Privacy-preserving association rule mining based on electronic medical system

被引:0
|
作者
Wenju Xu
Qingqing Zhao
Yu Zhan
Baocang Wang
Yupu Hu
机构
[1] Xidian University,State Key Laboratory of Integrated Service Networks
[2] Xidian University,Cryptographic Research Center
来源
Wireless Networks | 2022年 / 28卷
关键词
Privacy-preserving; Association rule mining; Homomorphic encryption; Cooperative computation;
D O I
暂无
中图分类号
学科分类号
摘要
Privacy protection during collaborative distributed association rule mining is an important research, which has been widely used in market prediction, medical research and other fields. In medical research, Domadiya et al. (Sadhana 43(8):127, 2018) focused on mining association rules from horizontally distributed healthcare data to diagnose heart disease. They claimed they proposed a more effective privacy-preserving distributed association rule mining (PPDARM) scheme. However, a serious security scrutiny of the scheme is performed, and we find it vulnerable to protect the support of the itemsets from any electronic health record (EHR) system, which is the most important parameter Domadiya et al. tried to protect. In this paper, we first present the cryptanalysis of the PPDARM scheme proposed by Domadiya et al. as well as some revised performance analyses. Then a new PPDARM scheme with less interactions is proposed to avert the shortcomings of Domadiya et al., using the homomorphic properties of the distributed Paillier cryptosystem to accomplish the cooperative computation. Our scheme allows the directed authority (miner) to obtain the final results rather than all cooperative EHR systems, in case of semi-honest but pseudo EHR systems. Moreover, security analysis and performance evaluation demonstrate our proposal is efficient and feasible.
引用
收藏
页码:303 / 317
页数:14
相关论文
共 50 条
  • [21] Verifiable privacy-preserving association rule mining using distributed decryption mechanism on the cloud
    Chen, Yange
    Zhao, Qingqing
    Duan, Pu
    Zhang, Benyu
    Hong, Zhiyong
    Wang, Baocang
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2022, 201
  • [22] Privacy-Preserving Mining of Association Rule on Outsourced Cloud Data from Multiple Parties
    Liu, Lin
    Su, Jinshu
    Chen, Rongmao
    Liu, Ximeng
    Wang, Xiaofeng
    Chen, Shuhui
    Leung, Hofung
    [J]. INFORMATION SECURITY AND PRIVACY, 2018, 10946 : 431 - 451
  • [23] Privacy-preserving distributed association rule mining via semi-trusted mixer
    Yi, Xun
    Zhang, Yanchun
    [J]. DATA & KNOWLEDGE ENGINEERING, 2007, 63 (02) : 550 - 567
  • [24] Privacy-preserving association rule mining: a survey of techniques for sensitive rule identification and enhanced data protection
    Barua E.
    Dutta M.
    [J]. International Journal of Computers and Applications, 2024, 46 (04) : 252 - 265
  • [25] Enabling Privacy-Preserving Rule Mining in Decentralized Social Networks
    Wainakh, Aidmar
    Strassheim, Aleksej
    Grube, Tim
    Daubert, Joerg
    Muehlhaeuser, Max
    [J]. ARES 2021: 16TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, 2021,
  • [26] A Privacy-Preserving Distributed Method for Mining Association Rules
    Gui Qiong
    Cheng Xiao-hui
    [J]. 2009 INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND COMPUTATIONAL INTELLIGENCE, VOL IV, PROCEEDINGS, 2009, : 294 - 297
  • [27] Quantitative association rules mining methods with privacy-preserving
    Chen, ZY
    Liu, GH
    [J]. PDCAT 2005: Sixth International Conference on Parallel and Distributed Computing, Applications and Technologies, Proceedings, 2005, : 910 - 912
  • [28] Target-Based, Privacy Preserving, and Incremental Association Rule Mining
    Ahluwalia, Madhu V.
    Gangopadhyay, Aryya
    Chen, Zhiyuan
    Yesha, Yelena
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2017, 10 (04) : 633 - 645
  • [29] A NOVEL PRIVACY-PRESERVING ASSOCIATION RULES MINING METHOD
    Tian Hong
    Wang Xiukun
    [J]. INTERNATIONAL JOURNAL OF PATTERN RECOGNITION AND ARTIFICIAL INTELLIGENCE, 2010, 24 (06) : 995 - 1009
  • [30] Quantitative association rules mining methods with privacy-preserving
    Chen, ZY
    Ma, ZH
    Wa, Y
    Liu, GH
    [J]. COMPUTER APPLICATIONS IN INDUSTRY AND ENGINEERING, 2003, : 331 - 331