Building decision tree classifier on private data

This paper studies how to build a decision tree classifier under the following scenario: a database is vertically partitioned into two pieces, with one piece owned by Alice and the other piece owned by Bob. Alice and Bob want to build a decision tree classifier based on such a database, but due to the privacy constraints, neither of them wants to disclose their private pieces to the other party or to any third party.We present a protocol that allows Alice and Bob to conduct such a classifier building without having to compromise their privacy. Our protocol uses an untrusted third-party server, and is built upon a useful building block, the scalar product protocol. Our solution to the scalar product protocol is more efficient than any existing solutions.

[1]  Wenliang Du,et al.  A study of several specific secure two-party computation problems , 2001 .

[2]  Wenliang Du,et al.  A practical approach to solve Secure Multi-party Computation problems , 2002, NSPW '02.

[3]  Silvio Micali,et al.  How to play ANY mental game , 1987, STOC.

[4]  Donald Beaver,et al.  Commodity-based cryptography (extended abstract) , 1997, STOC '97.

[5]  Andrew Chi-Chih Yao,et al.  Protocols for secure computations , 1982, FOCS 1982.

[6]  Rafail Ostrovsky,et al.  Universal service-providers for database private information retrieval (extended abstract) , 1998, PODC '98.

[7]  Donald Beaver,et al.  Server-assisted cryptography , 1998, NSPW '98.

[8]  Ramakrishnan Srikant,et al.  Privacy-preserving data mining , 2000, SIGMOD '00.

[9]  Shafi Goldwasser,et al.  Multi party computations: past and present , 1997, PODC '97.

[10]  Kyuseok Shim,et al.  PUBLIC: A Decision Tree Classifier that Integrates Building and Pruning , 1998, Data Mining and Knowledge Discovery.

[11]  Yehuda Lindell,et al.  Privacy Preserving Data Mining , 2000, Journal of Cryptology.

[12]  Charu C. Aggarwal,et al.  On the design and quantification of privacy preserving data mining algorithms , 2001, PODS.

[13]  Jaideep Vaidya,et al.  Privacy preserving association rule mining in vertically partitioned data , 2002, KDD.

[14]  Moti Yung,et al.  An Overview of Secure Distributed Computing , 1992 .

[15]  Wenliang Du,et al.  Secure Multi-party Computational Geometry , 2001, WADS.