Two methods for privacy preserving data mining with malicious participants

被引:18
|
作者
Shah, Divyesh [1 ]
Zhong, Sheng [1 ]
机构
[1] SUNY Buffalo, Dept Comp Sci & Engn, Buffalo, NY 14260 USA
关键词
data mining; privacy; malicious model; attacks; protocols;
D O I
10.1016/j.ins.2007.07.013
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Privacy preserving data mining addresses the need of multiple parties with private inputs to run a data mining algorithm and learn the results over the combined data without revealing any unnecessary information. Most of the existing cryptographic solutions to privacy-preserving data mining assume semi-honest participants. In theory, these solutions can be extended to the malicious model using standard techniques like commitment schemes and zero-knowledge proofs. However, these techniques are often expensive, especially when the data sizes are large. In this paper, we investigate alternative ways to convert solutions in the semi-honest model to the malicious model. We take two classical solutions as examples, one of which can be extended to the malicious model with only slight modifications while another requires a careful redesign of the protocol. In both cases, our solutions for the malicious model are much more efficient than the zero-knowledge proofs based solutions. (C) 2007 Elsevier Inc. All rights reserved.
引用
收藏
页码:5468 / 5483
页数:16
相关论文
共 50 条
  • [21] Privacy Preserving Data Mining Using Radial Basis Functions on Horizontally Partitioned Databases in the Malicious Model
    Panteli, Alexandros
    Maragoudakis, Manolis
    Gritzalis, Stefanos
    [J]. INTERNATIONAL JOURNAL ON ARTIFICIAL INTELLIGENCE TOOLS, 2014, 23 (05)
  • [22] Reversible privacy preserving data mining: a combination of difference expansion and privacy preserving
    Tung-Shou Chen
    Wei-Bin Lee
    Jeanne Chen
    Yuan-Hung Kao
    Pei-Wen Hou
    [J]. The Journal of Supercomputing, 2013, 66 : 907 - 917
  • [23] Privacy-preserving Data Aggregation against Malicious Data Mining Attack for IoT-enabled Smart Grid
    Wang, Jing
    Wu, Libing
    Zeadally, Sherali
    Khan, Muhammad Khurram
    He, Debiao
    [J]. ACM TRANSACTIONS ON SENSOR NETWORKS, 2021, 17 (03)
  • [24] Reversible privacy preserving data mining: a combination of difference expansion and privacy preserving
    Chen, Tung-Shou
    Lee, Wei-Bin
    Chen, Jeanne
    Kao, Yuan-Hung
    Hou, Pei-Wen
    [J]. JOURNAL OF SUPERCOMPUTING, 2013, 66 (02): : 907 - 917
  • [25] Privacy preserving data mining algorithms by data distortion
    Wu Xiao-dan
    Yue Dian-min
    Liu Feng-li
    Wang Yun-feng
    Chu Chao-Hsien
    [J]. PROCEEDINGS OF THE 2006 INTERNATIONAL CONFERENCE ON MANAGEMENT SCIENCE & ENGINEERING (13TH), VOLS 1-3, 2006, : 223 - 228
  • [26] A Review on Privacy-Preserving Data Mining
    Li, Xueyun
    Yan, Zheng
    Zhang, Peng
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY (CIT), 2014, : 769 - 774
  • [27] Privacy-preserving collaborative data mining
    Zhan, J
    Chang, LW
    Matwin, S
    [J]. FOUNDATIONS AND NOVEL APPROACHES IN DATA MINING, 2006, 9 : 213 - +
  • [28] An Improved Method for Privacy Preserving Data Mining
    Poovammal, E.
    Ponnavaikko, M.
    [J]. 2009 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE, VOLS 1-3, 2009, : 1453 - +
  • [29] Condensation approach to privacy preserving data mining
    Aggarwal, CC
    Yu, PS
    [J]. ADVANCES IN DATABASE TECHNOLOGY - EDBT 2004, PROCEEDINGS, 2004, 2992 : 183 - 199
  • [30] Data mining privacy preserving: Research agenda
    Kreso, Inda
    Kapo, Amra
    Turulja, Lejla
    [J]. WILEY INTERDISCIPLINARY REVIEWS-DATA MINING AND KNOWLEDGE DISCOVERY, 2021, 11 (01)