Privacy-Preserving ID3 Algorithms: A Comparison

Nisha Thorakkattu Madathil, Fida K. Dankar

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Many real-life scenarios require the analysis of large amounts of data from multiple sources. Often, the data contain highly sensitive information and may be subject to privacy laws preventing its aggregation and sharing. Privacy-preserving data mining has emerged as a solution to this problem. It enables data scientists to analyze the distributed data without having to place it in a central location and while guaranteeing its privacy. Decision tree classification is a popular and widely studied machine learning technique for which many privacy-preserving versions exist. In this paper, we review recent privacy preserving implementations of the ID3 classification technique in a distributed environment and compare them in terms of efficiency and privacy. We consider cases where data is split horizontally over multiple parties.

Original languageEnglish
Title of host publication2021 IEEE 12th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference, UEMCON 2021
EditorsRajashree Paul
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages16-22
Number of pages7
ISBN (Electronic)9781665406901
DOIs
Publication statusPublished - 2021
Event12th IEEE Annual Ubiquitous Computing, Electronics and Mobile Communication Conference, UEMCON 2021 - New York, United States
Duration: Dec 1 2021Dec 4 2021

Publication series

Name2021 IEEE 12th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference, UEMCON 2021

Conference

Conference12th IEEE Annual Ubiquitous Computing, Electronics and Mobile Communication Conference, UEMCON 2021
Country/TerritoryUnited States
CityNew York
Period12/1/2112/4/21

Keywords

  • ID3
  • Privacy preserving data mining
  • Secure Multiparty Computation

ASJC Scopus subject areas

  • Artificial Intelligence
  • Computer Networks and Communications
  • Computer Science Applications
  • Hardware and Architecture
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Privacy-Preserving ID3 Algorithms: A Comparison'. Together they form a unique fingerprint.

Cite this