Incentive Compatible Privacy-Preserving Data Analysis
ABSTRACT:
In many cases, competing parties who have private data may collaboratively
conduct privacy-preserving distributed data analysis (PPDA) tasks to learn
beneficial data models or analysis results. Most often, the competing parties have
different incentives. Although certain PPDA techniques guarantee that nothing
other than the final analysis result is revealed, it is impossible to verify whether
participating parties are truthful about their private input data. Unless proper
incentives are set, current PPDA techniques cannot prevent participating parties
from modifying their private inputs. This raises the question of how to design
incentive compatible privacy-preserving data analysis techniques that motivate
participating parties to provide truthful inputs. In this paper, we first develop key
theorems, then base on these theorems, we analyze certain important privacy-
preserving data analysis tasks that could be conducted in a way that telling the
truth is the best choice for any participating party.
EXISTING SYSTEM:
PRIVACY and security, particularly maintaining confidentiality of data, have
become a challenging issue with advances in information and communication
technology. The ability to communicate and share data has many benefits, and the
idea of an omniscient data source carries great value to research and building
accurate data analysis models. For example, for credit card companies to build
more comprehensive and accurate fraud detection system, credit card transaction
data from various companies may be needed to generate better data analysis
models.
DISADVANTAGES OF EXISTING SYSTEM:
To our knowledge, all the existing techniques assume that each participating party
use its true data during the distributed data mining protocol execution.
PROPOSED SYSTEM:
In this paper, we analyze what types of distributed functionalities could be
implemented in an incentive compatible fashion. In other words, we explore which
functionalities can be implemented in a way that participating parties have the
incentive to provide their true private inputs upon engaging in the corresponding
SMC protocols.
In this paper, we assume that the number of malicious or dishonest participating
parties can be at most n _ 1, where n is the number of parties. This assumption is
very general since most existing works in the area of privacy-preserving data
analysis assume either all participating parties are honest (or semi-honest) or the
majority of participating parties are honest. Thus, we extend the non-cooperative
computation definitions to incorporate cases where there are multiple dishonest
parties. In addition, we show that from incentive compatibility point of view, most
data analysis tasks need to be analyzed only for two party cases.
ADVANTAGES OF PROPOSED SYSTEM:
Privacy preserving data analysis tasks
SYSTEM CONFIGURATION:-
HARDWARE CONFIGURATION:-
 Processor - Pentium –IV
 Speed - 1.1 Ghz
 RAM - 256 MB(min)
 Hard Disk - 20 GB
 Key Board - Standard Windows Keyboard
 Mouse - Two or Three Button Mouse
 Monitor - SVGA
SOFTWARE CONFIGURATION:-
 Operating System : Windows XP
 Programming Language : JAVA/J2EE.
 Java Version : JDK 1.6 & above.
 Database : MYSQL
REFERENCE:
Murat Kantarcioglu and Wei Jiang, “Incentive Compatible Privacy-Preserving
Data Analysis”, IEEE TRANSACTIONS ON KNOWLEDGE AND DATA
ENGINEERING, VOL. 25, NO. 6, JUNE 2013.

More Related Content

DOCX
Incentive compatible privacy preserving data
DOC
IEEE 2014 JAVA DATA MINING PROJECTS M privacy for collaborative data publishing
DOCX
E commerce 2010 section- b
PDF
Final Poster for Engineering Showcase
PDF
ϵ-DIFFERENTIAL PRIVACY MODEL FOR VERTICALLY PARTITIONED DATA TO SECURE THE PR...
PDF
A Primer on Text Mining for Business
PDF
What is big data?
PPT
Defrag 2010 Collaborative Analytics
Incentive compatible privacy preserving data
IEEE 2014 JAVA DATA MINING PROJECTS M privacy for collaborative data publishing
E commerce 2010 section- b
Final Poster for Engineering Showcase
ϵ-DIFFERENTIAL PRIVACY MODEL FOR VERTICALLY PARTITIONED DATA TO SECURE THE PR...
A Primer on Text Mining for Business
What is big data?
Defrag 2010 Collaborative Analytics

What's hot (19)

PDF
Data and personalization
PDF
Data mining in social network
PDF
The business stakes of data integration
PDF
What is "data"?
PDF
Privacy Preserving Distributed Association Rule Mining Algorithm for Vertical...
PDF
LINK MINING PROCESS
DOCX
Preventing private information inference attacks on social networks
PDF
DOCX
efficient data query in intermittently-connected mobile ad hoc social networks
PDF
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...
PPT
Evolving social data mining and affective analysis
PDF
PUBLIC INTEGRIYT AUDITING FOR SHARED DYNAMIC DATA STORAGE UNDER ONTIME GENERA...
PDF
Big Data Analytics : A Social Network Approach
PDF
Nlp and semantic_web_for_competitive_int
PDF
Enhancing access privacy of range retrievals over b+trees
PDF
Privacy preserving
PPTX
User friendly pattern search paradigm
DOC
Poster Abstracts
Data and personalization
Data mining in social network
The business stakes of data integration
What is "data"?
Privacy Preserving Distributed Association Rule Mining Algorithm for Vertical...
LINK MINING PROCESS
Preventing private information inference attacks on social networks
efficient data query in intermittently-connected mobile ad hoc social networks
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...
Evolving social data mining and affective analysis
PUBLIC INTEGRIYT AUDITING FOR SHARED DYNAMIC DATA STORAGE UNDER ONTIME GENERA...
Big Data Analytics : A Social Network Approach
Nlp and semantic_web_for_competitive_int
Enhancing access privacy of range retrievals over b+trees
Privacy preserving
User friendly pattern search paradigm
Poster Abstracts
Ad

Viewers also liked (19)

DOCX
On the node clone detection in wireless sensor networks
PDF
Understanding the external links of video sharing sites measurement and analysis
DOCX
Minimum cost blocking problem in multi path wireless routing protocols
PPT
Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relation...
DOCX
Ip geolocation mapping for moderately connected internet regions
DOCX
Detection and localization of multiple spoofing attackers in wireless networks
DOCX
Warningbird a near real time detection system for suspicious urls in twitter ...
DOCX
Attribute based access to scalable media in cloud-assisted content sharing ne...
DOCX
Security threats to mobile multimedia applications camera based attacks on mo...
DOCX
Enforcing secure and privacy preserving information brokering in distributed ...
DOCX
A log based approach to make digital forensics easier on cloud computing
DOCX
A proxy based approach to continuous location-based spatial queries in mobile...
DOCX
Multicast capacity in manet with infrastructure support
DOCX
Local directional number pattern for face analysis face and expression recogn...
DOCX
Review of behavior malware analysis for android
DOCX
Bahg back bone-assisted hop greedy routing for vanet’s city environments
DOCX
Content sharing over smartphone based delay-tolerant networks
DOCX
Enabling dynamic data and indirect mutual trust for cloud computing storage s...
DOCX
Combining cryptographic primitives to prevent jamming attacks in wireless net...
On the node clone detection in wireless sensor networks
Understanding the external links of video sharing sites measurement and analysis
Minimum cost blocking problem in multi path wireless routing protocols
Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relation...
Ip geolocation mapping for moderately connected internet regions
Detection and localization of multiple spoofing attackers in wireless networks
Warningbird a near real time detection system for suspicious urls in twitter ...
Attribute based access to scalable media in cloud-assisted content sharing ne...
Security threats to mobile multimedia applications camera based attacks on mo...
Enforcing secure and privacy preserving information brokering in distributed ...
A log based approach to make digital forensics easier on cloud computing
A proxy based approach to continuous location-based spatial queries in mobile...
Multicast capacity in manet with infrastructure support
Local directional number pattern for face analysis face and expression recogn...
Review of behavior malware analysis for android
Bahg back bone-assisted hop greedy routing for vanet’s city environments
Content sharing over smartphone based delay-tolerant networks
Enabling dynamic data and indirect mutual trust for cloud computing storage s...
Combining cryptographic primitives to prevent jamming attacks in wireless net...
Ad

Similar to Incentive compatible privacy preserving data analysis (20)

DOCX
JAVA 2013 IEEE DATAMINING PROJECT Incentive Compatible Privacy-Preserving Dat...
PPTX
Incentive Compatible Privacy Preserving Data Analysis
DOC
Accuracy constrained privacy-preserving access control mechanism for relation...
DOC
Accuracy constrained privacy-preserving access control mechanism for relation...
DOCX
Privacy-preserving Crowd-sourced Statistical Data Publishing with An Untruste...
PDF
PRIVACY PRESERVING CLUSTERING IN DATA MINING USING VQ CODE BOOK GENERATION
PDF
Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...
PDF
78201919
PDF
78201919
PDF
AN EFFICIENT SOLUTION FOR PRIVACYPRESERVING, SECURE REMOTE ACCESS TO SENSITIV...
PDF
Data attribute security and privacy in Collaborative distributed database Pub...
PPTX
Final review m score
DOC
2014 IEEE JAVA DATA MINING PROJECT M privacy for collaborative data publishing
PDF
Ijeee 7-11-privacy preserving distributed data mining with anonymous id assig...
PDF
Privacy Preserving Aggregate Statistics for Mobile Crowdsensing
PDF
Multilevel Privacy Preserving by Linear and Non Linear Data Distortion
DOCX
accuracy-constrained privacy preserving access control mechanism for relation...
PDF
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...
DOCX
M privacy for collaborative data publishing
PDF
Privacy Preserving Data Mining Using Inverse Frequent ItemSet Mining Approach
JAVA 2013 IEEE DATAMINING PROJECT Incentive Compatible Privacy-Preserving Dat...
Incentive Compatible Privacy Preserving Data Analysis
Accuracy constrained privacy-preserving access control mechanism for relation...
Accuracy constrained privacy-preserving access control mechanism for relation...
Privacy-preserving Crowd-sourced Statistical Data Publishing with An Untruste...
PRIVACY PRESERVING CLUSTERING IN DATA MINING USING VQ CODE BOOK GENERATION
Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...
78201919
78201919
AN EFFICIENT SOLUTION FOR PRIVACYPRESERVING, SECURE REMOTE ACCESS TO SENSITIV...
Data attribute security and privacy in Collaborative distributed database Pub...
Final review m score
2014 IEEE JAVA DATA MINING PROJECT M privacy for collaborative data publishing
Ijeee 7-11-privacy preserving distributed data mining with anonymous id assig...
Privacy Preserving Aggregate Statistics for Mobile Crowdsensing
Multilevel Privacy Preserving by Linear and Non Linear Data Distortion
accuracy-constrained privacy preserving access control mechanism for relation...
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...
M privacy for collaborative data publishing
Privacy Preserving Data Mining Using Inverse Frequent ItemSet Mining Approach

Recently uploaded (20)

PDF
BSc-Zoology-02Sem-DrVijay-Comparative anatomy of vertebrates.pdf
PDF
LATAM’s Top EdTech Innovators Transforming Learning in 2025.pdf
PDF
faiz-khans about Radiotherapy Physics-02.pdf
PPTX
Copy of ARAL Program Primer_071725(1).pptx
PDF
GSA-Past-Papers-2010-2024-2.pdf CSS examination
PDF
Kalaari-SaaS-Founder-Playbook-2024-Edition-.pdf
DOCX
EDUCATIONAL ASSESSMENT ASSIGNMENT SEMESTER MAY 2025.docx
PPTX
Neurological complocations of systemic disease
PPTX
Math 2 Quarter 2 Week 1 Matatag Curriculum
PPTX
Diploma pharmaceutics notes..helps diploma students
PDF
Compact First Student's Book Cambridge Official
PPTX
Cite It Right: A Compact Illustration of APA 7th Edition.pptx
PPTX
Power Point PR B.Inggris 12 Ed. 2019.pptx
PPTX
4. Diagnosis and treatment planning in RPD.pptx
PPTX
Key-Features-of-the-SHS-Program-v4-Slides (3) PPT2.pptx
PPT
hemostasis and its significance, physiology
PPTX
IT infrastructure and emerging technologies
PPTX
Theoretical for class.pptxgshdhddhdhdhgd
PPT
hsl powerpoint resource goyloveh feb 07.ppt
PDF
Horaris_Grups_25-26_Definitiu_15_07_25.pdf
BSc-Zoology-02Sem-DrVijay-Comparative anatomy of vertebrates.pdf
LATAM’s Top EdTech Innovators Transforming Learning in 2025.pdf
faiz-khans about Radiotherapy Physics-02.pdf
Copy of ARAL Program Primer_071725(1).pptx
GSA-Past-Papers-2010-2024-2.pdf CSS examination
Kalaari-SaaS-Founder-Playbook-2024-Edition-.pdf
EDUCATIONAL ASSESSMENT ASSIGNMENT SEMESTER MAY 2025.docx
Neurological complocations of systemic disease
Math 2 Quarter 2 Week 1 Matatag Curriculum
Diploma pharmaceutics notes..helps diploma students
Compact First Student's Book Cambridge Official
Cite It Right: A Compact Illustration of APA 7th Edition.pptx
Power Point PR B.Inggris 12 Ed. 2019.pptx
4. Diagnosis and treatment planning in RPD.pptx
Key-Features-of-the-SHS-Program-v4-Slides (3) PPT2.pptx
hemostasis and its significance, physiology
IT infrastructure and emerging technologies
Theoretical for class.pptxgshdhddhdhdhgd
hsl powerpoint resource goyloveh feb 07.ppt
Horaris_Grups_25-26_Definitiu_15_07_25.pdf

Incentive compatible privacy preserving data analysis

  • 1. Incentive Compatible Privacy-Preserving Data Analysis ABSTRACT: In many cases, competing parties who have private data may collaboratively conduct privacy-preserving distributed data analysis (PPDA) tasks to learn beneficial data models or analysis results. Most often, the competing parties have different incentives. Although certain PPDA techniques guarantee that nothing other than the final analysis result is revealed, it is impossible to verify whether participating parties are truthful about their private input data. Unless proper incentives are set, current PPDA techniques cannot prevent participating parties from modifying their private inputs. This raises the question of how to design incentive compatible privacy-preserving data analysis techniques that motivate participating parties to provide truthful inputs. In this paper, we first develop key theorems, then base on these theorems, we analyze certain important privacy- preserving data analysis tasks that could be conducted in a way that telling the truth is the best choice for any participating party. EXISTING SYSTEM: PRIVACY and security, particularly maintaining confidentiality of data, have become a challenging issue with advances in information and communication
  • 2. technology. The ability to communicate and share data has many benefits, and the idea of an omniscient data source carries great value to research and building accurate data analysis models. For example, for credit card companies to build more comprehensive and accurate fraud detection system, credit card transaction data from various companies may be needed to generate better data analysis models. DISADVANTAGES OF EXISTING SYSTEM: To our knowledge, all the existing techniques assume that each participating party use its true data during the distributed data mining protocol execution. PROPOSED SYSTEM: In this paper, we analyze what types of distributed functionalities could be implemented in an incentive compatible fashion. In other words, we explore which functionalities can be implemented in a way that participating parties have the incentive to provide their true private inputs upon engaging in the corresponding SMC protocols. In this paper, we assume that the number of malicious or dishonest participating parties can be at most n _ 1, where n is the number of parties. This assumption is very general since most existing works in the area of privacy-preserving data analysis assume either all participating parties are honest (or semi-honest) or the
  • 3. majority of participating parties are honest. Thus, we extend the non-cooperative computation definitions to incorporate cases where there are multiple dishonest parties. In addition, we show that from incentive compatibility point of view, most data analysis tasks need to be analyzed only for two party cases. ADVANTAGES OF PROPOSED SYSTEM: Privacy preserving data analysis tasks SYSTEM CONFIGURATION:- HARDWARE CONFIGURATION:-  Processor - Pentium –IV  Speed - 1.1 Ghz  RAM - 256 MB(min)  Hard Disk - 20 GB  Key Board - Standard Windows Keyboard  Mouse - Two or Three Button Mouse  Monitor - SVGA
  • 4. SOFTWARE CONFIGURATION:-  Operating System : Windows XP  Programming Language : JAVA/J2EE.  Java Version : JDK 1.6 & above.  Database : MYSQL REFERENCE: Murat Kantarcioglu and Wei Jiang, “Incentive Compatible Privacy-Preserving Data Analysis”, IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 25, NO. 6, JUNE 2013.