An Efficient Approximate Protocol for Privacy-Preserving Association Rule Mining

被引:0
|
作者
Kantarcioglu, Murat [1 ]
Nix, Robert [1 ]
Vaidya, Jaideep [2 ]
机构
[1] Univ Texas Dallas, Richardson, TX 75080 USA
[2] Rutgers State Univ, Newark, NJ 07102 USA
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The secure scalar product (or dot, product) is one of the most used sub-protocols in privacy-preserving data milling. Indeed, the clot product is probably the most; common sub-protocol used. As such, a lot of attention leas been focused on coming up with secure protocols for computing it. However, all inherent problem with these protocols is the extremely high computation cost-especially when the clot product needs to be carried out over large vectors. This is quite common in vertically partitioned data., and is a real problem. In this paper, we present; writ's to efficiently compute the approximate dot product. We implement the clot product protocol and demonstrate the quality of the approximation. Our clot product protocol call be used to securely and efficiently compute association rules from data vertically partitioned between two parties.
引用
收藏
页码:515 / +
页数:3
相关论文
共 50 条
  • [21] An Efficient Privacy-preserving Authentication Protocol in VANETs
    Zhang, Jianhong
    Zhen, Weina
    Xu, Min
    [J]. 2013 IEEE NINTH INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR NETWORKS (MSN 2013), 2013, : 272 - 277
  • [22] A Survey on Privacy Preserving Association Rule Mining
    Zhang, Lili
    Niu, Danmei
    Li, Yuxiang
    Zhang, Zhiyong
    [J]. 2018 5TH INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND CONTROL ENGINEERING (ICISCE 2018), 2018, : 93 - 97
  • [23] Advance Privacy preserving in Association rule Mining
    Chaudhari, Minubhai
    Varmora, Jigar
    [J]. 2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, AND OPTIMIZATION TECHNIQUES (ICEEOT), 2016, : 2527 - 2530
  • [24] Verifiable privacy-preserving association rule mining using distributed decryption mechanism on the cloud
    Chen, Yange
    Zhao, Qingqing
    Duan, Pu
    Zhang, Benyu
    Hong, Zhiyong
    Wang, Baocang
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2022, 201
  • [25] Privacy-Preserving Mining of Association Rule on Outsourced Cloud Data from Multiple Parties
    Liu, Lin
    Su, Jinshu
    Chen, Rongmao
    Liu, Ximeng
    Wang, Xiaofeng
    Chen, Shuhui
    Leung, Hofung
    [J]. INFORMATION SECURITY AND PRIVACY, 2018, 10946 : 431 - 451
  • [26] Privacy-preserving distributed association rule mining via semi-trusted mixer
    Yi, Xun
    Zhang, Yanchun
    [J]. DATA & KNOWLEDGE ENGINEERING, 2007, 63 (02) : 550 - 567
  • [27] Privacy-preserving association rule mining: a survey of techniques for sensitive rule identification and enhanced data protection
    Barua, Eirene
    Dutta, Mala
    [J]. International Journal of Computers and Applications, 2024, 46 (04) : 252 - 265
  • [28] Approximate Privacy-Preserving Data Mining on Vertically Partitioned Data
    Nix, Robert
    Kantarcioglu, Murat
    Han, Keesook J.
    [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXVI, 2012, 7371 : 129 - 144
  • [29] Efficient method in association rule hiding for privacy preserving with data mining approach
    Praveena, Kurapati
    Sirisha, Gudla
    Babu, Satukumati Suresh
    Rao, Panchala Sambasiva
    [J]. Ingenierie des Systemes d'Information, 2019, 24 (01): : 47 - 50
  • [30] Enabling Privacy-Preserving Rule Mining in Decentralized Social Networks
    Wainakh, Aidmar
    Strassheim, Aleksej
    Grube, Tim
    Daubert, Joerg
    Muehlhaeuser, Max
    [J]. ARES 2021: 16TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, 2021,