scispace - formally typeset
Open AccessJournal ArticleDOI

Privacy-preserving distributed mining of association rules using Elliptic-curve cryptosystem and Shamir’s secret sharing scheme

Reads0
Chats0
TLDR
This work proposes two protocols, which are securely generating global association rules in horizontally distributed databases, and incorporates Shamir’s secret sharing scheme in the second protocol, which provides privacy by preventing colluding sites and external adversary attack.
Abstract
Distributed data mining has played a vital role in numerous application domains. However, it is widely observed that data mining may pose a privacy threat to individual’s sensitive information. To address privacy problem in distributed association rule mining (a data mining technique), we propose two protocols, which are securely generating global association rules in horizontally distributed databases. The first protocol uses the notion of Elliptic-curve-based Paillier cryptosystem, which helps in achieving the integrity and authenticity of the messages exchanged among involving sites over the insecure communication channel. It offers privacy of individual site’s information against the involving sites and an external adversary. However, the collusion of two sites may affect the privacy of individuals. To address this problem, we incorporate Shamir’s secret sharing scheme in the second protocol. It provides privacy by preventing colluding sites and external adversary attack. We analyse both protocols in terms of fulfilling the privacy-preserving distributed association rule mining requirements.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal Article

Privacy preserving association rule mining in vertically partitioned data

TL;DR: A privacy preserving association rule mining algorithm was introduced that preserved privacy of individual values by computing scalar product and the security was analyzed.
Journal ArticleDOI

Privacy Preserving Association Rule Mining: Taxonomy, Techniques, and Metrics

TL;DR: This paper provides a comprehensive review of studies on a specific PPDM, known as privacy-preserving association rule mining (PPARM), and presents a detailed taxonomy for the existing PPARM algorithms according to multiple dimensions and surveys the most relevant PPARM techniques from the literature.
Journal ArticleDOI

Improving healthcare services using source anonymous scheme with privacy preserving distributed healthcare data collection and mining

TL;DR: This paper adopts source anonymous technique as privacy preserving scheme and presents a novel scheme for healthcare data collection and mining which is collusion resilient against central data mining server and EHR systems and shows the advantage to E HR systems using the proposed approach in terms of disease prediction accuracy.
Proceedings ArticleDOI

Efficient privacy-preserving recommendations based on social graphs

TL;DR: This work proposes and compares sampling strategies to sample the data based on social graphs in a privacy-preserving manner and shows that the sampling-based approach can achieve a high average precision score with as low as 50% sampling rate and, therefore, with a 50% reduction of communication cost.
Journal ArticleDOI

Secure Association Rule Mining on Vertically Partitioned Data Using Private-Set Intersection

TL;DR: This study focuses on the private-set intersection instead of the scalar product and shows that this intersection enables organizations to execute ARM on vertically partitioned data, allowing flexible information sharing while preserving privacy without increasing communication and computation costs.
References
More filters
Proceedings ArticleDOI

Mining association rules between sets of items in large databases

TL;DR: An efficient algorithm is presented that generates all significant association rules between items in the database of customer transactions and incorporates buffer management and novel estimation and pruning techniques.
Journal ArticleDOI

How to share a secret

TL;DR: This technique enables the construction of robust key management schemes for cryptographic systems that can function securely and reliably even when misfortunes destroy half the pieces and security breaches expose all but one of the remaining pieces.
Proceedings Article

Fast algorithms for mining association rules

TL;DR: Two new algorithms for solving thii problem that are fundamentally different from the known algorithms are presented and empirical evaluation shows that these algorithms outperform theknown algorithms by factors ranging from three for small problems to more than an order of magnitude for large problems.
Book ChapterDOI

Public-key cryptosystems based on composite degree residuosity classes

TL;DR: A new trapdoor mechanism is proposed and three encryption schemes are derived : a trapdoor permutation and two homomorphic probabilistic encryption schemes computationally comparable to RSA, which are provably secure under appropriate assumptions in the standard model.
Proceedings ArticleDOI

Fully homomorphic encryption using ideal lattices

TL;DR: This work proposes a fully homomorphic encryption scheme that allows one to evaluate circuits over encrypted data without being able to decrypt, and describes a public key encryption scheme using ideal lattices that is almost bootstrappable.
Related Papers (5)