Privacy-preserving distributed association rule mining via semi-trusted mixer

Data and Knowledge Engineering - Tập 63 - Trang 550-567 - 2007
Xun Yi1, Yanchun Zhang1
1School of Computer Science and Mathematics, Victoria University, P.O. Box 14428, Melbourne City MC, Victoria 8001, Australia

Tài liệu tham khảo

D. Struck, Don’t store my data, Japanese tell government, in: International Herald Tribune, 25 Aug. 2002. Vaidya, 2004, Privacy-preserving data mining: why, how and when, IEEE Security and Privacy, 2, 19, 10.1109/MSP.2004.108 Kargupta, 2000 Sweeney, 2002, K-anonymity: a model for protecting privacy, International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, 10, 557, 10.1142/S0218488502001648 R. Agrawal, R. Srikant, Privacy-preserving data mining, in: Proceedings of ACM SIGMOD International Conference on Management of Data, 2000, pp. 439–450. Lindell, 2002, Privacy preserving data mining, Journal of Cryptology, 15, 177, 10.1007/s00145-001-0019-2 Evfimievski, 2002, Privacy-preserving mining of association rules, 217 Kantarcioglu, 2004, Privacy-preserving distributed mining of association rules on horizontally partitioned data, IEEE Trans. Knowledge and Data Engineering, 16, 1026, 10.1109/TKDE.2004.45 Vaidya, 2002, Privacy-preserving association rule mining in vertically partitioned data, 639 Verykios, 2004, Association rule hiding, IEEE Trans. on Knowledge and Data Engineering, 16, 434, 10.1109/TKDE.2004.1269668 Rizvi, 2002, Maintaining data privacy in association rule mining, Proc. 28th Int’l Conf. Very Large Data Bases, 682, 10.1016/B978-155860869-6/50066-4 Clifton, 2002, Tools for privacy preserving distributed data mining, SIGKDD Exploration, 4, 1, 10.1145/772862.772867 Vaidya, 2003, Privacy-preserving k-means clustering over vertically partitioned data, 206 M. Kantarcioglu, J. Vaidya, Privacy-preserving naive Bayes classifier for horizontally partitioned data, in: Proc. IEEE Workshop on Privacy Preserving Data Mining, 2003, pp. 3–9. J. Vaidya, C. Clifton, Privacy preserving naive Bayes classifier on vertically partitioned data, in: Proc. 2004 SIAM International Conference on Data Mining, 2004. R. Wright, Z. Yang, Privacy-preserving Baysian network structure computation on distributed heterogeneous data, in: Proc. KDD’04, 2004, pp. 713–718. Z. Yang, S. Zhong, R. Wright, Privacy-preserving classification of customer data without loss of accuracy, in: 5th SIAM International Conference on Data Mining, 2005. H. Kargupta, S. Datta, Q. Wang, K. Sivakumar, On the privacy preserving properties of random data perturbation techniques, in: Proc. 3rd Int’l Conf. on Data Mining, 2003, 99–106. A.C. Yao, How to generate and exchange secrets, in: Proc. 27th IEEE Symposium on Foundations of Computer Science, 1986, pp. 162–167. O. Goldreich, S. Micali, A. Wigderson, How to play any mental game – a completeness theorem for protocols with honest majority, in: Proc. 19th ACM Symposium on the Theory of Computing, 1987, pp. 218–229. D. Chaum, C. Crepeau, I. Damgard, Multiparty unconditionally secure protocols, in: Proc. 20th ACM Symposium on the Theory of Computing, 1988, pp. 11–19. D.W.-L. Cheung, J. Han, V. Ng, A.W.-C. Fu, Y. Fu, A fast distributed algorithm for mining association rules, in: Proc. 1996 Int’l Conf. Parallel and Distributed Information Systems (PDIS’96), 1996, pp. 31–42. J.C. Benaloh, Secret sharing homomorphisms: Keeping shares of a secret, in: Proc. Crypto’86, 1986 pp. 251–260. Chor, 1993, A communication-privacy tradeoff for modular addition, Information Processing Letters, 45, 205, 10.1016/0020-0190(93)90120-X ElGamal, 1985, A public key cryptosystem and a signature scheme based on discrete logarithms, IEEE Trans. Inform. Theory IT-31, 469, 10.1109/TIT.1985.1057074 R. Agrawal, R. Srikant, Fast algorithms for mining association rules, in: Proc. 20th Int’l Conf. Very Large Data Bases, 1994, pp. 487–499. Han, 2000 P. Paillier, Public-key cryptosystems based on composite degree residuosity classes, in: Proc. Eurocrypt’99, 1999, pp. 223–238. Lenstra, 2000, Integer factoring, Design, Code and Cryptography, 19, 101, 10.1023/A:1008397921377 M.K. Franklin, M.K. Reiter, Fair exchange with a semi-trusted party, in: Proc. CCS’97, 1997. Yi, 2004, Identity-based fault-tolerant conference key agreement, IEEE Trans. Dependable and Secure Computing, 1, 170, 10.1109/TDSC.2004.31 NBS FIPS PUB 46, Data Encryption Standard (National Bureau of Standards, US Department of ommerce, 1977). FIPS PUB 197, Advanced Encryption Standard (Federal Information Processing Standards Publications, US Department of Commerce/N.I.S.T., National Technical Information Service, 2001). Tzeng, 2002, A secure fault-tolerant conference key agreement protocol, IEEE Trans. Computers, 51, 373, 10.1109/12.995447 Pohlig, 1978, An improved algorithm for computing logarithm over GF(p) and its cryptographic significance, IEEE Trans. Information Theory IT-24, 106, 10.1109/TIT.1978.1055817 Agrawal, 1996, Parallel mining of association rules, IEEE Trans. Knowledge and Data Engineering, 8, 962, 10.1109/69.553164 H. Lipmaa, AES candidates, A survey of implementation <http://www.adastral.ucl.ac.uk/helger/research/aes/rijndael.html>. M. Scott, Comparison of methods for modular exponentiation on 32-bit Intel 80x86 processors <http://www.shamus.ie/uploads/File/timings.doc>.