Embedding differential privacy in decision tree algorithm with different depths

Xuanyu Bai, Jianguo Yao*, Mingxuan Yuan, Ke Deng, Xike Xie, Haibing Guan

*Corresponding author for this work

Research output: Contribution to journalJournal articleResearchpeer-review

10 Citations (Scopus)

Abstract

Differential privacy (DP) has become one of the most important solutions for privacy protection in recent years. Previous studies have shown that prediction accuracy usually increases as more data mining (DM) logic is considered in the DP implementation. However, although one-step DM computation for decision tree (DT) model has been investigated, existing research has not studied the scenarios when the DP is embedded in two-step DM computation, three-step DM computation until the whole model DM computation. It is very challenging to embed DP in more than two steps of DM computation since the solution space exponentially increases with the increase of computational complexity. In this work, we propose algorithms by making use of Markov Chain Monte Carlo (MCMC) method, which can efficiently search a computationally infeasible space to embed DP into DT generation algorithm. We compare the performance when embedding DP in DT with different depths, i.e., one-step DM computation (previous work), two-step, three-step and the whole model. We find that the deep combination of DP and DT does help to increase the prediction accuracy. However, when the privacy budget is very large (e.g., ϵ = 10), this may overwhelm the complexity of DT model, and the increasing trend is not obvious. We also find that the prediction accuracy decreases with the increase of model complexity.

Original languageEnglish
Article number082104
JournalScience China Information Sciences
Volume60
Issue number8
Number of pages15
ISSN1674-733X
DOIs
Publication statusPublished - 1 Aug 2017

Keywords

  • decision tree
  • exhaustive search
  • exponential mechanism
  • MCMC
  • rential privacy

Fingerprint

Dive into the research topics of 'Embedding differential privacy in decision tree algorithm with different depths'. Together they form a unique fingerprint.

Cite this