Browse > Article
http://dx.doi.org/10.13089/JKIISC.2013.23.1.033

Privacy-Preserving k-Bits Inner Product Protocol  

Lee, Sang Hoon (Korea University)
Kim, Kee Sung (Korea University)
Jeong, Ik Rae (Korea University)
Abstract
The research on data mining that can manage a large amount of information efficiently has grown with the drastic increment of information. Privacy-preserving data mining can protect the privacy of data owners. There are several privacy-preserving association rule, clustering and classification protocols. A privacy-preserving association rule protocol is used to find association rules among data, which is often used for marketing. In this paper, we propose a privacy-preserving k-bits inner product protocol based on Shamir's secret sharing.
Keywords
Data Mining; Association Rule; Inner Product; Secret Sharing;
Citations & Related Records
연도 인용수 순위
  • Reference
1 F. Emekci, O. D. Sahin, D. Agrawal and A. El Abbadi, "Privacy preserving decision tree learning over multiple parties," Data and Knowledge Engineering, vol. 63, pp. 348-361, Oct, 2007.   DOI   ScienceOn
2 M. Ester, H.P. Kriegel, J. Sander, and X. Xu, "A density-based algorithm for discovering clusters in large spatial databases with noise," Proc. 2nd Int. Conf. on Knowledge Discovery and Data Mining, Portland, OR, pp.226-231, Aug, 1996.
3 X. Ge, L. Yan, J. Zhu, and W. Shi, "Privacy-preserving distributed association rule mining based on the secret sharing technique," Software Engineering and Data Mining(SEDM), 2010 2nd International Conference, pp. 345-350, Jun, 2010.
4 X. Ge, and J. Zhu, New Fundamental Technologies in Data Mining, InTech, Jun, 2011.
5 B. Gilburd, A. Schuster, and R. Wolff, "k-TTP: A new privacy model for largescale distributed environments," Proceedings of the 10th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 563-568, Aug, 2004.
6 B. Geothals, S. Laur, H. Lipmaa, and T. Mielikäinen, "On private scalar product computation for privacy-preserving data mining," ICISC 2004, LNCS 3506, pp. 104-120, Dec, 2005.
7 J. Han, and M. Kamber, "Data Mining: concepts and techniques," Morgan Kaufmann Publishers, 2001.
8 A. Inan, S. V. Kaya, Y. Saygin, E. Savas, A. A. Hintoglu, and A. Levi, "Privacy preserving clustering on horizontally partitioned data," The Data and Knowledge Engineering (DKE), vol. 63, no. 3, pp. 646-666, Dec, 2007.   DOI   ScienceOn
9 J. Kim, and W. Winkler, "Multiplicative noise for masking continuous data," Technical Report Statistics #2003-01, Statistical Research Division, U.S. Bureau of the Census, Washington D.C, Apr, 2003.
10 X. B. Li, and S. Sarkar, "A tree-based data perturbation approach for privacy-preserving data mining," IEEE Transactions on Knowledge and Data Engineering, vol. 18, no. 9, pp. 1278-1283, Sep, 2006.   DOI   ScienceOn
11 K. Liu, C. Giannella, and H. Kargupta, "An attacker's view of distance preserving maps for privacy-preserving data mining," PKDD, pp. 297-308, Sep, 2006.
12 D. Agrawal, and C.C. Aggarwal, "On the design and quantification of privacy preserving data mining algorithms," The 20th ACM Symposium on Principles of Database Systems,Santa Barbara, CA, pp. 247-255, May, 2001.
13 R. Agrawal, T. Imielinski, A. Swami, "Mining association rules between sets of items in large databases," Proceedings of the ACM SIGMOD Conference on Management of Data, pp. 207-216, May, 1993.
14 R. Agrawal, and R. Srikant, "Privacypreserving data mining," The 19th ACM SIGMOD Conference on Management of Data, pp. 439-450, May, 2000.
15 C. Clifton, M. Kantarcioglu, and J. Vaidya, "Defining privacy for data mining," Proceeding of the National Science Foundation Workshop on Next Generation Data Mining, pp. 126-133, Nov, 2002.
16 W. Du, and Z. Zhan, "Building decision tree classifier on private data," IEEE International Conference on Data Mining Workshop on Privacy, Security, and Data Mining, vol. 14, pp. 1-8, Dec, 2002.
17 D. W. Cheung, J. Han, V. T. Ng, A. W. Fu, and Y. Fu, "A fast distributed algorithm for mining association rules," In Proceedings of the 1996 International Conference on Parallel and Distributed Information Systems, Dec, 1996.
18 E. Dasseni, V. S. Verykios, A. K. Elmagarmid, and E. Bertino, "Hiding association rules by using confidence and support," In Proceedings of the 4th Information Hiding Workshop, pp. 369-383, Apr, 2001.
19 W. Du, and M. Atallah, "Privacy-preserving cooperative statistical analysis," In Proceeding of the 17th Annual Computer Security Applications Conference, pp. 102-110, Dec, 2001.
20 Y. Lindell, and B. Pinkas, "Secure multiparty computation for privacy-preserving data mining," Journal of Privacy and Confidentiality, vol. 1(1), pp. 59-98, Apr, 2009.
21 K. Muralidhar, and R. Sarathy, "Data shuffling a new masking approach for numerical data," Management Science, vol. 52, no. 5, pp. 658-670, May, 2006.   DOI   ScienceOn
22 G. Nayak, and S. Devi, "A survey on privacy preserving data mining: approaches and techniques," International Journal of Engineering Science and Technology (IJEST), vol. 3(3), pp. 2127-2133, Mar, 2011.
23 S. T. M. Oliveira, and O. R. Zaiane, "Privacy preserving frequent itemset mining," In Proceedings of the IEEE ICDM Workshop on Privacy, Security and Data Mining, pp. 43-54, Dec, 2002.
24 M. O. Rabin, "How to exchange secrets by oblivious transfer," Technical Report TR-81, Aiken Computation Laboratory, May, 1981.
25 A. Shamir, "How to share a secret," Communications of the ACM, vol.22(11), pp. 612-613, Nov, 1979.   DOI   ScienceOn
26 L. Sweeney, "k-Anonymity: A model for protecting privacy," International Journal of Uncertainty, Fuzziness and Knowledge-based Systems, vol. 10, no. 5, pp. 557-570, Oct, 2002.   DOI   ScienceOn
27 J. Vaidya, and C. Clifton, "Privacy-preserving k-means clustering over vertically partitioned data," In The 9th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 206-215, Aug, 2003.
28 D. Trinca, and S. Rajasekaran, "Towards a collusion-resistant algebraic multiparty protocol for privacy-preserving association rule mining in vertically partitioned data," Performance, Computing, and Communications Conference, IPCCC 2007, IEEE International, pp. 402-409, Apr, 2007.
29 Pang-Ning Tan, M. Steinbach, and V. Kumar, Introduction to data mining, Pearson, Mar, 2006.
30 J. Vaidya, and C. Clifton, "Privacy preserving association rule mining in vertically partitioned data," In The 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 639-644, Jul, 2002.
31 V. S. Verykios, E. Bertino, I. N. Fovino, L. P. Provenza, Y. Saygin, and Y. Theodoridis, "State-of-the-art in privacy preserving data mining," SIGMOD Record, vol. 33, no. 1, pp. 50-57, Mar, 2004.   DOI   ScienceOn
32 A. C. C. Yao, "How to generate and exchange secrets," Proceedings of the 27th IEEE Symposium on Foundations of Computer Science, pp. 162-167, Oct, 1986.