Secure Multiparty Computation for Privacy Preserving Data Mining
نویسندگان
چکیده
Acknowledgments This thesis is the result of my internship at Erasmus University Rotterdam, as part of the the EU-FP7 project CASSANDRA. I would like to thank professor Hennie Daniels for giving such an opportunity to perform an interesting and challenging master's thesis project. I am very grateful to my supervisor Berry Schoenmakers at Eindhoven University of Technology , for the guidance, questions and answers, and his humor. Special thanks go to Berry Schoenmakers and Sebastiaan de Hoogh, for their profound knowledge in cryptography and providing guidance and support to my work. And with gratitude to Hennie Daniels and Lingzhe Liu, for managing my internship, and inspiring me some ideas in data mining. I enjoyed my study and life in the Netherlands, thanks to Eindhoven University of Technology and the Kerckhoffs Institute, for providing the 2-year master program in Information Security. And with special thanks to het Koninklijk Concertgebouworkest, for their fantastic and wonderful performances which give me serenity, comfort and enjoyment. Writing thesis is not easy for me, I am thankful to Sebastiaan de Hoogh and Boriš Skori´c, for their helpful comments to my thesis. And I would like to thank my friend Tingting Cao, for always encouraging me during the project. Finally and most importantly, I want to thank my parents for all their love and support over the years.
منابع مشابه
A Method for Privacy Preserving Data Mining in Secure Multiparty Computation using Hadamard Matrix
Secure multiparty computation allows multiple parties to participate in a computation. SMC (secure multiparty computation) assumes n parties where n>1. All the parties jointly compute a function. Privacy preserving data mining has become an emerging field in the secure multiparty computation. Privacy preserving data mining preserves the privacy of individual's data. Privacy preserving data mini...
متن کاملSecure Multiparty Computation for Privacy-Preserving Data Mining
In this paper, we survey the basic paradigms and notions of secure multiparty computation and discuss their relevance to the field of privacy-preserving data mining. In addition to reviewing definitions and constructions for secure multiparty computation, we discuss the issue of efficiency and demonstrate the difficulties involved in constructing highly efficient protocols. We also present comm...
متن کاملDistributed Privacy Preserving Clustering via Homomorphic Secret Sharing and Its Application to (Vertically) Partitioned Spatio-Temporal Data
Recent concerns about privacy issues have motivated data mining researchers to develop methods for performing data mining while preserving the privacy of individuals. One approach to develop privacy preserving data mining algorithms is secure multiparty computation, which allows for privacy preserving data mining algorithms that do not trade accuracy for privacy. However, earlier methods suffer...
متن کاملNew privacy preserving clustering methods for secure multiparty computation
Many researches on privacy preserving data mining have been done. Privacy preserving data mining can be achieved in various ways by use of randomization techniques, cryptographic algorithms, anonymization methods, etc. Further, in order to increase the security of data mining, secure multiparty computation (SMC) has been introduced. Most of works in SMC are developed on applying the model of SM...
متن کاملPrivacy Preserving Data Mining over Vertically Partitioned Data
Vaidya, Jaideep Shrikant. Ph.D., Purdue University, August, 2004. Privacy Preserving Data Mining over Vertically Partitioned Data. Major Professor: Chris Clifton. The goal of data mining is to extract or “mine” knowledge from large amounts of data. However, data is often collected by several different sites. Privacy, legal and commercial concerns restrict centralized access to this data. Theore...
متن کاملData Preserving By Anonymization Techniques for Collaborative Data Publishing
This paper mainly deals with the issue of privacy preserving in data mining while collaborating n number of parties and trying to maintain confidentiality of all data providers details while collaborating their database. Here two type of attacks are addressed “insider attack” and “outsider attack”. In insider attack, the data providers use their own records and try to retrieve other data provid...
متن کامل