Secure Two-Party Association Rule Mining

نویسندگان

  • Md. Golam Kaosar
  • Russell Paulet
  • Xun Yi
چکیده

Association rule mining algorithm provides a means for determining rules and patterns from a large collection of data. However, when two sites want to engage in an association rule mining, data privacy concerns are raised. These concerns include loosing a competitive edge in the market place and breaching privacy laws. Techniques that have addressed this problem are data perturbation and homomorphic encryption. Homomorphic encryption based solutions produce more accurate results than data perturbation. Most previous solutions for privacy preserving association rule mining require the disclosure of intermediate mining results such as support counts and database size to determine frequent itemset. To overcome this weakness we propose a secure comparison technique based on state-of-the-art fully homomorphic encryption scheme, by which we build secure two-party association rule mining protocol. Our solution preserves complete privacy of both parties and it is more efficient than other solutions because there is no need for exponentiation of numbers.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Optimized Two Party Privacy Preserving Association Rule Mining Using Fully Homomorphic Encryption

In two party privacy preserving association rule mining, the issue to securely compare two integers is considered as the bottle neck to achieve maximum privacy. Recently proposed fully homomorphic encryption (FHE) scheme by Dijk et.al. can be applied in secure computation. Kaosar, Paulet and Yi have applied it in preserving privacy in two-party association rule mining, but its performance is no...

متن کامل

Privacy-Preserving Collaborative Association Rule Mining

In recent times, the development of privacy technologies has promoted the speed of research on privacy-preserving collaborative data mining. People borrowed the ideas of secure multi-party computation and developed secure multi-party protocols to deal with privacy-preserving collaborative data mining problems. Random perturbation was also identified to be an efficient estimation technique to so...

متن کامل

Secure Two-Party Association Rule Mining Based on One-Pass FP-Tree

Frequent Path tree (FP-tree) is a popular method to compute association rules and is faster than Aprioribased solutions in some cases. Association rule mining using FP-tree method cannot ensure entire privacy since frequency of the itemsets are required to share among participants at the first stage. Moreover, FP-tree method requires two scans of database transactions which may not be the best ...

متن کامل

Statement of Research — Alexandre Evfimievski

My prior research has been mainly in the area of privacy preserving data mining. It included such topics as: using randomization for preserving privacy of individual transactions in association rule mining; secure two-party computation of joins between two relational tables, set intersections, join sizes, and supports of vertically partitioned itemsets; improving space and time efficiency in pr...

متن کامل

Privacy Preserving and Secure Mining of Association Rules in Distributed Data Base

Association rule mining is an active data mining research area and most ARM algorithms cater to a centralized environment. Centralized data mining to discover useful patterns in distributed databases isn't always feasible because merging data sets from different sites incurs huge network communication costs. In this paper, an improved algorithm based on good performance level for data mining is...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011