Incentive Compatible Privacy-Preserving Data Analysis
ABSTRACT:
In many cases, competing parties who have private data may collaboratively
conduct privacy-preserving distributed data analysis (PPDA) tasks to learn
beneficial data models or analysis results. Most often, the competing parties have
different incentives. Although certain PPDA techniques guarantee that nothing
other than the final analysis result is revealed, it is impossible to verify whether
participating parties are truthful about their private input data. Unless proper
incentives are set, current PPDA techniques cannot prevent participating parties
from modifying their private inputs. This raises the question of how to design
incentive compatible privacy-preserving data analysis techniques that motivate
participating parties to provide truthful inputs. In this paper, we first develop key
theorems, then base on these theorems, we analyze certain important privacy-
preserving data analysis tasks that could be conducted in a way that telling the
truth is the best choice for any participating party.
EXISTING SYSTEM:
PRIVACY and security, particularly maintaining confidentiality of data, have
become a challenging issue with advances in information and communication
technology. The ability to communicate and share data has many benefits, and the
idea of an omniscient data source carries great value to research and building
accurate data analysis models. For example, for credit card companies to build
more comprehensive and accurate fraud detection system, credit card transaction
data from various companies may be needed to generate better data analysis
models.
DISADVANTAGES OF EXISTING SYSTEM:
To our knowledge, all the existing techniques assume that each participating party
use its true data during the distributed data mining protocol execution.
PROPOSED SYSTEM:
In this paper, we analyze what types of distributed functionalities could be
implemented in an incentive compatible fashion. In other words, we explore which
functionalities can be implemented in a way that participating parties have the
incentive to provide their true private inputs upon engaging in the corresponding
SMC protocols.
In this paper, we assume that the number of malicious or dishonest participating
parties can be at most n _ 1, where n is the number of parties. This assumption is
very general since most existing works in the area of privacy-preserving data
analysis assume either all participating parties are honest (or semi-honest) or the
majority of participating parties are honest. Thus, we extend the non-cooperative
computation definitions to incorporate cases where there are multiple dishonest
parties. In addition, we show that from incentive compatibility point of view, most
data analysis tasks need to be analyzed only for two party cases.
ADVANTAGES OF PROPOSED SYSTEM:
Privacy preserving data analysis tasks
SYSTEM CONFIGURATION:-
HARDWARE CONFIGURATION:-
 Processor - Pentium –IV
 Speed - 1.1 Ghz
 RAM - 256 MB(min)
 Hard Disk - 20 GB
 Key Board - Standard Windows Keyboard
 Mouse - Two or Three Button Mouse
 Monitor - SVGA
SOFTWARE CONFIGURATION:-
 Operating System : Windows XP
 Programming Language : JAVA/J2EE.
 Java Version : JDK 1.6 & above.
 Database : MYSQL
REFERENCE:
Murat Kantarcioglu and Wei Jiang, “Incentive Compatible Privacy-Preserving
Data Analysis”, IEEE TRANSACTIONS ON KNOWLEDGE AND DATA
ENGINEERING, VOL. 25, NO. 6, JUNE 2013.

More Related Content

DOCX
Incentive compatible privacy preserving data
DOC
IEEE 2014 JAVA DATA MINING PROJECTS M privacy for collaborative data publishing
DOCX
E commerce 2010 section- b
PDF
Final Poster for Engineering Showcase
PDF
ϵ-DIFFERENTIAL PRIVACY MODEL FOR VERTICALLY PARTITIONED DATA TO SECURE THE PR...
PDF
A Primer on Text Mining for Business
PDF
What is big data?
PPT
Defrag 2010 Collaborative Analytics
Incentive compatible privacy preserving data
IEEE 2014 JAVA DATA MINING PROJECTS M privacy for collaborative data publishing
E commerce 2010 section- b
Final Poster for Engineering Showcase
ϵ-DIFFERENTIAL PRIVACY MODEL FOR VERTICALLY PARTITIONED DATA TO SECURE THE PR...
A Primer on Text Mining for Business
What is big data?
Defrag 2010 Collaborative Analytics

What's hot (19)

PDF
Data and personalization
PDF
Data mining in social network
PDF
The business stakes of data integration
PDF
What is "data"?
PDF
Privacy Preserving Distributed Association Rule Mining Algorithm for Vertical...
PDF
LINK MINING PROCESS
DOCX
Preventing private information inference attacks on social networks
PDF
DOCX
efficient data query in intermittently-connected mobile ad hoc social networks
PDF
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...
PPT
Evolving social data mining and affective analysis
PDF
PUBLIC INTEGRIYT AUDITING FOR SHARED DYNAMIC DATA STORAGE UNDER ONTIME GENERA...
PDF
Big Data Analytics : A Social Network Approach
PDF
Nlp and semantic_web_for_competitive_int
PDF
Enhancing access privacy of range retrievals over b+trees
PDF
Privacy preserving
PPTX
User friendly pattern search paradigm
DOC
Poster Abstracts
Data and personalization
Data mining in social network
The business stakes of data integration
What is "data"?
Privacy Preserving Distributed Association Rule Mining Algorithm for Vertical...
LINK MINING PROCESS
Preventing private information inference attacks on social networks
efficient data query in intermittently-connected mobile ad hoc social networks
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...
Evolving social data mining and affective analysis
PUBLIC INTEGRIYT AUDITING FOR SHARED DYNAMIC DATA STORAGE UNDER ONTIME GENERA...
Big Data Analytics : A Social Network Approach
Nlp and semantic_web_for_competitive_int
Enhancing access privacy of range retrievals over b+trees
Privacy preserving
User friendly pattern search paradigm
Poster Abstracts
Ad

Viewers also liked (19)

DOCX
On the node clone detection in wireless sensor networks
PDF
Understanding the external links of video sharing sites measurement and analysis
DOCX
Minimum cost blocking problem in multi path wireless routing protocols
PPT
Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relation...
DOCX
Ip geolocation mapping for moderately connected internet regions
DOCX
Detection and localization of multiple spoofing attackers in wireless networks
DOCX
Warningbird a near real time detection system for suspicious urls in twitter ...
DOCX
Attribute based access to scalable media in cloud-assisted content sharing ne...
DOCX
Security threats to mobile multimedia applications camera based attacks on mo...
DOCX
Enforcing secure and privacy preserving information brokering in distributed ...
DOCX
A log based approach to make digital forensics easier on cloud computing
DOCX
A proxy based approach to continuous location-based spatial queries in mobile...
DOCX
Multicast capacity in manet with infrastructure support
DOCX
Local directional number pattern for face analysis face and expression recogn...
DOCX
Review of behavior malware analysis for android
DOCX
Bahg back bone-assisted hop greedy routing for vanet’s city environments
DOCX
Content sharing over smartphone based delay-tolerant networks
DOCX
Enabling dynamic data and indirect mutual trust for cloud computing storage s...
DOCX
Combining cryptographic primitives to prevent jamming attacks in wireless net...
On the node clone detection in wireless sensor networks
Understanding the external links of video sharing sites measurement and analysis
Minimum cost blocking problem in multi path wireless routing protocols
Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relation...
Ip geolocation mapping for moderately connected internet regions
Detection and localization of multiple spoofing attackers in wireless networks
Warningbird a near real time detection system for suspicious urls in twitter ...
Attribute based access to scalable media in cloud-assisted content sharing ne...
Security threats to mobile multimedia applications camera based attacks on mo...
Enforcing secure and privacy preserving information brokering in distributed ...
A log based approach to make digital forensics easier on cloud computing
A proxy based approach to continuous location-based spatial queries in mobile...
Multicast capacity in manet with infrastructure support
Local directional number pattern for face analysis face and expression recogn...
Review of behavior malware analysis for android
Bahg back bone-assisted hop greedy routing for vanet’s city environments
Content sharing over smartphone based delay-tolerant networks
Enabling dynamic data and indirect mutual trust for cloud computing storage s...
Combining cryptographic primitives to prevent jamming attacks in wireless net...
Ad

Similar to Incentive compatible privacy preserving data analysis (20)

DOCX
JAVA 2013 IEEE DATAMINING PROJECT Incentive Compatible Privacy-Preserving Dat...
PPTX
Incentive Compatible Privacy Preserving Data Analysis
DOC
Accuracy constrained privacy-preserving access control mechanism for relation...
DOC
Accuracy constrained privacy-preserving access control mechanism for relation...
DOCX
Privacy-preserving Crowd-sourced Statistical Data Publishing with An Untruste...
PDF
PRIVACY PRESERVING CLUSTERING IN DATA MINING USING VQ CODE BOOK GENERATION
PDF
Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...
PDF
78201919
PDF
78201919
PDF
AN EFFICIENT SOLUTION FOR PRIVACYPRESERVING, SECURE REMOTE ACCESS TO SENSITIV...
PDF
Data attribute security and privacy in Collaborative distributed database Pub...
PPTX
Final review m score
DOC
2014 IEEE JAVA DATA MINING PROJECT M privacy for collaborative data publishing
PDF
Ijeee 7-11-privacy preserving distributed data mining with anonymous id assig...
PDF
Privacy Preserving Aggregate Statistics for Mobile Crowdsensing
PDF
Multilevel Privacy Preserving by Linear and Non Linear Data Distortion
DOCX
accuracy-constrained privacy preserving access control mechanism for relation...
PDF
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...
DOCX
M privacy for collaborative data publishing
PDF
Privacy Preserving Data Mining Using Inverse Frequent ItemSet Mining Approach
JAVA 2013 IEEE DATAMINING PROJECT Incentive Compatible Privacy-Preserving Dat...
Incentive Compatible Privacy Preserving Data Analysis
Accuracy constrained privacy-preserving access control mechanism for relation...
Accuracy constrained privacy-preserving access control mechanism for relation...
Privacy-preserving Crowd-sourced Statistical Data Publishing with An Untruste...
PRIVACY PRESERVING CLUSTERING IN DATA MINING USING VQ CODE BOOK GENERATION
Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...
78201919
78201919
AN EFFICIENT SOLUTION FOR PRIVACYPRESERVING, SECURE REMOTE ACCESS TO SENSITIV...
Data attribute security and privacy in Collaborative distributed database Pub...
Final review m score
2014 IEEE JAVA DATA MINING PROJECT M privacy for collaborative data publishing
Ijeee 7-11-privacy preserving distributed data mining with anonymous id assig...
Privacy Preserving Aggregate Statistics for Mobile Crowdsensing
Multilevel Privacy Preserving by Linear and Non Linear Data Distortion
accuracy-constrained privacy preserving access control mechanism for relation...
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...
M privacy for collaborative data publishing
Privacy Preserving Data Mining Using Inverse Frequent ItemSet Mining Approach

Recently uploaded (20)

PDF
advance database management system book.pdf
PDF
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
PDF
BP 505 T. PHARMACEUTICAL JURISPRUDENCE (UNIT 2).pdf
PDF
LIFE & LIVING TRILOGY- PART (1) WHO ARE WE.pdf
PDF
Environmental Education MCQ BD2EE - Share Source.pdf
PDF
LIFE & LIVING TRILOGY - PART - (2) THE PURPOSE OF LIFE.pdf
PDF
English Textual Question & Ans (12th Class).pdf
PPTX
Virtual and Augmented Reality in Current Scenario
PDF
semiconductor packaging in vlsi design fab
PDF
HVAC Specification 2024 according to central public works department
PDF
Uderstanding digital marketing and marketing stratergie for engaging the digi...
PDF
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 2).pdf
PDF
Journal of Dental Science - UDMY (2021).pdf
PDF
LEARNERS WITH ADDITIONAL NEEDS ProfEd Topic
PPTX
Computer Architecture Input Output Memory.pptx
PDF
Mucosal Drug Delivery system_NDDS_BPHARMACY__SEM VII_PCI.pdf
PPTX
Core Concepts of Personalized Learning and Virtual Learning Environments
PDF
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
PDF
Paper A Mock Exam 9_ Attempt review.pdf.
PDF
Vision Prelims GS PYQ Analysis 2011-2022 www.upscpdf.com.pdf
advance database management system book.pdf
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
BP 505 T. PHARMACEUTICAL JURISPRUDENCE (UNIT 2).pdf
LIFE & LIVING TRILOGY- PART (1) WHO ARE WE.pdf
Environmental Education MCQ BD2EE - Share Source.pdf
LIFE & LIVING TRILOGY - PART - (2) THE PURPOSE OF LIFE.pdf
English Textual Question & Ans (12th Class).pdf
Virtual and Augmented Reality in Current Scenario
semiconductor packaging in vlsi design fab
HVAC Specification 2024 according to central public works department
Uderstanding digital marketing and marketing stratergie for engaging the digi...
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 2).pdf
Journal of Dental Science - UDMY (2021).pdf
LEARNERS WITH ADDITIONAL NEEDS ProfEd Topic
Computer Architecture Input Output Memory.pptx
Mucosal Drug Delivery system_NDDS_BPHARMACY__SEM VII_PCI.pdf
Core Concepts of Personalized Learning and Virtual Learning Environments
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
Paper A Mock Exam 9_ Attempt review.pdf.
Vision Prelims GS PYQ Analysis 2011-2022 www.upscpdf.com.pdf

Incentive compatible privacy preserving data analysis

  • 1. Incentive Compatible Privacy-Preserving Data Analysis ABSTRACT: In many cases, competing parties who have private data may collaboratively conduct privacy-preserving distributed data analysis (PPDA) tasks to learn beneficial data models or analysis results. Most often, the competing parties have different incentives. Although certain PPDA techniques guarantee that nothing other than the final analysis result is revealed, it is impossible to verify whether participating parties are truthful about their private input data. Unless proper incentives are set, current PPDA techniques cannot prevent participating parties from modifying their private inputs. This raises the question of how to design incentive compatible privacy-preserving data analysis techniques that motivate participating parties to provide truthful inputs. In this paper, we first develop key theorems, then base on these theorems, we analyze certain important privacy- preserving data analysis tasks that could be conducted in a way that telling the truth is the best choice for any participating party. EXISTING SYSTEM: PRIVACY and security, particularly maintaining confidentiality of data, have become a challenging issue with advances in information and communication
  • 2. technology. The ability to communicate and share data has many benefits, and the idea of an omniscient data source carries great value to research and building accurate data analysis models. For example, for credit card companies to build more comprehensive and accurate fraud detection system, credit card transaction data from various companies may be needed to generate better data analysis models. DISADVANTAGES OF EXISTING SYSTEM: To our knowledge, all the existing techniques assume that each participating party use its true data during the distributed data mining protocol execution. PROPOSED SYSTEM: In this paper, we analyze what types of distributed functionalities could be implemented in an incentive compatible fashion. In other words, we explore which functionalities can be implemented in a way that participating parties have the incentive to provide their true private inputs upon engaging in the corresponding SMC protocols. In this paper, we assume that the number of malicious or dishonest participating parties can be at most n _ 1, where n is the number of parties. This assumption is very general since most existing works in the area of privacy-preserving data analysis assume either all participating parties are honest (or semi-honest) or the
  • 3. majority of participating parties are honest. Thus, we extend the non-cooperative computation definitions to incorporate cases where there are multiple dishonest parties. In addition, we show that from incentive compatibility point of view, most data analysis tasks need to be analyzed only for two party cases. ADVANTAGES OF PROPOSED SYSTEM: Privacy preserving data analysis tasks SYSTEM CONFIGURATION:- HARDWARE CONFIGURATION:-  Processor - Pentium –IV  Speed - 1.1 Ghz  RAM - 256 MB(min)  Hard Disk - 20 GB  Key Board - Standard Windows Keyboard  Mouse - Two or Three Button Mouse  Monitor - SVGA
  • 4. SOFTWARE CONFIGURATION:-  Operating System : Windows XP  Programming Language : JAVA/J2EE.  Java Version : JDK 1.6 & above.  Database : MYSQL REFERENCE: Murat Kantarcioglu and Wei Jiang, “Incentive Compatible Privacy-Preserving Data Analysis”, IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 25, NO. 6, JUNE 2013.