Abstract
To conduct data mining including mining on the web data, we often need to collect data from various parties. Privacy concerns may prevent the parties from directly sharing the data and some types of information about the data. How multiple parties collaboratively conduct data mining without breaching data privacy presents a challenge. In this paper, we present a solution for privacy-preserving k-Medoids clustering which is one of data mining tasks. The solution is based on the cryptography technology.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Agrawal, D., Aggarwal, C.: On the design and quantification of privacy preserving data mining algorithms. In: Proceedings of the Twenti- eth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, Santa Barbara, CA, May 21-23, pp. 247–255. ACM Press, New York (2001)
Agrawal, R., Srikant, R.: Privacy-preserving data mining. In: Proceedings of the ACM SIGMOD Conference on Management of Data, pp. 439–450. ACM Press, New York (2000)
Berkhin, P.: Survey of clustering data mining techniques. Technical report, Accrue Software, San Jose, CA (2002)
Chaum, D.: Security without identification. Communication of the ACM 28(10), 1030–1044 (1985)
Du, W., Zhan, Z.: Building decision tree classifier on private data. In: IEEE Intertional Workshop on Privacy, Security, and Data Mining, Maebashi City, Japan, December 9, IEEE Computer Society Press, Los Alamitos (2002)
Du, W., Zhan, Z.: Using randomized response techniques for privacy-preserving data mining. In: Proceedings of The 9th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, August 24 - 27, ACM Press, New York (2003)
Epic. Privacy and human rights an international survey of privacy laws and developments. In: Electronic Privacy Information Center (May 2003), http://www.epic.org
Evfimievski, A., Gehrke, J.E., Srikant, R.: Limiting privacy breaches in privacy preserving data mining. In: Proceedings of the 22nd ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems (PODS 2003), San Diego, CA, ACM Press, New York (2003)
Evfmievski, A., Srikant, R., Agrawal, R., Gehrke, J.: Privacy preserving mining of association rules. In: Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Edmonton, Alberta, Canada, July 23-26, pp. 217–228. ACM Press, New York (2002)
Goldreich, O.: Secure multi-party computation (working draft) (1998), http://www.wisdom.weizmann.ac.il/home/oded/public_html/foc.html
Goldreich, O.: The foundations of cryptography, vol. 2. Cambridge University Press, Cambridge (2004)
Han, J., Kamber, M.: Data Mining: Concepts and Techniques. Morgan Kaufmann, San Francisco (2000)
Kantarcioglu, M., Clifton, C.: Privacy-preserving distributed mining of association rules on horizontally partitioned data. In: DMK 2002. The ACM SIGMOD Workshop on Research Issues on Data Mining and Knowledge Discovery, Madison, WI, pp. 24–31. ACM Press, New York (2002)
Kargupta, H., Datta, S., Wang, Q., Sivakumar, K.: On the privacy preserving properties of random data perturbation techniques. In: ICDM 2003. Proceedings of the Third IEEE International Conference on Data Mining, Melbourne, FL, November 19-22, IEEE Computer Society Press, Los Alamitos (2003)
Kaufman, L., Rousseeuw, P.: Finding groups in data. Wiley, New York (1990)
Lin, X., Clifton, C., Zhu, M.: Privacy preserving clustering with distributed em mixture modeling. In: Knowledge and Information Systems (2004)
Lindell, Y., Pinkas, B.: Privacy preserving data mining. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, Springer, Heidelberg (2000)
Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223–238. Springer, Heidelberg (1999)
Rivest, R., Adleman, L., Dertouzos, M.: On data banks and privacy homomorphisms. In: DeMillo, R.A., et al. (eds.) Foundations of Secure Computation, pp. 169–179. Academic Press, London (1978)
Rizvi, S., Haritsa, J.: Maintaining data privacy in association rule mining. In: Proceedings of the 28th VLDB Conference, Hong Kong, China (2002)
Vaidya, J., Clifton, C.: Privacy preserving association rule mining in vertically partitioned data. In: Proceedings of the 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Edmonton, Alberta, Canada, July 23-26, ACM Press, New York (2002)
Vaidya, J., Clifton, C.: Privacy-preserving decision trees over vertically partitioned data. In: 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security Nathan Hale Inn, University of Connecticut, Storrs, CT, U.S.A (August 7-10, 2005)
Vaidya, J., Clifton, C.W.: Privacy preserving k-means clustering over vertically partitioned data. In: Proceedings of the 9th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, August 24-27, ACM Press, New York (2003)
Weight, J.: Ensuring trust in the electronic health record. In: Electronic Health Information and Privacy Conference, Ottawa, Canada (2005)
Wright, R., Yang, Z.: Privacy-preserving bayesian network structure computation on distributed heterogeneous data. In: Proceedings of the 10th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD), ACM Press, New York (2004)
Yao, A.C.: Protocols for secure computations. In: Proceedings of the 23rd Annual IEEE Symposium on Foundations of Computer Science, IEEE Computer Society Press, Los Alamitos (1982)
Zhan, J.: Privacy Preserving Collaborative Data Mining. PhD thesis, Department of Computer Science, University of Ottawa (2006)
Zhan, J., Matwin, S.: A crypto-based approach to privacy preserving collaborative data mining. In: Workshop on Privacy Aspect of Data Mining (PADM 2006) in conjunction with the IEEE International Conference on Data Mining (ICDM 2006), HongKong, December 1, IEEE Computer Society Press, Los Alamitos (2006)
Zhan, J., Matwin, S., Chang, L.: Privacy-preserving collaborative association rule mining. In: 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Nathan Hale Inn, University of Connecticut, Storrs, CT, U.S.A (August 7-10, 2005)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zhan, J. (2007). Using Cryptography for Privacy Protection in Data Mining Systems. In: Zhong, N., Liu, J., Yao, Y., Wu, J., Lu, S., Li, K. (eds) Web Intelligence Meets Brain Informatics. WImBI 2006. Lecture Notes in Computer Science(), vol 4845. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-77028-2_29
Download citation
DOI: https://doi.org/10.1007/978-3-540-77028-2_29
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-77027-5
Online ISBN: 978-3-540-77028-2
eBook Packages: Computer ScienceComputer Science (R0)