A Secure Protocol to Maintain Data Privacy in Data Mining

被引:0
|
作者
Camara, Fode [1 ]
Ndiaye, Samba [1 ]
Slimani, Yahya [2 ]
机构
[1] Cheikh Anta Diop Univ, Dept Math & Comp Sci, Dakar, Senegal
[2] Fac Sci Tunis, Dept Comp Sci, Tunis 1060, Tunisia
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Recently, privacy issues have becomes important in data mining, especially when data is horizontally or vertically partitioned. For the vertically partitioned case, many data mining problems call be reduced to securely computing the scalar product. Among these problems, we call mention association rule mining over vertically partitioned data. Efficiency of a secure scalar product call be measured by the overhead of communication needed to ensure this security. Several solutions have been proposed for privacy preserving association rule mining in vertically partitioned data. But the main drawback of these solutions is the excessive overhead communication needed for ensuring data privacy. Ill this paper we propose a new secure scalar product with the aim to reduce the overhead communication.
引用
收藏
页码:417 / +
页数:3
相关论文
共 50 条
  • [1] Privacy Preserving Data Mining Technique to Secure Distributed Client Data
    Dani, Virendra
    Kokate, Priyanka
    Kushwah, Surbhi
    Waghela, Swapnil
    [J]. HYBRID INTELLIGENT SYSTEMS, HIS 2021, 2022, 420 : 565 - 574
  • [2] Privacy in Data Mining
    Josep Domingo-Ferrer
    Vicenç Torra
    [J]. Data Mining and Knowledge Discovery, 2005, 11 : 117 - 119
  • [3] Secure Multi-party Protocols for Privacy Preserving Data Mining
    Ma, Qingkai
    Deng, Ping
    [J]. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, PROCEEDINGS, 2008, 5258 : 526 - 537
  • [4] Privacy in data mining
    Domingo-Ferrer, J
    Torra, V
    [J]. DATA MINING AND KNOWLEDGE DISCOVERY, 2005, 11 (02) : 117 - 119
  • [5] An Fifficient Method for Privacy Preserving Data Mining in Secure Multiparty Computation
    Pathak, Neha
    Pandey, Shweta
    [J]. 2013 4TH NIRMA UNIVERSITY INTERNATIONAL CONFERENCE ON ENGINEERING (NUICONE 2013), 2013,
  • [6] Secure computation for data privacy
    Singh, Meena
    Saxena, Ashutosh
    [J]. 2007 THIRD INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS AND WORKSHOPS, 2007, : 58 - 62
  • [7] Optimized key generation-based privacy preserving data mining model for secure data publishing
    Kulkarni, Yogesh R.
    Jagdale, Balaso
    Sugave, Shounak R.
    [J]. ADVANCES IN ENGINEERING SOFTWARE, 2023, 175
  • [8] Privacy preserving data mining algorithms without the use of secure computation or perturbation
    Gurevich, Alex
    Gudes, Ehud
    [J]. 10TH INTERNATIONAL DATABASE ENGINEERING AND APPLICATIONS SYMPOSIUM, PROCEEDINGS, 2006, : 121 - 128
  • [9] Special issue on data mining and data privacy
    Torra, Vicenç
    Narukawa, Yasuo
    [J]. Journal of Ambient Intelligence and Humanized Computing, 2023, 14 (11) : 14977 - 14978
  • [10] Protection or privacy? Data mining and personal data
    Hand, DJ
    [J]. ADVANCES IN KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2006, 3918 : 1 - 10