Publication | Closed Access
Pyramid: Enhancing Selectivity in Big Data Protection with Count Featurization
10
Citations
38
References
2017
Year
Unknown Venue
Cluster ComputingPrivacy ProtectionEngineeringMachine LearningInformation SecurityBig Data InfrastructureCount FeaturizationData ScienceData MiningData-intensive PlatformData IntegrationBig DataData ManagementVast QuantitiesHigh-performance Data AnalyticsKnowledge DiscoveryData PrivacyPrivate Information RetrievalComputer ScienceData-intensive ComputingData SecurityCryptographyCloud ComputingSpark VeloxMassive Data ProcessingData Protection
Protecting vast quantities of data poses a daunting challenge for the growing number of organizations that collect, stockpile, and monetize it. The ability to distinguish data that is actually needed from data collected "just in case" would help these organizations to limit the latter's exposure to attack. A natural approach might be to monitor data use and retain only the working-set of in-use data in accessible storage, unused data can be evicted to a highly protected store. However, many of today's big data applications rely on machine learning (ML) workloads that are periodically retrained by accessing, and thus exposing to attack, the entire data store. Training set minimization methods, such as count featurization, are often used to limit the data needed to train ML workloads to improve performance or scalability. We present Pyramid, a limited-exposure data management system that builds upon count featurization to enhance data protection. As such, Pyramid uniquely introduces both the idea and proof-of-concept for leveraging training set minimization methods to instill rigor and selectivity into big data management. We integrated Pyramid into Spark Velox, a framework for ML-based targeting and personalization. We evaluate it on three applications and show that Pyramid approaches state-of-the-art models while training on less than 1% of the raw data.
| Year | Citations | |
|---|---|---|
Page 1
Page 1