Privacy preserving data mining algorithms without the use of secure computation or perturbation

被引:0
|
作者
Gurevich, Alex [1 ]
Gudes, Ehud [1 ]
机构
[1] Ben Gurion Univ Negev, Dept Comp Sci, IL-84105 Beer Sheva, Israel
关键词
privacy; association rules; secure computation; distributed data mining;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In our era Knowledge is not "just" information anymore, it is an asset. Data mining can be used to extract important knowledge from large databases. These days, it is often the case that such databases are distributed among several organizations who would like to cooperate in order to extract global knowledge, but at the same time, privacy concerns may prevent the partiesfrom directly sharing the data among them. The two current main methods to perform data mining tasks without compromising privacy are: the perturbation method and the secure computation method Many papers and published algorithms are based on those two methods. Yet, both have some disadvantages, like reduced accuracy for the first and increased overhead for the second. In this article we offer a new paradigm to perform privacy-preserving distributed data mining without using those methods, we present three algorithms for association rule mining which use this paradigm, and discuss their privacy and performance characteristics.
引用
收藏
页码:121 / 128
页数:8
相关论文
共 50 条
  • [21] Privacy-Preserving Multiparty Collaborative Mining with Geometric Data Perturbation
    Chen, Keke
    Liu, Ling
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2009, 20 (12) : 1764 - 1776
  • [22] Privacy preserving sequential pattern mining based on secure two-party computation
    Ouyang, Wei-Min
    Huang, Qin-Hua
    [J]. PROCEEDINGS OF 2006 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2006, : 1227 - +
  • [23] Secure Multi-party Protocols for Privacy Preserving Data Mining
    Ma, Qingkai
    Deng, Ping
    [J]. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, PROCEEDINGS, 2008, 5258 : 526 - 537
  • [24] Privacy preserving sequential pattern mining based on secure multi-party computation
    Ouyang, Weimin
    Huang, Qinhua
    [J]. 2006 IEEE INTERNATIONAL CONFERENCE ON INFORMATION ACQUISITION, VOLS 1 AND 2, CONFERENCE PROCEEDINGS, 2006, : 149 - 154
  • [25] Secure computation for data privacy
    Singh, Meena
    Saxena, Ashutosh
    [J]. 2007 THIRD INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS AND WORKSHOPS, 2007, : 58 - 62
  • [26] Privacy preserving association rules mining based on secure two-party computation
    Ouyang, Weimin
    Huang, Qinhua
    [J]. INTELLIGENT CONTROL AND AUTOMATION, 2006, 344 : 969 - 975
  • [27] On private scalar product computation for privacy-preserving data mining
    Goethals, B
    Laur, S
    Lipmaa, H
    Mielikäinen, T
    [J]. INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2004, 2004, 3506 : 104 - 120
  • [28] Privacy preserving data mining
    Lindell, Y
    Pinkas, B
    [J]. JOURNAL OF CRYPTOLOGY, 2002, 15 (03) : 177 - 206
  • [29] A tree-based data perturbation approach for privacy-preserving data mining
    Li, Xiao-Bai
    Sarkar, Sumit
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2006, 18 (09) : 1278 - 1283
  • [30] Privacy Preserving Data Mining
    [J]. Journal of Cryptology, 2002, 15 : 177 - 206