首页 | 本学科首页   官方微博 | 高级检索  
     

分布的缺失数据中保护隐私的贝叶斯网络学习
引用本文:王红梅,曾沅,赵政.分布的缺失数据中保护隐私的贝叶斯网络学习[J].计算机工程,2008,34(1):14-16.
作者姓名:王红梅  曾沅  赵政
作者单位:1. 天津大学电气与自动化工程学院,天津,300072;南开戈德集团有限公司,天津,300457
2. 天津大学电气与自动化工程学院,天津,300072
3. 天津大学计算机科学与技术学院,天津,300072
基金项目:教育部全国优秀博士学位论文作者专项基金 , 教育部科学技术基金 , 霍英东教育基金
摘    要:对隐私的保护性关注限制了参与各方对数据资源的共享使用,为此提出了从分布的缺失数据中保护隐私的贝叶斯网络学习方 法——PPHI-EM方法。该方法基于Pohlig-Hellman加密算法,使用安全有向边统计算法得到结构有向边的交集和并集。以交集作为初始网络结构,依次将并集中的其他边放入网络中,通过打分函数值的大小,判断该边是否应予保留。根据设定的适当权重,使用安全矩阵求和算法求解当前网络结构参数。循环计算直至确定网络的最优参数。该方法使用了期望统计来代替实际不存在的充分统计,使数据各方的打分函数便于分解,并基于AMS-EM方法分布迭代改进结构,使之收敛。实验结果验证了该方法的有效性。

关 键 词:保护隐私的数据挖掘  贝叶斯网络  分布式数据库  安全多方计算
文章编号:1000-3428(2008)01-0014-03
收稿时间:2007-05-28
修稿时间:2007年5月28日

Privacy-preserving Bayesian Network Learning on Horizontally Partitioned Data with Missing Values
WANG Hong-mei,ZENG Yuan,ZHAO Zheng.Privacy-preserving Bayesian Network Learning on Horizontally Partitioned Data with Missing Values[J].Computer Engineering,2008,34(1):14-16.
Authors:WANG Hong-mei  ZENG Yuan  ZHAO Zheng
Affiliation:(1. School of Electrical Engineering and Automation, Tianjin University, Tianjin 300072; 2. Tianjin Nankai Guard Company of Limited Liability, Tianjin 300457; 3. School of Computer Science and Technology, Tianjin University, Tianjin 300072)
Abstract:Privacy regulations may prevent parties from sharing their data. A privacy-preserving EM learning on horizontally partitioned data with missing data (PPHI-EM) is proposed to make parties share their data under privacy. Each party owning confidential data disassembles the likelihood function, replacing the expected value of all the statistics by the nonexistent value. Based on AMS-EM, the network structure is improved to convergence by iteration cycle. The intersection and union of directed edges of structure are computed with security directed edge statistic algorithm, in which pohlig-hellman encryption algorithm is used. The intersection is regarded as the initialization of structure. The edge in union other than that in intersection is put into the structure one by one. The proposed method alternates between the iterations that optimizes the parameters for the current model candidate and the iterations that searches for a different model. Parameters are solved with security matrix sum algorithm by enactment of proper weight sum. It lies on the values of scoring function that the edge is remained or not in this aggregation. Experimental results show its effectiveness.
Keywords:privacy-preserving data mining  Bayesian network  distributed database  secure multiparty computation
本文献已被 CNKI 维普 万方数据 等数据库收录!
点击此处可从《计算机工程》浏览原始摘要信息
点击此处可从《计算机工程》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号