Privacy-Enhancing Distributed Higher-Order ARM
نویسندگان
چکیده
Traditional association rule mining algorithms assume that data instances are independent and identically distributed (IID) [29]. In statistical relational learning (SRL), however, relationships between instances can be leveraged to improve performance of learning algorithms [2]. Higher-order association rule mining is an example of a SRL approach that does not make the IID assumption, but instead discovers itemsets that cross record boundaries [21]. Empirical analysis shows that higher-order methods perform especially well on small datasets as they are able to capture the variability of the underlying data distribution more readily than traditional methods [11]. In a distributed environment, however the discovery of higher-order itemsets reveals significant information about the nature of disparate data sources [21]. Preserving privacy in a setting in which data instances are treated as nodes in a graph rather than independent entities is an open problem in privacy research that has only recently received attention in the data mining community [24]. In this paper we propose a novel privacy-enhancing distributed higher-order ARM algorithm, PE-DiHO ARM. PE-DiHO ARM discovers itemsets from distributed data with a hybrid (non-horizontal, non-vertical) distribution while significantly limiting the amount of private data that is revealed. To demonstrate the validity of the approach we compare it to a non-privacy enhancing higher-order ARM algorithm [21] in an evaluation framework based on supervised learning [23]. Experimental results confirm that privacy can be significantly enhanced during the computation of higherorder itemsets in a distributed environment without significantly impacting performance. In future work we plan to apply these techniques to data provided by our law enforcement partners.
منابع مشابه
Enhancing privacy of recent authentication schemes for low-cost RFID systems
Nowadays Radio Frequency Identification (RFID) systems have appeared in lots of identification and authentication applications. In some sensitive applications, providing secure and confidential communication is very important for end-users. To this aim, different RFID authentication protocols have been proposed, which have tried to provide security and privacy of RFID users. In this paper, we a...
متن کاملDesign of the OpenPrivacy Distributed Reputation System
We describe the design of a reputation system which can incorporate a trust network of users (identities) in order to measure the quality of any arbitrary resource (including any other user or object). This system has the characteristics of being able to calculate reputations in a distributed peer-to-peer network and is attack-repellent to all but the most powerful adversaries. Reputes are used...
متن کاملPrivacy Enhanced Technologies: Methods - Markets - Misuse
Research in Privacy Enhancing Technologies has a tradition of about 25 years. The basic technologies and ideas were found until 1995 while the last decade was dominated by the utilisation of such technologies. The question arises if there is a market for Privacy Enhanced Technology. The answer is yes, however Privacy Enhancing Technology may not have been broadly known yet in order to make it p...
متن کاملNetwork of Bandits
In order to distribute the best arm identification task as close as possible to the user’s devices, on the edge of the Radio Access Network, we propose a new problem setting, where distributed players collaborate to find the best arm. This architecture guarantees privacy to end-users since no events are stored. The only thing that can be observed by an adversary through the core network is aggr...
متن کاملPrivacy Enhancing Technologies, 9th International Symposium, PETS 2009, Seattle, WA, USA, August 5-7, 2009. Proceedings
Why should wait for some days to get or receive the privacy enhancing technologies 9th international symposium pets 2009 seattle wa usa august 5 7 book that you order? Why should you take it if you can get the faster one? You can find the same book that you order right here. This is it the book that you can receive directly after purchasing. This privacy enhancing technologies 9th international...
متن کامل