Skip to main content

Secure Multiparty Computation Methods

  • Living reference work entry
  • First Online:
  • 49 Accesses

Definition

The problem of preserving privacy while allowing data analysis can be attacked in many ways. One way is to avoid disclosing data beyond its source while still constructing data mining models equivalent to those that would have been learned on an integrated data set. This follows the approach of Secure Multiparty Computation (SMC). SMC refers to the general problem of computing a given function securely over private inputs while revealing nothing extra to any party except what can be inferred (in polynomial time) from its input and output. Since one can prove that data are not disclosed beyond its original source, the opportunity for misuse is not increased by the process of data mining.

The definition of privacy followed in this line of research is conceptually simple: no site should learn anything new from the processof data mining. Specifically, anything learned during the data mining process must be derivable given one’s own data and the final result. In other words,...

This is a preview of subscription content, log in via an institution.

Recommended Reading

  1. Agrawal R, Srikant R. Privacy-preserving data mining. In: Proceedings of the ACM SIGMOD International Conference on Management of Data; 2000. p. 439–50.

    Google Scholar 

  2. Du W, Zhan Z. Building decision tree classifier on private data. In: Clifton C, Estivill-Castro V, editors. IEEE International Conference on Data Mining Workshop on Privacy, Security, and Data Mining; 2002. p. 1–8.

    Google Scholar 

  3. Freedman MJ, Nissim K, Pinkas B. Efficient private matching and set intersection. In: Proceedings of the International Conference on Theory and Application of Cryptographic Techniques; 2004.

    Google Scholar 

  4. Goethals B, Laur S, Lipmaa H, Mielikäinen T. On secure scalar product computation for privacy-preserving data mining. In: Proceedings of the Seventh Annual International Conference in Information Security and Cryptology; 2004. p. 104–20.

    Google Scholar 

  5. Goldreich O. The foundations of cryptography, General cryptographic protocols, vol. 2. London: Cambridge University Press; 2004.

    Book  MATH  Google Scholar 

  6. Goldreich O, Micali S, Wigderson A. How to play any mental game – a completeness theorem for protocols with honest majority. In: Proceedings of the 19th ACM Symposium on the Theory of Computing; 1987. p. 218–29.

    Google Scholar 

  7. Kantarcolu M, Clifton C. Privacy-preserving distributed mining of association rules on horizontally partitioned data. IEEE Trans Knowl Data Eng. 2004;16(9):1026–37.

    Article  Google Scholar 

  8. Lin X, Clifton C, Zhu M. Privacy preserving clustering with distributed EM mixture modeling. Knowl Inf Syst. 2005;8(1):68–81.

    Article  Google Scholar 

  9. Lindell Y, Pinkas B. Privacy preserving data mining. J Cryptol. 2002;15(3):177–206.

    Article  MathSciNet  MATH  Google Scholar 

  10. Naor M, Pinkas B. Oblivious transfer and polynomial evaluation. In: Proceedings of the Thirty-First Annual ACM Symp. on Theory of Computing; 1999. p. 245–54.

    Google Scholar 

  11. Paillier P. Public-key cryptosystems based on composite degree residuosity classes. In: Proceedings of the International Conference on Theory and Application of Cryptographic Techniques; 1999. p. 223–38.

    Google Scholar 

  12. Vaidya J, Clifton C. Privacy-preserving outlier detection. In: Proceedings of the 2004 IEEE International Conference on Data Mining, 2004, p. 233–240.

    Google Scholar 

  13. Vaidya J, Clifton C. Secure set intersection cardinality with application to association rule mining. J Comput Security. 2005;13(4):593–622.

    Article  Google Scholar 

  14. Vaidya J, Clifton C, Zhu M. Privacy-preserving data mining. In: Advances in information security, vol. 19. 1st ed. Berlin: Springer; 2005.

    Google Scholar 

  15. Yao AC. How to generate and exchange secrets. In: Proceedings of the 27th IEEE Symposium on Foundations of Computer Science; 1986. p. 162–7.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Murat Kantarcolu .

Editor information

Editors and Affiliations

Section Editor information

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Science+Business Media LLC

About this entry

Cite this entry

Kantarcolu, M., Vaidya, J. (2017). Secure Multiparty Computation Methods. In: Liu, L., Özsu, M. (eds) Encyclopedia of Database Systems. Springer, New York, NY. https://doi.org/10.1007/978-1-4899-7993-3_1388-2

Download citation

  • DOI: https://doi.org/10.1007/978-1-4899-7993-3_1388-2

  • Received:

  • Accepted:

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4899-7993-3

  • Online ISBN: 978-1-4899-7993-3

  • eBook Packages: Springer Reference Computer SciencesReference Module Computer Science and Engineering

Publish with us

Policies and ethics