An Efficient Approximate Protocol for Privacy-Preserving Association Rule Mining

被引:0
|
作者
Kantarcioglu, Murat [1 ]
Nix, Robert [1 ]
Vaidya, Jaideep [2 ]
机构
[1] Univ Texas Dallas, Richardson, TX 75080 USA
[2] Rutgers State Univ, Newark, NJ 07102 USA
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The secure scalar product (or dot, product) is one of the most used sub-protocols in privacy-preserving data milling. Indeed, the clot product is probably the most; common sub-protocol used. As such, a lot of attention leas been focused on coming up with secure protocols for computing it. However, all inherent problem with these protocols is the extremely high computation cost-especially when the clot product needs to be carried out over large vectors. This is quite common in vertically partitioned data., and is a real problem. In this paper, we present; writ's to efficiently compute the approximate dot product. We implement the clot product protocol and demonstrate the quality of the approximation. Our clot product protocol call be used to securely and efficiently compute association rules from data vertically partitioned between two parties.
引用
收藏
页码:515 / +
页数:3
相关论文
共 50 条
  • [1] Privacy-preserving collaborative association rule mining
    Zhan, J
    Matwin, S
    Japkowicz, N
    Chang, LW
    [J]. SHAPING BUSINESS STRATEGY IN A NETWORKED WORLD, VOLS 1 AND 2, PROCEEDINGS, 2004, : 1172 - 1178
  • [2] Privacy-preserving collaborative association rule mining
    Zhan, Justin
    Matwin, Stan
    Chang, LiWu
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2007, 30 (03) : 1216 - 1227
  • [3] Privacy-preserving collaborative association rule mining
    Zhan, J
    Matwin, S
    Chang, LW
    [J]. DATA AND APPLICATIONS SECURITY XIX, PROCEEDINGS, 2005, 3654 : 153 - 165
  • [4] EFPA: Efficient and Flexible Privacy-Preserving Mining of Association Rule in Cloud
    Huang, Cheng
    Lu, Rongxing
    [J]. 2015 IEEE/CIC INTERNATIONAL CONFERENCE ON COMMUNICATIONS IN CHINA (ICCC), 2015,
  • [5] P3ARM: Privacy-preserving protocol for association rule mining
    Saleh, Inian
    Mokhtar, Alaa
    Shoukry, Amin
    Eltoweissy, Mohamed
    [J]. 2006 IEEE INFORMATION ASSURANCE WORKSHOP, 2006, : 76 - +
  • [6] Efficient privacy-preserving association rule mining: P4P style
    Duan, Yitao
    Canny, John
    Zhan, Justin
    [J]. 2007 IEEE SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DATA MINING, VOLS 1 AND 2, 2007, : 654 - 660
  • [7] A Privacy-Preserving Framework for Collaborative Association Rule Mining in Cloud
    Samanthula, Bharath K.
    Albehairi, Salha
    Dong, Boxiang
    [J]. 2019 3RD IEEE INTERNATIONAL CONFERENCE ON CLOUD AND FOG COMPUTING TECHNOLOGIES AND APPLICATIONS (IEEE CLOUD SUMMIT 2019), 2019, : 116 - 121
  • [8] PPDAM: Privacy-Preserving Distributed Association-Rule-Mining Algorithm
    Ashrafi, Mafruz Zaman
    Taniar, David
    Smith, Kate
    [J]. INTERNATIONAL JOURNAL OF INTELLIGENT INFORMATION TECHNOLOGIES, 2005, 1 (01) : 49 - 69
  • [9] Privacy-preserving association rule mining based on electronic medical system
    Wenju Xu
    Qingqing Zhao
    Yu Zhan
    Baocang Wang
    Yupu Hu
    [J]. Wireless Networks, 2022, 28 : 303 - 317
  • [10] Secure Privacy-Preserving Association Rule Mining With Single Cloud Server
    Hong, Zhiyong
    Zhang, Zhili
    Duan, Pu
    Zhang, Benyu
    Wang, Baocang
    Gao, Wen
    Zhao, Zhen
    [J]. IEEE ACCESS, 2021, 9 : 165090 - 165102