Skip to main content

Efficient Privacy Preserving Distributed Association Rule Mining Protocol Based on Random Number

  • Conference paper
Intelligent Computing, Networking, and Informatics

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 243))

Abstract

The rapid advances in recent years in the field of data mining have lead to concern about privacy. The main aim of privacy preserving data mining is to find the global mining results without leaking individual information. For satisfying the privacy constraints, algorithms based on cryptography techniques, data perturbation, information hiding, k-anonymization, secure scalar product, and secret sharing technique are used. In this paper, we propose secure protocol for association rule mining using vector dot product over vertically distributed data among multiple parties. Our method is secure, more efficient and requires less communication cost.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Aggarwal, C.C., Philip S.Y.: A general survey of privacy-preserving data mining models and algorithms. In: Privacy-Preserving Data Mining: Models and Algorithms ISBN 978-0-387-70991-8 of the Kluwer International Series on Advances in Database Systems, vol. 34. Springer, (2008)

    Google Scholar 

  2. Yao, C.: Protocols for secure computations. In: Proceedings of the 23rd Annual IEEE Symposium on Foundations of Computer Science, IEEE Press, New York, (1982)

    Google Scholar 

  3. Goldreich, O.: Secure Multi-Party Computation. http://www.wisdom.weizmann.ac.il/ (1998)

  4. Lindell, Y., Pinkas, B.: Privacy preserving data mining. In: Advances in Cryptology CRYPTO 2000, pp. 36–54. Springer, 20–24 Aug 2000

    Google Scholar 

  5. Aggarwal, C., Yu, P.: Privacy-Preserving Data Mining. Models and Algorithms. Springer (2008)

    Google Scholar 

  6. Clifton, C., Kantarcioglu, M., Vaidya, J., Lin, X., Zhu, M.Y.: Tools for privacy preserving distributed data mining. SIGKDD Explor. 4(2), 1–7 (2003)

    Google Scholar 

  7. Kumbhar, M., Kharat, R.: Privacy preserving mining of association rules on horizontally and vertically partitioned data: a review paper. In: Proceeding IEEE 12th International Conference, Hybrid Intelligent Systems, 978-1-4673-5114-0, pp. 231–235 (2012)

    Google Scholar 

  8. Waddey, M., Poncelet, P., Ben Yahia, S.: A novel approach for privacy mining of generic basic association rules. In: PAVLAD’09, ACM, Hong Kong, China, 6 Nov 2009

    Google Scholar 

  9. Hussein, M., El-Sisi, A., Ismail, N.: Fast cryptographic privacy preserving association rules mining on distributed homogenous data base. Knowledge-Based Intelligent Information and Engineering Systems, Lecture Notes in Computer Science, vol. 5178, pp. 607–616 (2008)

    Google Scholar 

  10. Vaidya, J., Clifton, C.: Privacy preserving association rule mining in vertically partitioned data. In: Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. Edmonton, Alberta, Canada: ACM 2002, pp. 639–644

    Google Scholar 

  11. Zhan, J., Matwin, S., Chang, L.W.: Privacy-preserving collaborative association rule mining. J. Netw. Comput. Appl. 30(3), 1216–1227 (2007)

    Article  Google Scholar 

  12. Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)

    Article  MathSciNet  Google Scholar 

  13. Ge, X., Yan, L., Zhu, J., Shi, W.: Privacy-preserving distributed association rule mining based on the secret sharing technique. In: 2nd International Conference on Software Engineering and Data Mining (SEDM), June 2010 IEEE

    Google Scholar 

  14. Yu-quan, X., Yang, T., Geng, C.: A privacy preserving algorithm for mining distributed association rules. In: International Conference on Computer and Management—CAMAN, 2011 IEEE

    Google Scholar 

  15. Agrawal, R., Srikant, R.: Fast algorithms for mining association rules. In: Proceedings of the 20th International Conference on Very Large Data Bases, Santiago, Chile, VLDB, 12–15 Sept 1994

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Reena Kharat .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer India

About this paper

Cite this paper

Kharat, R., Kumbhar, M., Bhamre, P. (2014). Efficient Privacy Preserving Distributed Association Rule Mining Protocol Based on Random Number. In: Mohapatra, D.P., Patnaik, S. (eds) Intelligent Computing, Networking, and Informatics. Advances in Intelligent Systems and Computing, vol 243. Springer, New Delhi. https://doi.org/10.1007/978-81-322-1665-0_83

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-1665-0_83

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-1664-3

  • Online ISBN: 978-81-322-1665-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics