Abstract
Recent trends in the global economy force competitive enterprises to collaborate with each other to analyze markets in a better way and make decisions based on that. Therefore, they might want to share their data with each other to run data mining algorithms over the union of their data to get more accurate and representative results. During this process they do not want to reveal their data to each other due to the legal issues and competition. However, current systems do not consider privacy preservation in data sharing across private data sources. To satisfy this requirement, we propose a distributed middleware, ABACUS, to perform intersection, join, and aggregation queries over multiple private data warehouses in a privacy preserving manner. Our analytical evaluations show that ABACUS is efficient and scalable.
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
This research was funded in parts by NSF grants IS-02-23022 and CNF-04-23336.
Download to read the full chapter text
Chapter PDF
References
Aggarwal, G., Bawa, M., Ganesan, P., Garcia-Molina, H., Kenthapadi, K., Mishra, N., Motwani, R., Srivastava, U., Thomas, D., Widom, J., Xu, Y.: Enabling privacy for the paranoids. In: Proc. of the 30th Int’l Conference on Very Large Databases VLDB, August 2004, pp. 708–719 (2004)
Agrawal, R., Evfimievski, A., Srikant, R.: Information sharing across private databases. In: Proc. of the 2003 ACM SIGMOD international conference on on Management of data, pp. 86–97 (2003)
Bergamaschi, S., Castano, S., Vincini, M., Beneventano, D.: Semantic integration of heterogeneous information sources. Data Knowl. Eng. 36(3), 215–249 (2001)
Dayal, U., Hwang, H.: View definition and generalization for database integration in a multidatabase system. In: IEEE Transactions on Software Engineering, vol. 10, pp. 628–644 (1984)
Ganesan, P., Venugopalan, R., Peddabachagari, P., Dean, A., Mueller, F., Sichitiu, M.: Analyzing and modeling encryption overhead for sensor network nodes. In: Proc. of the 2nd ACM international conference on Wireless sensor networks and applications, pp. 151–159. ACM Press, New York (2003)
Goldreich, O.: Secure multi-party computation. Working Draft (June 2001)
Haas, L.M., Miller, R.J., Niswonger, B., Roth, M.T., Schwarz, P.M., Wimmers, E.L.: Transforming heterogeneous data with database middleware: Beyond integration. IEEE Data Engineering Bulletin 22(1), 31–36 (1999)
Halevy, A.Y., Ives, Z.G., Suciu, D., Tatarinov, I.: Schema mediation in peer data management systems. In: Proc. of the 19th ICDE, pp. 505–516 (2003)
Kementsietsidis, A., Arenas, M., Miller, R.J.: Mapping data in peer-to-peer systems: Semantics and algorithmic issues. In: Proc. of the 2003 ACM SIGMOD, pp. 325–336 (2003)
Jefferies, M.W.N., Mitchell, C.: A proposed architecture for trusted third party services. In: Cryptography Policy and Algorithms Conference (July 1995)
Naor, M., Nissim, K.: Communication preserving protocols for secure function evaluation. In: ACM Symposium on Theory of Computing, pp. 590–599 (2001)
Secure Hash Standart, http://www.itl.nist.gov/fipspubs/fip180-1.htm
Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 IFIP International Federation for Information Processing
About this paper
Cite this paper
Emekci, F., Agrawal, D., El Abbadi, A. (2005). ABACUS: A Distributed Middleware for Privacy Preserving Data Sharing Across Private Data Warehouses. In: Alonso, G. (eds) Middleware 2005. Middleware 2005. Lecture Notes in Computer Science, vol 3790. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11587552_2
Download citation
DOI: https://doi.org/10.1007/11587552_2
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-30323-7
Online ISBN: 978-3-540-32269-6
eBook Packages: Computer ScienceComputer Science (R0)