Privacy preserving data mining

被引:0
|
作者
Lindell, Y [1 ]
Pinkas, B
机构
[1] Weizmann Inst Sci, Dept Comp Sci & Appl Math, IL-76100 Rehovot, Israel
[2] Hebrew Univ Jerusalem, Sch Comp Sci & Engn, Jerusalem, Israel
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper we introduce the concept of privacy preserving data mining. In our model, two parties owning confidential databases wish to run a data mining algorithm on the union of their databases, without revealing any unnecessary information, This problem has many practical and important applications, such as in medical research with confidential patient records. Data mining algorithms are usually complex, especially as the size of the input is measured in megabytes, if not gigabytes. A generic secure multi-party computation solution, based on evaluation of a circuit computing the algorithm on the entire input, is therefore of no practical use. We focus on the problem of decision tree learning and use ID3, a popular and widely used algorithm for this problem. We present a solution that is considerably more efficient than generic solutions. It demands very few rounds of communication and reasonable bandwidth. In our solution, each party performs by itself a computation of the same order as computing the ID3 algorithm for its own database. The results are then combined using efficient cryptographic protocols, whose overhead is only logarithmic in the number of transactions in the databases. We feel that our result is a substantial contribution, demonstrating that secure multi-party computation can be made practical, even for complex problems and large inputs.
引用
收藏
页码:36 / 54
页数:19
相关论文
共 50 条
  • [1] Privacy preserving data mining
    Lindell, Y
    Pinkas, B
    [J]. JOURNAL OF CRYPTOLOGY, 2002, 15 (03) : 177 - 206
  • [2] Privacy Preserving Data Mining
    [J]. Journal of Cryptology, 2002, 15 : 177 - 206
  • [3] Quantifying privacy for privacy preserving data mining
    Zhan, Justin
    [J]. 2007 IEEE SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DATA MINING, VOLS 1 AND 2, 2007, : 630 - 636
  • [4] Privacy-preserving data mining
    Agrawal, R
    Srikant, R
    [J]. SIGMOD RECORD, 2000, 29 (02) : 439 - 450
  • [5] Research on Privacy Preserving Data Mining
    Wang, Pingshui
    Wang, Jiandong
    Zhu, Xinfeng
    Jiang, Jian
    [J]. 2010 INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT (CCCM2010), VOL I, 2010, : 172 - 175
  • [6] Privacy Preserving Data Mining by Cyptography
    Sharma, Anand
    Ojha, Vibha
    [J]. RECENT TRENDS IN NETWORK SECURITY AND APPLICATIONS, 2010, 89 : 576 - +
  • [7] A Survey on Privacy Preserving Data Mining
    Wang, Jian
    Luo, Yongcheng
    Zhao, Yan
    Le, Jianjin
    [J]. FIRST INTERNATIONAL WORKSHOP ON DATABASE TECHNOLOGY AND APPLICATIONS, PROCEEDINGS, 2009, : 111 - 114
  • [8] On data distortion for privacy preserving data mining
    Kabir, Saif M. A.
    Youssef, Amr M.
    Elhakeem, Ahmed K.
    [J]. 2007 CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1-3, 2007, : 308 - 311
  • [9] An Overview of Privacy Preserving Data Mining
    Qi, Xinjun
    Zong, Mingkui
    [J]. 2011 INTERNATIONAL CONFERENCE OF ENVIRONMENTAL SCIENCE AND ENGINEERING, VOL 12, PT B, 2012, 12 : 1341 - 1347
  • [10] Study of Privacy Preserving Data Mining
    Li, Haisheng
    [J]. 2010 THIRD INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY AND SECURITY INFORMATICS (IITSI 2010), 2010, : 700 - 703