Advertisement

Efficient Privacy Preserving Distributed Association Rule Mining Protocol Based on Random Number

  • Reena KharatEmail author
  • Madhuri Kumbhar
  • Preeti Bhamre
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 243)

Abstract

The rapid advances in recent years in the field of data mining have lead to concern about privacy. The main aim of privacy preserving data mining is to find the global mining results without leaking individual information. For satisfying the privacy constraints, algorithms based on cryptography techniques, data perturbation, information hiding, k-anonymization, secure scalar product, and secret sharing technique are used. In this paper, we propose secure protocol for association rule mining using vector dot product over vertically distributed data among multiple parties. Our method is secure, more efficient and requires less communication cost.

Keywords

Privacy Association rule mining Secure multi-party computation Vector dot product Privacy preserving data mining 

References

  1. 1.
    Aggarwal, C.C., Philip S.Y.: A general survey of privacy-preserving data mining models and algorithms. In: Privacy-Preserving Data Mining: Models and Algorithms ISBN 978-0-387-70991-8 of the Kluwer International Series on Advances in Database Systems, vol. 34. Springer, (2008)Google Scholar
  2. 2.
    Yao, C.: Protocols for secure computations. In: Proceedings of the 23rd Annual IEEE Symposium on Foundations of Computer Science, IEEE Press, New York, (1982)Google Scholar
  3. 3.
    Goldreich, O.: Secure Multi-Party Computation. http://www.wisdom.weizmann.ac.il/ (1998)
  4. 4.
    Lindell, Y., Pinkas, B.: Privacy preserving data mining. In: Advances in Cryptology CRYPTO 2000, pp. 36–54. Springer, 20–24 Aug 2000Google Scholar
  5. 5.
    Aggarwal, C., Yu, P.: Privacy-Preserving Data Mining. Models and Algorithms. Springer (2008)Google Scholar
  6. 6.
    Clifton, C., Kantarcioglu, M., Vaidya, J., Lin, X., Zhu, M.Y.: Tools for privacy preserving distributed data mining. SIGKDD Explor. 4(2), 1–7 (2003)Google Scholar
  7. 7.
    Kumbhar, M., Kharat, R.: Privacy preserving mining of association rules on horizontally and vertically partitioned data: a review paper. In: Proceeding IEEE 12th International Conference, Hybrid Intelligent Systems, 978-1-4673-5114-0, pp. 231–235 (2012)Google Scholar
  8. 8.
    Waddey, M., Poncelet, P., Ben Yahia, S.: A novel approach for privacy mining of generic basic association rules. In: PAVLAD’09, ACM, Hong Kong, China, 6 Nov 2009Google Scholar
  9. 9.
    Hussein, M., El-Sisi, A., Ismail, N.: Fast cryptographic privacy preserving association rules mining on distributed homogenous data base. Knowledge-Based Intelligent Information and Engineering Systems, Lecture Notes in Computer Science, vol. 5178, pp. 607–616 (2008)Google Scholar
  10. 10.
    Vaidya, J., Clifton, C.: Privacy preserving association rule mining in vertically partitioned data. In: Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. Edmonton, Alberta, Canada: ACM 2002, pp. 639–644Google Scholar
  11. 11.
    Zhan, J., Matwin, S., Chang, L.W.: Privacy-preserving collaborative association rule mining. J. Netw. Comput. Appl. 30(3), 1216–1227 (2007)CrossRefGoogle Scholar
  12. 12.
    Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)MathSciNetCrossRefGoogle Scholar
  13. 13.
    Ge, X., Yan, L., Zhu, J., Shi, W.: Privacy-preserving distributed association rule mining based on the secret sharing technique. In: 2nd International Conference on Software Engineering and Data Mining (SEDM), June 2010 IEEEGoogle Scholar
  14. 14.
    Yu-quan, X., Yang, T., Geng, C.: A privacy preserving algorithm for mining distributed association rules. In: International Conference on Computer and Management—CAMAN, 2011 IEEEGoogle Scholar
  15. 15.
    Agrawal, R., Srikant, R.: Fast algorithms for mining association rules. In: Proceedings of the 20th International Conference on Very Large Data Bases, Santiago, Chile, VLDB, 12–15 Sept 1994Google Scholar

Copyright information

© Springer India 2014

Authors and Affiliations

  1. 1.Department of Computer EngineeringPimpri Chinchwad College of EngineeringPuneIndia
  2. 2.Department of Electronics and TelecomK. K. Wagh Institute of Engineering Education and ResearchNashikIndia

Personalised recommendations