Privacy-preserving naive Bayes classification on distributed data via semi-trusted mixers

Information Systems - Tập 34 - Trang 371-380 - 2009
Xun Yi1, Yanchun Zhang1
1School of Engineering and Science, Victoria University, PO Box 14428, Melbourne City MC, Victoria 8001, Australia

Tài liệu tham khảo

D. Struck, Don’t store my data, Japanese tell government, in: International Herald Tribune, 25 August 2002. Kargupta, 2000 J. Vaidya, C. Clifton, Privacy-preserving data mining: Why, how and when, IEEE Security and Privacy, November/December 2004, pp. 19–27. Zhang, 2005, A new scheme on privacy-preserving data classification, 374 Sweeney, 2002, k-Anonymity: a model for protecting privacy, International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, 10, 557, 10.1142/S0218488502001648 Agrawal, 2000, Privacy-preserving data mining, 439 Lindell, 2002, Privacy preserving data mining, Journal of Cryptology, 15, 177, 10.1007/s00145-001-0019-2 Evfimievski, 2002, Privacy-preserving mining of association rules Kantarcioglu, 2003, Privacy preserving naive Bayes classifier for horizontally partitioned data Vaidya, 2002, Privacy-preserving association rule mining in vertically partitioned data, 639 Verykios, 2004, Association rule hiding, IEEE Transactions on Knowledge and Data Engineering, 16, 434, 10.1109/TKDE.2004.1269668 Rizvi, 2002, Maintaining data privacy in association rule mining, 682 Clifton, 2002, Tools for privacy preserving distributed data mining, SIGKDD Exploration, 4, 1, 10.1145/772862.772867 Vaidya, 2003, Privacy-preserving k-means clustering over vertically partitioned data, 206 Kantarcioglu, 2003, Privacy-preserving naive Bayes classifier for horizontally partitioned data Vaidya, 2004, Privacy preserving naive Bayes classifier on vertically partitioned data Wright, 2004, Privacy-preserving Bayesian network structure computation on distributed heterogeneous data Yang, 2005, Privacy-preserving classification of customer data without loss of accuracy Kargupta, 2003, On the privacy preserving properties of random data perturbation techniques, 99 Yao, 1982, Protocols for secure computations (extended abstract), 160 Goldreich, 1987, How to play any mental game—a completeness theorem for protocols with honest majority, 218 Chaum, 1988, Multiparty unconditionally secure protocols, 11 ElGamal, 1985, A public key cryptosystem and a signature scheme based on discrete logarithms, IEEE Transactions on Information Theory, 31, 469, 10.1109/TIT.1985.1057074 Yi, 2007, Privacy-preserving distributed association rule mining via semi-trusted mixer, Data and Knowledge Engineering, 63, 550, 10.1016/j.datak.2007.04.001 Han, 2000 Paillier, 1999, Public-key cryptosystems based on composite degree residuosity classes, 223 Lenstra, 2000, Integer factoring, Design, Code and Cryptography, 19, 101, 10.1023/A:1008397921377 Yao, 1986, How to generate and exchange secrets, 162