Enabling Multi-level Trust in Privacy Preserving Data Mining
Yaping Li and Minghua Chen
EECS Department, University of California, Berkeley
Technical Report No. UCB/EECS-2008-156
December 13, 2008
http://www2.eecs.berkeley.edu/Pubs/TechRpts/2008/EECS-2008-156.pdf
Privacy Preserving Data Mining (PPDM) addresses the problem of developing accurate models about aggregated data without access to precise information in individual data record. A widely studied perturbation-based PPDM approach introduces random perturbation to individual values to preserve privacy before data is published. Previous solutions of this approach are limited in their tacit assumption of a single-level trust on data miners.
In this work, we relax this assumption and expand the scope of perturbation-based PPDM to Multi-Level Trust (MLT-PPDM). In our setting, the more trusted a data miner is, the less perturbed copy of the data it can access. Under this setting, a malicious data miner may have the access to differently perturbed copies of the same data through various means, and may combine these diverse copies to jointly infer additional information about the original data that the data owner does not intend to release. Preventing such diversity attacks is the key challenge of providing MLT-PPDM service. We address this challenge by properly correlating perturbation across copies at different trust levels. We prove that our solution is robust against diversity attacks with respect to our privacy goal. That is, for data miners who have the access to an arbitrary collection of the perturbed copies, our solution prevent them from jointly reconstructing the original data more accurately than the best effort using any individual copies in the collection. Our solution allows a data owner to generate perturbed copies of its data for arbitrary trust levels on-demand. This feature offers data owners maximum flexibility.
BibTeX citation:
@techreport{Li:EECS-2008-156, Author= {Li, Yaping and Chen, Minghua}, Title= {Enabling Multi-level Trust in Privacy Preserving Data Mining}, Year= {2008}, Month= {Dec}, Url= {http://www2.eecs.berkeley.edu/Pubs/TechRpts/2008/EECS-2008-156.html}, Number= {UCB/EECS-2008-156}, Abstract= {Privacy Preserving Data Mining (PPDM) addresses the problem of developing accurate models about aggregated data without access to precise information in individual data record. A widely studied perturbation-based PPDM approach introduces random perturbation to individual values to preserve privacy before data is published. Previous solutions of this approach are limited in their tacit assumption of a single-level trust on data miners. In this work, we relax this assumption and expand the scope of perturbation-based PPDM to Multi-Level Trust (MLT-PPDM). In our setting, the more trusted a data miner is, the less perturbed copy of the data it can access. Under this setting, a malicious data miner may have the access to differently perturbed copies of the same data through various means, and may combine these diverse copies to jointly infer additional information about the original data that the data owner does not intend to release. Preventing such diversity attacks is the key challenge of providing MLT-PPDM service. We address this challenge by properly correlating perturbation across copies at different trust levels. We prove that our solution is robust against diversity attacks with respect to our privacy goal. That is, for data miners who have the access to an arbitrary collection of the perturbed copies, our solution prevent them from jointly reconstructing the original data more accurately than the best effort using any individual copies in the collection. Our solution allows a data owner to generate perturbed copies of its data for arbitrary trust levels on-demand. This feature offers data owners maximum flexibility.}, }
EndNote citation:
%0 Report %A Li, Yaping %A Chen, Minghua %T Enabling Multi-level Trust in Privacy Preserving Data Mining %I EECS Department, University of California, Berkeley %D 2008 %8 December 13 %@ UCB/EECS-2008-156 %U http://www2.eecs.berkeley.edu/Pubs/TechRpts/2008/EECS-2008-156.html %F Li:EECS-2008-156