Privacy preserving data mining algorithms without the use of secure computation or perturbation

被引:0
|
作者
Gurevich, Alex [1 ]
Gudes, Ehud [1 ]
机构
[1] Ben Gurion Univ Negev, Dept Comp Sci, IL-84105 Beer Sheva, Israel
关键词
privacy; association rules; secure computation; distributed data mining;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In our era Knowledge is not "just" information anymore, it is an asset. Data mining can be used to extract important knowledge from large databases. These days, it is often the case that such databases are distributed among several organizations who would like to cooperate in order to extract global knowledge, but at the same time, privacy concerns may prevent the partiesfrom directly sharing the data among them. The two current main methods to perform data mining tasks without compromising privacy are: the perturbation method and the secure computation method Many papers and published algorithms are based on those two methods. Yet, both have some disadvantages, like reduced accuracy for the first and increased overhead for the second. In this article we offer a new paradigm to perform privacy-preserving distributed data mining without using those methods, we present three algorithms for association rule mining which use this paradigm, and discuss their privacy and performance characteristics.
引用
收藏
页码:121 / 128
页数:8
相关论文
共 50 条
  • [1] An Fifficient Method for Privacy Preserving Data Mining in Secure Multiparty Computation
    Pathak, Neha
    Pandey, Shweta
    [J]. 2013 4TH NIRMA UNIVERSITY INTERNATIONAL CONFERENCE ON ENGINEERING (NUICONE 2013), 2013,
  • [2] Privacy preserving distributed data mining based on secure multi-party computation
    Liu, Jun
    Tian, Yuan
    Zhou, Yu
    Xiao, Yang
    Ansari, Nirwan
    [J]. COMPUTER COMMUNICATIONS, 2020, 153 : 208 - 216
  • [3] Privacy preserving data mining algorithms by data distortion
    Wu Xiao-dan
    Yue Dian-min
    Liu Feng-li
    Wang Yun-feng
    Chu Chao-Hsien
    [J]. PROCEEDINGS OF THE 2006 INTERNATIONAL CONFERENCE ON MANAGEMENT SCIENCE & ENGINEERING (13TH), VOLS 1-3, 2006, : 223 - 228
  • [4] Geometric data perturbation for privacy preserving outsourced data mining
    Chen, Keke
    Liu, Ling
    [J]. KNOWLEDGE AND INFORMATION SYSTEMS, 2011, 29 (03) : 657 - 695
  • [5] Geometric data perturbation for privacy preserving outsourced data mining
    Keke Chen
    Ling Liu
    [J]. Knowledge and Information Systems, 2011, 29 : 657 - 695
  • [6] Privacy Preserving Data Utility Mining Using Perturbation
    Jisna, Joseph
    Salim, A.
    [J]. DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY (ICDCIT 2018), 2018, 10722 : 112 - 120
  • [7] Secure Computation for Privacy Preserving Biometric Data Retrieval and Authentication
    Sy, Bon
    [J]. INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2008, 5376 : 143 - 154
  • [8] On association rules mining algorithms with data privacy preserving
    Gorawski, M
    Stachurski, K
    [J]. ADVANCES IN WEB INTELLIGENCE, PROCEEDINGS, 2005, 3528 : 170 - 175
  • [9] A Framework for Evaluating Privacy Preserving Data Mining Algorithms*
    Elisa Bertino
    Igor Nai Fovino
    Loredana Parasiliti Provenza
    [J]. Data Mining and Knowledge Discovery, 2005, 11 : 121 - 154
  • [10] Classification Algorithms for Privacy Preserving in Data Mining: A Survey
    Ji, Sai
    Wang, Zhen
    Liu, Qi
    Liu, Xiaodong
    [J]. ADVANCES IN COMPUTER SCIENCE AND UBIQUITOUS COMPUTING, 2017, 421 : 312 - 322