Privacy Preservation for Global Cyclic Associations in Distributed Databases

Procedia Technology - Tập 6 - Trang 962-969 - 2012
Nirali Nanavati1, Devesh Jinwala2
1First affiliation, Address, City and Postcode, Country
2Second affiliation, Address, City and Postcode, Country

Tài liệu tham khảo

Aggarwal, Charu C. & Philip S. Yu. 2008. A General Survey of Privacy-Preserving Data Mining Models and Algorithms. In Privacy-Preserving Data Mining. Vol. 34 of The Kluwer International Series on Advances in Database Systems Springer US pp. 11-52. Agrawal, Rakesh & Ramakrishnan Srikant. 1994. Fast Algorithms for Mining Association Rules in Large Databases. In Proceedings of the 20th International Conference on Very Large Data Bases. VLDB ‘94 San Francisco, CA, USA: Morgan Kaufmann Publishers Inc. pp. 487-499. Ben Ahmed, Eya & Med Salah Gouider. 2010. Towards a new mechanism of extracting cyclic association rules based on partition aspect. In Research Challenges in Information Science (RCIS), 2010 Fourth International Conference on. pp. 69-78. Cheung, David W., Jiawei Han, Vincent T. Ng, Ada W. Fu & Yongjian Fu. 1996. A fast distributed algorithm for mining association rules. In Proceedings of the fourth international conference on Parallel and distributed information systems. DIS ‘96 Washington, DC, USA: IEEE Computer Society pp. 31-43. Evfimievski, Alexandre & Tyrone Grandison. 2007. “Privacy preserving data mining (a short survey). In Encyclopedia of Database Technologies and Applications. Freedman, Michael J., Kobbi Nissim & Benny Pinkas. 2004a. Efficient private matching and set intersection. Springer-Verlag pp. 1-19. Ge, Xinjing, Li Yan, Jianming Zhu & Wenjie Shi. 2010. Privacy-preserving distributed association rule mining based on the secret sharing technique. In Software Engineering and Data Mining (SEDM), 2010 2nd International Conference on. pp. 345-350. Goldreich, Oded & A Warning. 1998. “Secure Multi-Party Computation. Kantarcioglu, M. & C. Clifton. 2004. “Privacy-preserving distributed mining of association rules on horizontally partitioned data.” Knowledge and Data Engineering, IEEE Transactions on 16(9):1026-1037. Kantarcioglu, Murat. 2008. A Survey of Privacy-Preserving Methods Across Horizontally Partitioned Data. In Privacy-Preserving Data Mining. Vol. 34 of Advances in Database Systems Springer US pp. 313-335. Kargupta, Hillol, Kamalika Das & Kun Liu. 2007. Multi-party, Privacy-Preserving Distributed Data Mining Using a Game Theoretic Framework. In Proceedings of the 11th European conference on Principles and Practice of Knowledge Discovery in Databases. PKDD 2007 Berlin, Heidelberg: pp. 523-531. Özden, Banu, Sridhar Ramaswamy & Abraham Silberschatz. 1998. Cyclic Association Rules. In Proceedings of the Fourteenth International Conference on Data Engineering. ICDE ‘98 Washington, DC, USA: IEEE Computer Society pp. 412-421. Pedersen, T.B., Y. Saygin & E. Savas. 2007. “Secret Sharing vs. Encryption-based Techniques For Privacy Preserving Data Mining.” Sciences-New York (December):17-19. Samet, Saeed & Ali Miri. 2009. Secure two and multi-party association rule mining. In Proceedings of the Second IEEE international conference on Computational intelligence for security and defense applications. CISDA’09 Piscataway, NJ, USA: IEEE Press pp. 297-302. Sang, Yingpeng, Hong Shen & Hui Tian. 2009. “Privacy-Preserving Tuple Matching in Distributed Databases. IEEE Trans. on Knowledge and Data Eng. 21:1767-1782. Sekhavat, Y.A. & M. Fathian. 2010. “Mining frequent itemsets in the presence of malicious participants. Information Security, IET 4(2):80-92. Shamir, Adi. 1979. How to share a secret. Commun. ACM 22:612-613. Shi, Elaine, T.-H. Hubert Chan, Eleanor G. Rieffel, Richard Chow & Dawn Song. 2011. Privacy-Preserving Aggregation of Time-Series Data. In NDSS. Vaidya, Jaideep. 2008. A Survey of Privacy-Preserving Methods Across Vertically Partitioned Data. In Privacy-Preserving Data Mining. Vol. 34 of The Kluwer International Series on Advances in Database Systems Springer US pp. 337-358. Vaidya, Jaideep, Chris Clifton. 2005. “Secure set intersection cardinality with application to association rule mining. J. Comput. Secur. 13:593-622. Venkatadri.M & Dr. Lokanatha C. Reddy. 2011. “Article: A Review on Data mining from Past to the Future. International Journal of Computer Applications 15(7):19-22. Verykios, Vassilios S. & Aris Gkoulalas-Divanis. 2008. A Survey of Association Rule Hiding Methods for Privacy. In Privacy-Preserving Data Mining. pp. 267-289. Wang, Weiping, Bing Deng & Zhepeng Li. 2007. Application of Oblivious Transfer Protocol in Distributed Data Mining with Privacy-preserving. In Proceedings of The First International Symposium on Data, Privacy, and E-Commerce. Washington, DC, USA: IEEE Computer Society pp. 283-285. Yang, Qiang & Xindong Wu. 2006. “10 Challenging Problems in Data Mining Research. International Journal of Information Technology and Decision Making 5(4):597-604. Yao, Andrew C. 1982. Protocols for secure computations. In Foundations of Computer Science, 1982. SFCS ‘08. 23rd Annual Symposium on. pp. 160-164. Zaki, Mohammed Javeed & Ching-Tien Ho, eds. 2000. Large-Scale Parallel Data Mining, Workshop on Large-Scale Parallel KDD Systems, SIGKDD, August 15, 1999, San Diego, CA, USA, revised papers. Vol. 1759 of Lecture Notes in Computer Science Springer.