Proceedings ArticleDOI
Research on privacy preserving association rule mining a survey
Pingshui Wang
- pp 194-198
Reads0
Chats0
TLDR
The general principles and methods of privacy preserving association rule mining are analyzed and summarized, and an effective metrics for measuring side-effects resulted from privacy preserving process are introduced.Abstract:
Association rule mining is one of the hottest research areas that investigate the automatic extraction of previously unknown patterns or rules from large amounts of data. Recently, there has been growing concern over the privacy implications of association rule mining. This paper described the basic concepts related to association rule mining, and analyzed and summarized the general principles and methods of privacy preserving association rule mining, and pointed out the drawback of the these methods. It also introduced an effective metrics for measuring side-effects resulted from privacy preserving process. Finally the present problems and directions for future research are discussed.read more
Citations
More filters
Journal ArticleDOI
A survey on trust management for Internet of Things
TL;DR: This paper investigates the properties of trust, proposes objectives of IoT trust management, and provides a survey on the current literature advances towards trustworthy IoT to propose a research model for holistic trust management in IoT.
Journal Article
Privacy preserving association rule mining in vertically partitioned data
TL;DR: A privacy preserving association rule mining algorithm was introduced that preserved privacy of individual values by computing scalar product and the security was analyzed.
Journal ArticleDOI
Context-Aware Verifiable Cloud Computing
Zheng Yan,Xixun Yu,Wenxiu Ding +2 more
TL;DR: A context-aware verifiable computing scheme based on full homomorphic encryption is proposed by deploying an auditing protocol to verify the correctness of the encrypted data processing result by designing four optional auditing protocols to satisfy different security requirements.
Patent
Method and apparatus for verifying processed data
TL;DR: In this article, a data processing result from a trustworthy party is verified by the data processing results from a requesting party or a processing party in response to receiving a request for verifying correctness of the result from the requesting party.
Journal ArticleDOI
Protecting Sensitive knowledge in association patterns mining
Guanling Lee,Yi Chun Chen +1 more
TL;DR: This article introduces and discusses the major categories of sensitive‐knowledge‐protecting methodologies and the aim of these algorithms is to extract as much as nonsensitive knowledge from the collaborative databases as possible while protecting sensitive information.
References
More filters
Proceedings ArticleDOI
Mining association rules between sets of items in large databases
TL;DR: An efficient algorithm is presented that generates all significant association rules between items in the database of customer transactions and incorporates buffer management and novel estimation and pruning techniques.
Journal ArticleDOI
Mining association rules between sets of items in large databases
TL;DR: An efficient algorithm is presented that generates all significant transactions in a large database of customer transactions that consists of items purchased by a customer in a visit.
Journal ArticleDOI
Privacy-preserving data mining
TL;DR: This work considers the concrete case of building a decision-tree classifier from training data in which the values of individual records have been perturbed and proposes a novel reconstruction procedure to accurately estimate the distribution of original data values.
Journal ArticleDOI
Randomized response: a survey technique for eliminating evasive answer bias.
TL;DR: A survey technique for improving the reliability of responses to sensitive interview questions is described, which permits the respondent to answer "yes" or "no" to a question without the interviewer knowing what information is being conveyed by the respondent.
Journal ArticleDOI
Privacy Preserving Data Mining
TL;DR: This work considers a scenario in which two parties owning confidential databases wish to run a data mining algorithm on the union of their databases, without revealing any unnecessary information, and proposes a protocol that is considerably more efficient than generic solutions and demands both very few rounds of communication and reasonable bandwidth.