Illustration: 3-Party Secure Sum Compare, match, and analyze data from different organizations without disclosing the private data to any other party Experimental.

Slides:



Advertisements
Similar presentations
Location Based Services and Privacy Issues
Advertisements

Kerberos 1 Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530–520 BC. From Italy (?).
Resource Management §A resource can be a logical, such as a shared file, or physical, such as a CPU (a node of the distributed system). One of the functions.
PIR-Tor: Scalable Anonymous Communication Using Private Information Retrieval Prateek Mittal University of Illinois Urbana-Champaign Joint work with: Femi.
ITIS 6200/ Secure multiparty computation – Alice has x, Bob has y, we want to calculate f(x, y) without disclosing the values – We can only do.
Multiple Criteria Decision Analysis with Game-theoretic Rough Sets Nouman Azam and JingTao Yao Department of Computer Science University of Regina CANADA.
Principles of Personalisation of Service Discovery Electronics and Computer Science, University of Southampton myGrid UK e-Science Project Juri Papay,
Lect. 18: Cryptographic Protocols. 2 1.Cryptographic Protocols 2.Special Signatures 3.Secret Sharing and Threshold Cryptography 4.Zero-knowledge Proofs.
Sogang University ICC Lab Using Game Theory to Analyze Wireless Ad Hoc networks.
Li Xiong CS573 Data Privacy and Security Privacy Preserving Data Mining – Secure multiparty computation and random response techniques.
Chapter 13 (Web): Distributed Databases
Chapter 21 Successfully Implementing The Information System
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Peer-to-Peer Networking By: Peter Diggs Ken Arrant.
Establishment of Conference Keys in Heterogeneous Networks Wade Trappe, Yuke Wang, K. J. Ray Liu ICC IEEE International Conference.
Dynamic Network Security Deployment under Partial Information George Theodorakopoulos (EPFL) John S. Baras (UMD) Jean-Yves Le Boudec (EPFL) September 24,
Cooperative Q-Learning Lars Blackmore and Steve Block Expertness Based Cooperative Q-learning Ahmadabadi, M.N.; Asadpour, M IEEE Transactions on Systems,
EEC-681/781 Distributed Computing Systems Lecture 3 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
RETSINA: A Distributed Multi-Agent Infrastructure for Information Gathering and Decision Support The Robotics Institute Carnegie Mellon University PI:
A Game Theoretic Approach to Provide Incentive and Service Differentiation in P2P Networks Richard Ma, Sam Lee, John Lui (CUHK) David Yau (Purdue)
SecureDIS: a Framework for Secure Data Integration Systems
1 An Incentive Mechanism for Message Relaying in Peer-to- Peer Discovery Cuihong Li (TSoB), Bin Yu (RI) and Katia Sycara (RI) Carnegie Mellon Unversity.
Database Laboratory Regular Seminar TaeHoon Kim.
CS573 Data Privacy and Security
Game Theory and Privacy Preservation in Recommendation Systems Iordanis Koutsopoulos U of Thessaly Thalis project CROWN Kick-off Meeting Volos, May 11,
Strategic Modeling of Information Sharing among Data Privacy Attackers Quang Duong, Kristen LeFevre, and Michael Wellman University of Michigan Presented.
A Distributed and Privacy Preserving Algorithm for Identifying Information Hubs in Social Networks M.U. Ilyas, Z Shafiq, Alex Liu, H Radha Michigan State.
By: Gang Zhou Computer Science Department University of Virginia 1 A Game-Theoretic Framework for Congestion Control in General Topology Networks SYS793.
Database Design - Lecture 1
1 Data Mining Books: 1.Data Mining, 1996 Pieter Adriaans and Dolf Zantinge Addison-Wesley 2.Discovering Data Mining, 1997 From Concept to Implementation.
1 IEEE Trans. on Smart Grid, 3(1), pp , Optimal Power Allocation Under Communication Network Externalities --M.G. Kallitsis, G. Michailidis.
Overview of Privacy Preserving Techniques.  This is a high-level summary of the state-of-the-art privacy preserving techniques and research areas  Focus.
Data mining and machine learning A brief introduction.
Consensus-based Distributed Estimation in Camera Networks - A. T. Kamal, J. A. Farrell, A. K. Roy-Chowdhury University of California, Riverside
Lyon, June 26th 2006 ICPS'06: IEEE International Conference on Pervasive Services 2006 Routing and Localization Services in Self-Organizing Wireless Ad-Hoc.
Haimonti Dutta 1 and Hillol Kargupta 2 1 Center for Computational Learning Systems (CCLS), Columbia University, NY, USA. 2 University of Maryland, Baltimore.
Secure Incremental Maintenance of Distributed Association Rules.
Incentive Compatible Assured Information Sharing Murat Kantarcioglu.
Privacy Preserving Data Sharing With Anonymous ID Assignment
Privacy-Aware Personalization for Mobile Advertising
m-Privacy for Collaborative Data Publishing
Linked-data and the Internet of Things Payam Barnaghi Centre for Communication Systems Research University of Surrey March 2012.
Tools for Privacy Preserving Distributed Data Mining
Mining Multiple Private Databases Topk Queries Across Multiple Private Databases (2005) Li Xiong (Emory University) Subramanyam Chitti (GA Tech) Ling Liu.
Secure Sensor Data/Information Management and Mining Bhavani Thuraisingham The University of Texas at Dallas October 2005.
Data Mining Algorithms for Large-Scale Distributed Systems Presenter: Ran Wolff Joint work with Assaf Schuster 2003.
Mining Multiple Private Databases Topk Queries Across Multiple Private Databases (2005) Mining Multiple Private Databases Using a kNN Classifier (2007)
TagLearner: A P2P Classifier Learning System from Collaboratively Tagged Text Documents Haimonti Dutta 1, Xianshu Zhu 2, Tushar Muhale 2, Hillol Kargupta.
Privacy-preserving rule mining. Outline  A brief introduction to association rule mining  Privacy preserving rule mining Single party  Perturbation.
Privacy-Preserving K-means Clustering over Vertically Partitioned Data Reporter : Ximeng Liu Supervisor: Rongxing Lu School of EEE, NTU
Information Theory for Mobile Ad-Hoc Networks (ITMANET): The FLoWS Project Competitive Scheduling in Wireless Networks with Correlated Channel State Ozan.
CS 484 Designing Parallel Algorithms Designing a parallel algorithm is not easy. There is no recipe or magical ingredient Except creativity We can benefit.
Lecture 13: Anonymity on the Web Modified from Levente Buttyan, Michael K. Reiter and Aviel D. Rubin.
Security Issues in Distributed Sensor Networks Yi Sun Department of Computer Science and Electrical Engineering University of Maryland, Baltimore County.
m-Privacy for Collaborative Data Publishing
Privacy Issues in Smart Grid R. Newman. Topics Defining anonymity Need for anonymity Defining privacy Threats to anonymity and privacy Mechanisms to provide.
1 Privacy Preserving Data Mining Introduction August 2 nd, 2013 Shaibal Chakrabarty.
Differential Privacy Xintao Wu Oct 31, Sanitization approaches Input perturbation –Add noise to data –Generalize data Summary statistics –Means,
KNOWLEDGE MANAGEMENT UNIT II KNOWLEDGE MANAGEMENT AND TECHNOLOGY 1.
1 Secure Protocols for Supply Chain Collaboration: Capacity Allocation and Collaborative Forecasting Vinayak Deshpande Krannert School of Management Purdue.
1 Traffic Engineering By Kavitha Ganapa. 2 Introduction Traffic engineering is concerned with the issue of performance evaluation and optimization of.
UMBC AN HONORS UNIVERSITY IN MARYLAND A Framework for Managing the Assured Information Sharing Lifecycle Overview 18 September 2009 use acquir e discove.
Advanced Database Course Syllabus 1 Advanced Database System Lecturer : H.Ben Othmen.
Big Data Security Issues in Cloud Management. BDWG Big Data Working Group Researchers 1: Data analytics for security 2: Privacy preserving 3: Big data-scale.
Privacy Preserving Data Mining
Security & .NET 12/1/2018.
DATA RETRIEVAL IN ADHOC NETWORKS
Richard Ma, Sam Lee, John Lui (CUHK) David Yau (Purdue)
Presentation transcript:

Illustration: 3-Party Secure Sum Compare, match, and analyze data from different organizations without disclosing the private data to any other party Experimental Results Privacy Preserving Distributed Data Mining: A Game Theoretic Approach Kamalika Das*, Hillol Kargupta** *University of Maryland, Baltimore County **University of Maryland, Baltimore County & Agnik, LLC Organization A Data Organization C Organization B Multi-Party PPDM as Games  Computation Strategies: Perform or not perform local computation  Communication Strategies: Send/Receive messages to other nodes in the network or not  Privacy Compromise due to Collusion: Whether or not to be part of a colluding group to reveal others’ private data Personalized Privacy in Distributed Environment  Privacy: a social concept  Amount of resources vary across users  Distributed multi-objective optimization gives parameter values for privacy model  Mechanism design to incorporate penalty in protocol Penalty for Desired Equilibrium  Centralized Control  Global Synchronization  Trusted Third Party  Auditing Device  Distributed Control  Distributed Decision  Keep nodes in the system References: [1] H. Kargupta, K. Das, and K. Liu. Multi-party, Privacy-Preserving Distributed Data Mining Using a Game Theoretic Framework. Proceedings of the 11th European Conference on Principles and Practice of Knowledge Discovery in Databases (PKDD'07), Warsaw, Poland, Lecture Notes in Artificial Intelligence 4702, Springer 2007, pp [2] K. Das, K. Bhaduri and H. Kargupta. A Distributed Asynchronous Local Algorithm Using Multi-Party Optimization based Privacy Preservation (in communication) [3] K. Das, K. Bhaduri and H. Kargupta. Address-Free Communication and Scalable Privacy Preserving Data Mining Algorithms for Peer-to-Peer Networks (in communication) [4] K. Das and H. Kargupta. A Game-Theoretic Framework for Distributed Privacy Preserving Secure Sum Computation (in communication) Secure Sum with Penalty Algorithm 1.Network has n nodes: nodes are good (n-k) or bad (k). Bad nodes form one colluding group 2.Good nodes solve local objective function based on estimated threat, desired privacy and cost constraints to decide on amount of penalty ( k ’). 3.To penalize bad nodes, good nodes split their data into  k ’ parts. 4.Bad nodes turn good at end of sum computation if cost is too high. Site worried about privacy u i (f ¾ i ; ¾ ¡ i g) = w i ; m c i ; m ( M i ) + w i ; r c i ; r ( R i ) + w i ; s c i ; s ( S i ) + w i ; g c i ; g ( G i ) ; ~ u i (f ¾ i ; ¾ ¡ i g) = u i (f ¾ i ; ¾ ¡ i g) ¡ ¤ ® k 0, w h ere® > 0 WORKS FOR REPEATED GAMES k is the number of colluders  Each party has an array of n numbers  Compute n sums without divulging individual numbers  Scenario: Sequence of secure sum computations v1v1 v2v2 z 2 =(z 1 +v 2 ) mod N v3v3 z 1 =(R+v 1 ) mod Nz 3 =(z 2 +v 3 ) mod N Overall utility for secure sum computation with punishment strategy. The optimal strategy takes a value of k =1. Overall utility for classical secure sum computation. The optimal strategy takes a value of k >1. Rate of decrease of bad nodes Collusion Utility vs. Total Cost Applications  Distributed privacy preserving ranking: Application in P2P web advertising  Distributed privacy preserving feature selection: Application in P2P decision tree induction D IADIC