Privacy preserving data mining algorithms without the use of secure computation or perturbation

被引:0
|
作者
Gurevich, Alex [1 ]
Gudes, Ehud [1 ]
机构
[1] Ben Gurion Univ Negev, Dept Comp Sci, IL-84105 Beer Sheva, Israel
关键词
privacy; association rules; secure computation; distributed data mining;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In our era Knowledge is not "just" information anymore, it is an asset. Data mining can be used to extract important knowledge from large databases. These days, it is often the case that such databases are distributed among several organizations who would like to cooperate in order to extract global knowledge, but at the same time, privacy concerns may prevent the partiesfrom directly sharing the data among them. The two current main methods to perform data mining tasks without compromising privacy are: the perturbation method and the secure computation method Many papers and published algorithms are based on those two methods. Yet, both have some disadvantages, like reduced accuracy for the first and increased overhead for the second. In this article we offer a new paradigm to perform privacy-preserving distributed data mining without using those methods, we present three algorithms for association rule mining which use this paradigm, and discuss their privacy and performance characteristics.
引用
收藏
页码:121 / 128
页数:8
相关论文
共 50 条
  • [41] Data Perturbation Method Based on Contrast Mapping for Reversible Privacy-preserving Data Mining
    Kao, Yuan-Hung
    Lee, Wei-Bin
    Hsu, Tien-Yu
    Lin, Chen-Yi
    Tsai, Hui-Fang
    Chen, Tung-Shou
    [J]. JOURNAL OF MEDICAL AND BIOLOGICAL ENGINEERING, 2015, 35 (06) : 789 - 794
  • [42] Data Perturbation Method Based on Contrast Mapping for Reversible Privacy-preserving Data Mining
    Yuan-Hung Kao
    Wei-Bin Lee
    Tien-Yu Hsu
    Chen-Yi Lin
    Hui-Fang Tsai
    Tung-Shou Chen
    [J]. Journal of Medical and Biological Engineering, 2015, 35 : 789 - 794
  • [43] Data transformation techniques for preserving privacy in distance-based mining algorithms
    Kadampur, Mohammad Ali
    Somayajulu, D. V. L. N.
    [J]. INTERNATIONAL JOURNAL OF DATA MINING MODELLING AND MANAGEMENT, 2014, 6 (03) : 285 - 311
  • [44] Privacy Preserving Data Mining by Cyptography
    Sharma, Anand
    Ojha, Vibha
    [J]. RECENT TRENDS IN NETWORK SECURITY AND APPLICATIONS, 2010, 89 : 576 - +
  • [45] Privacy-preserving data mining
    Agrawal, R
    Srikant, R
    [J]. SIGMOD RECORD, 2000, 29 (02) : 439 - 450
  • [46] Research on Privacy Preserving Data Mining
    Wang, Pingshui
    Wang, Jiandong
    Zhu, Xinfeng
    Jiang, Jian
    [J]. 2010 INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT (CCCM2010), VOL I, 2010, : 172 - 175
  • [47] A Survey on Privacy Preserving Data Mining
    Wang, Jian
    Luo, Yongcheng
    Zhao, Yan
    Le, Jianjin
    [J]. FIRST INTERNATIONAL WORKSHOP ON DATABASE TECHNOLOGY AND APPLICATIONS, PROCEEDINGS, 2009, : 111 - 114
  • [48] On data distortion for privacy preserving data mining
    Kabir, Saif M. A.
    Youssef, Amr M.
    Elhakeem, Ahmed K.
    [J]. 2007 CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1-3, 2007, : 308 - 311
  • [49] An Overview of Privacy Preserving Data Mining
    Qi, Xinjun
    Zong, Mingkui
    [J]. 2011 INTERNATIONAL CONFERENCE OF ENVIRONMENTAL SCIENCE AND ENGINEERING, VOL 12, PT B, 2012, 12 : 1341 - 1347
  • [50] Study of Privacy Preserving Data Mining
    Li, Haisheng
    [J]. 2010 THIRD INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY AND SECURITY INFORMATICS (IITSI 2010), 2010, : 700 - 703