ABSTRACT
Data sharing among organizations has become an increasingly common process, but any part will most likely try to hide some sensitive patterns before it shares its data with others. In this article, we present a java application based on Local Distortion Hiding (LDH) algorithm that is being used to hide decision tree (DT) rules using Java, integrated with the Waikato Environment for Knowledge Analysis (Weka) data mining software library. Users may select a data set, and by visualizing it as a J48 decision tree could perform the hiding procedure of the LDH algorithm and consequently produce the modified data set, which ultimately leads to a DT that the sensitive pattern has been successfully hidden.
- Verykios, V.S.; Bertino, E.; Fovino, I.; Provenza, L.; Saygin, Y.;Theodoridis, Y. State-of-the-art in privacy-preserving data mining. ACM SIGMOD Record 2004, 33, 50, doi:10.1145/974121.974131.Google Scholar
- Brumen, B.; Heričko, M.; Sevčnikar, A.; Završnik, J.; Hölbl, M.; Outsourcing Medical Data Analyses: Can Technology Overcome Legal, Privacy, and Confidentiality Issues? J. Med. Int. Res. 2013, 15, e283, doi:10.2196/jmir.2471.Google ScholarCross Ref
- Agrawal, R.; Srikant, R. Privacy-preserving data mining. In Proceedings Of the 2000 ACM SIGMOD International Conference On Management Of Data—SIGMOD '00, Dallas, Texas, USA, May 15 - 18, 2000; doi:10.1145/342009.335438.Google ScholarDigital Library
- Gkoulalas-Divanis, A.; Verykios, V.S. Privacy-Preserving Data Mining: How far can we go?, pages 1-21. Handbook of Research on Data Mining In Public And Private Sectors: Organizational and Governmental Applications. IGI Global, 2009; doi:10.4018/9781605669069.ch007.Google Scholar
- Estivill-Castro, V.; Brankovic, L. 1999. Data swapping: Balancing privacy against precision in mining for logic rules. In DaWaK '99, Proceedings of the First International Conference on Data Warehousing and Knowledge Discovery, Florence, Italy, August 30 - September 1, 1999; Springer-Verlag London, UK, 1999; pp. 389–398.Google Scholar
- Chang, L.; Moskowitz, I. Parsimonious downgrading and decision trees applied to the inference problem. In Proceedings Of The 1998 Workshop On New Security Paradigms—NSPW '98, Charlottesville, VA, USA, September 22 - 26, 1998; doi:10.1145/310889.310921.Google ScholarDigital Library
- Natwichai, J.; Li, X.; Orlowska, M. Hiding Classification Rules for Data Sharing with Privacy Preservation. In Proceedings of the 7th International Conference, DaWak 2005, Copenhagen, Denmark, August 22-26, 2005; pp. 468-467.Google ScholarDigital Library
- Natwichai, J.; Li, X.; Orlowska, M. A Reconstruction-based Algorithm for Classification Rules Hiding. In Proceedings of 17th Australasian Database Conference, (ADC2006), Hobart, Tasmania, Australia, 16-19 January 2006; pp. 49-58.Google Scholar
- Quinlan, J.R. C4.5. Programs for Machine Learning. Morgan Kaufmann: San Francisco, CA, USA, 1993.Google Scholar
- Cohen, W.W. Fast, effective rule induction. In: Machine Learning: In Proceedings of the Twelfth International Conference on Machine Learning, Tahoe City, California, July 9-12, 1995; doi:10.1016/b978-1-55860-377-6.50023-2.Google Scholar
- Katsarou, A.; Gkouvalas-Divanis, A.; Verykios, V.S. Reconstruction-based Classification Rule Hiding through Controlled Data Modification. In IFIP International Federation for Information Processing, Volume 296; Artificial Intelligence Applications and Innovations III; Eds.Iliadis, L., Vlahavas, I., Bramer, M.; (Boston: Springer), pp. 449–458Google Scholar
- Natwichai, J.; Sun, X.; Li, X.: Data Reduction Approach for Sensitive Associative Classification Rule Hiding. In Proceedings of the 19th Australian Database Conference, January 22-25, 2008, Wollongong, NSW, Australia.Google Scholar
- Ke Wang; Fung, B.; Yu, P. Template-Based Privacy Preservation in Classification Problems. In Proceedings of the Fifth IEEE International Conference On Data Mining (ICDM'05), Houston, Texas, 27-30 Nov. 2005; doi:10.1109/icdm.2005.142.Google Scholar
- Delis, A.; Verykios, V.; Tsitsonis, A. A data perturbation approach to sensitive classification rule hiding. In Proceedings Of The 2010 ACM Symposium On Applied Computing—SAC '10, Sierre, Switzerland, March 22 - 26, 2010; doi:10.1145/1774088.1774216.Google ScholarDigital Library
- Bost, R., Popa, R., Tu, S., & Goldwasser, S. (2015). Machine Learning Classification over Encrypted Data. In Proceedings of the 2015 Network And Distributed System Security Symposium, February 8-11, 2015 at the Catamaran Resort Hotel and Spa in San Diego, California.; doi:10.14722/ndss.2015.23241.Google ScholarCross Ref
- Tai, R., Ma, J., Zhao, Y., & Chow, S. (2017). Privacy-Preserving Decision Trees Evaluation via Linear Functions. Comput. Secur. ESORICS 2017, 494-512, doi:10.1007/978-3-319-66399-9_27.Google ScholarCross Ref
- Kalles, D.; Verykios, V.S.; Feretzakis, G.; Papagelis, A. Data set operations to hide decision tree rules. In Proceedings of the Twenty-second European Conference on Artificial Intelligence, Hague, The Netherlands, 29 August–2 September 2016.Google ScholarDigital Library
- Kalles, D.; Verykios, V.; Feretzakis, G.; Papagelis, A. Data set operations to hide decision tree rules. In Proceedings of the 1St International Workshop on AI for Privacy and Security—Praise ‘16, Hague, The Netherlands, 29–30 August 2016.Google ScholarDigital Library
- Feretzakis, G.; Kalles, D.; Verykios, V. On Using Linear Diophantine Equations for Efficient Hiding of Decision Tree Rules. In Proceedings of the 10th Hellenic Conference on Artificial Intelligence—SETN ‘18, Patras, Greece, 9–12 July 2018.Google ScholarDigital Library
- Feretzakis, G.; Kalles, D.; Verykios, V.S. On Using Linear Diophantine Equations for in-Parallel Hiding of Decision Tree Rules. Entropy 2019, 21, 66, doi:10.3390/e21010066.Google Scholar
- Feretzakis, G.; Kalles, D.; Verykios, V.S. Using Minimum Local Distortion to Hide Decision Tree Rules. Entropy 2019, 21, 334, doi: 10.3390/e21040334Google Scholar
- Feretzakis, G.; Kalles, D.; Verykios, V.S., Hiding Decision Tree Rules in Medical Data: A Case Study, Studies in Health Technology and Informatics, Health Informatics Vision: From Data via Information to Knowledge 262 (2019), 368 – 371, doi: 10.3233/SHTI190095.Google Scholar
- Feretzakis, G.; Kalles, D.; Verykios, V.S., Local Distortion Hiding in Financial Technology application: a case study with a benchmark data set, 10th International Conference on Information, Intelligence, Systems and Applications (IISA), 2019, doi: 10.1109/IISA.2019.8900733Google Scholar
- Kalles, D.; Morris, T. Efficient incremental induction of decision trees. Mach. Learn. 1996, 24, 231–242, doi:10.1007/bf00058613.Google ScholarDigital Library
- Kalles, D.; Papagelis, A. Stable decision trees: Using local anarchy for efficient incremental learning. Int. J. Artif. Intell. Tools 2000, 9, 79–95, doi:10.1142/s0218213000000070.Google Scholar
- Kalles, D.; Papagelis, A. Lossless fitness inheritance in genetic algorithms for decision trees. Soft Comput. 2009, 14, 973–993, doi:10.1007/s00500-009-0489-y.Google ScholarDigital Library
- Quinlan, J.R. Induction of Decision Trees. In Machine Learning 1; Kluwer Academic Publishers: Boston, MA, USA, 1986; pp. 81–106.Google Scholar
- Eibe Frank, Mark A. Hall, and Ian H. Witten (2016). The WEKA Workbench. Online Appendix for "Data Mining: Practical Machine Learning Tools and Techniques", Morgan Kaufmann, Fourth Edition, 2016.Google ScholarDigital Library
- Gansner, E.; Koutsofios, E. & North, S. (2006), 'Drawing graphs with dot'Google Scholar
- Shapiro, A.D., Structured Induction in Expert Systems. Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA, 1987; ISBN 0-201-17813-3Google Scholar
- Dua, D.; Karra Graff, C. UCI Machine Learning Repository Irvine, CA: the University of California, School of Information and Computer Science, 2019. Available online: http://archive.ics.uci.edu/ml (accessed on 16 April 2019).Google Scholar
- Local Distortion Hiding (LDH) Algorithm: a Java–based prototype. Available online: http://www.learningalgorithm.eu/datafiles_SETN2020.html (accessed on 26 May 2020).Google Scholar
- Ellson, J., Gansner, E., Koutsofios, L., North, S. C. & Woodhull, G. ; Graphviz — Open source graph drawing tools, - 2001. Graph Drawing. doi:10.1007/3-540-45848-4_57Google Scholar
- S. M. Vieira, U. Kaymak and J. M. C. Sousa, "Cohen's kappa coefficient as a performance measure for feature selection," International Conference on Fuzzy Systems, Barcelona, 2010, pp. 1-8.doi: 10.1109/FUZZY.2010.5584447Google Scholar
- "Analysis Of German Credit Data | Stat 508." Available online: https://newonlinecourses.science.psu.edu/stat508/resource/analysis/gcd. (accessed on 16 April 2019).Google Scholar
- Hall, M.; Frank, E.; Holmes, G.; Pfahringer, B.; Reutemann, P.; Witten, I. The WEKA data mining software. ACM SIGKDD Explor. Newsletter. 2009, 11, 10–18.Google ScholarDigital Library
- Local Distortion Hiding (LDH) Algorithm: a Java-based prototype
Recommendations
Privacy-preserving data hiding with robustness based on selective encryption and matrix embedding
AbstractWith the increasing need for privacy-preserving, data hiding in encrypted images has attracted more attention in the data hiding area. The existing data hiding methods for encrypted images mainly focus on improving the embedding capacity. Recently,...
Authenticable reversible data hiding scheme with less distortion in dual stego-images
In reversible data hiding, dual image-based data hiding methods are recently proposed, in which two stego-images are generated after embedding the secret data. In this paper, a new reversible data hiding method is proposed to provide less distortion and ...
Adaptive reversible data hiding based on a local smoothness estimator
A novel reversible watermarking (RW) scheme based on a local smoothness estimator and multi-step embedding strategy is proposed in this paper. All the pixels are divided into four equal parts. Correspondingly, the watermark embedding process is ...
Comments