decision trees applied to the inference problem. In Proceedings Of The 1998 Workshop On New Security Paradigms—NSPW '98, Charlottesville, VA, USA, September 22 - 26, 1998; doi:10.1145/310889.310921.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Natwichai, J.; Li, X.; Orlowska, M. Hiding Classification Rules for Data Sharing with Privacy Preservation. In Proceedings of the 7th International Conference, DaWak 2005, Copenhagen, Denmark, August 22-26, 2005; pp. 468-467.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Natwichai, J.; Li, X.; Orlowska, M. A Reconstruction-based Algorithm for Classification Rules Hiding. In Proceedings of 17th Australasian Database Conference, (ADC2006), Hobart, Tasmania, Australia, 16-19 January 2006; pp. 49-58.Google ScholarGoogle Scholar
  9. Quinlan, J.R. C4.5. Programs for Machine Learning. Morgan Kaufmann: San Francisco, CA, USA, 1993.Google ScholarGoogle Scholar
  10. Cohen, W.W. Fast, effective rule induction. In: Machine Learning: In Proceedings of the Twelfth International Conference on Machine Learning, Tahoe City, California, July 9-12, 1995; doi:10.1016/b978-1-55860-377-6.50023-2.Google ScholarGoogle Scholar
  11. Katsarou, A.; Gkouvalas-Divanis, A.; Verykios, V.S. Reconstruction-based Classification Rule Hiding through Controlled Data Modification. In IFIP International Federation for Information Processing, Volume 296; Artificial Intelligence Applications and Innovations III; Eds.Iliadis, L., Vlahavas, I., Bramer, M.; (Boston: Springer), pp. 449–458Google ScholarGoogle Scholar
  12. Natwichai, J.; Sun, X.; Li, X.: Data Reduction Approach for Sensitive Associative Classification Rule Hiding. In Proceedings of the 19th Australian Database Conference, January 22-25, 2008, Wollongong, NSW, Australia.Google ScholarGoogle Scholar
  13. Ke Wang; Fung, B.; Yu, P. Template-Based Privacy Preservation in Classification Problems. In Proceedings of the Fifth IEEE International Conference On Data Mining (ICDM'05), Houston, Texas, 27-30 Nov. 2005; doi:10.1109/icdm.2005.142.Google ScholarGoogle Scholar
  14. Delis, A.; Verykios, V.; Tsitsonis, A. A data perturbation approach to sensitive classification rule hiding. In Proceedings Of The 2010 ACM Symposium On Applied Computing—SAC '10, Sierre, Switzerland, March 22 - 26, 2010; doi:10.1145/1774088.1774216.Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Bost, R., Popa, R., Tu, S., & Goldwasser, S. (2015). Machine Learning Classification over Encrypted Data. In Proceedings of the 2015 Network And Distributed System Security Symposium, February 8-11, 2015 at the Catamaran Resort Hotel and Spa in San Diego, California.; doi:10.14722/ndss.2015.23241.Google ScholarGoogle ScholarCross RefCross Ref
  16. Tai, R., Ma, J., Zhao, Y., & Chow, S. (2017). Privacy-Preserving Decision Trees Evaluation via Linear Functions. Comput. Secur. ESORICS 2017, 494-512, doi:10.1007/978-3-319-66399-9_27.Google ScholarGoogle ScholarCross RefCross Ref
  17. Kalles, D.; Verykios, V.S.; Feretzakis, G.; Papagelis, A. Data set operations to hide decision tree rules. In Proceedings of the Twenty-second European Conference on Artificial Intelligence, Hague, The Netherlands, 29 August–2 September 2016.Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Kalles, D.; Verykios, V.; Feretzakis, G.; Papagelis, A. Data set operations to hide decision tree rules. In Proceedings of the 1St International Workshop on AI for Privacy and Security—Praise ‘16, Hague, The Netherlands, 29–30 August 2016.Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Feretzakis, G.; Kalles, D.; Verykios, V. On Using Linear Diophantine Equations for Efficient Hiding of Decision Tree Rules. In Proceedings of the 10th Hellenic Conference on Artificial Intelligence—SETN ‘18, Patras, Greece, 9–12 July 2018.Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Feretzakis, G.; Kalles, D.; Verykios, V.S. On Using Linear Diophantine Equations for in-Parallel Hiding of Decision Tree Rules. Entropy 2019, 21, 66, doi:10.3390/e21010066.Google ScholarGoogle Scholar
  21. Feretzakis, G.; Kalles, D.; Verykios, V.S. Using Minimum Local Distortion to Hide Decision Tree Rules. Entropy 2019, 21, 334, doi: 10.3390/e21040334Google ScholarGoogle Scholar
  22. Feretzakis, G.; Kalles, D.; Verykios, V.S., Hiding Decision Tree Rules in Medical Data: A Case Study, Studies in Health Technology and Informatics, Health Informatics Vision: From Data via Information to Knowledge 262 (2019), 368 – 371, doi: 10.3233/SHTI190095.Google ScholarGoogle Scholar
  23. Feretzakis, G.; Kalles, D.; Verykios, V.S., Local Distortion Hiding in Financial Technology application: a case study with a benchmark data set, 10th International Conference on Information, Intelligence, Systems and Applications (IISA), 2019, doi: 10.1109/IISA.2019.8900733Google ScholarGoogle Scholar
  24. Kalles, D.; Morris, T. Efficient incremental induction of decision trees. Mach. Learn. 1996, 24, 231–242, doi:10.1007/bf00058613.Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Kalles, D.; Papagelis, A. Stable decision trees: Using local anarchy for efficient incremental learning. Int. J. Artif. Intell. Tools 2000, 9, 79–95, doi:10.1142/s0218213000000070.Google ScholarGoogle Scholar
  26. Kalles, D.; Papagelis, A. Lossless fitness inheritance in genetic algorithms for decision trees. Soft Comput. 2009, 14, 973–993, doi:10.1007/s00500-009-0489-y.Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Quinlan, J.R. Induction of Decision Trees. In Machine Learning 1; Kluwer Academic Publishers: Boston, MA, USA, 1986; pp. 81–106.Google ScholarGoogle Scholar
  28. Eibe Frank, Mark A. Hall, and Ian H. Witten (2016). The WEKA Workbench. Online Appendix for "Data Mining: Practical Machine Learning Tools and Techniques", Morgan Kaufmann, Fourth Edition, 2016.Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Gansner, E.; Koutsofios, E. & North, S. (2006), 'Drawing graphs with dot'Google ScholarGoogle Scholar
  30. Shapiro, A.D., Structured Induction in Expert Systems. Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA, 1987; ISBN 0-201-17813-3Google ScholarGoogle Scholar
  31. Dua, D.; Karra Graff, C. UCI Machine Learning Repository Irvine, CA: the University of California, School of Information and Computer Science, 2019. Available online: http://archive.ics.uci.edu/ml (accessed on 16 April 2019).Google ScholarGoogle Scholar
  32. Local Distortion Hiding (LDH) Algorithm: a Java–based prototype. Available online: http://www.learningalgorithm.eu/datafiles_SETN2020.html (accessed on 26 May 2020).Google ScholarGoogle Scholar
  33. Ellson, J., Gansner, E., Koutsofios, L., North, S. C. & Woodhull, G. ; Graphviz — Open source graph drawing tools, - 2001. Graph Drawing. doi:10.1007/3-540-45848-4_57Google ScholarGoogle Scholar
  34. S. M. Vieira, U. Kaymak and J. M. C. Sousa, "Cohen's kappa coefficient as a performance measure for feature selection," International Conference on Fuzzy Systems, Barcelona, 2010, pp. 1-8.doi: 10.1109/FUZZY.2010.5584447Google ScholarGoogle Scholar
  35. "Analysis Of German Credit Data | Stat 508." Available online: https://newonlinecourses.science.psu.edu/stat508/resource/analysis/gcd. (accessed on 16 April 2019).Google ScholarGoogle Scholar
  36. Hall, M.; Frank, E.; Holmes, G.; Pfahringer, B.; Reutemann, P.; Witten, I. The WEKA data mining software. ACM SIGKDD Explor. Newsletter. 2009, 11, 10–18.Google ScholarGoogle ScholarDigital LibraryDigital Library
  1. Local Distortion Hiding (LDH) Algorithm: a Java-based prototype

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format