Skip to main content

An Effective Distributed Privacy-Preserving Data Mining Algorithm

  • Conference paper
Book cover Intelligent Data Engineering and Automated Learning – IDEAL 2004 (IDEAL 2004)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3177))

Abstract

Data mining is useful means for discovering valuable patterns, associations, trends, and dependencies in data. Data mining is often required to be performed among a group of sites, where the precondition is that no privacy of any site should be leaked out to other sites. In this paper a distributed privacy-preserving data mining algorithm is proposed. The proposed algorithm is characterized with (1) its ability to preserve the privacy without any coordinator site, and specially its ability to resist the collusion; and (2) its lightweight since only the random number is used for preserving the privacy. Performance analysis and experimental results are provided for demonstrating the effectiveness of the proposed algorithm.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Agrawal, R., Srikant, R.: Fast algorithms for mining association rules. In: Proc. the 20th International Conference on Very Large Data Bases, Santiago, Chile, pp. 487–499 (1994)

    Google Scholar 

  2. Cheung, D.W., Han, J., Ng, V.T., Fu, A.W., Fu, Y.: Fast Distributed Algorithm for Mining Association Rules. In: Proc. the 1996 International Conference on Parallel and Distributed Information Systems, Florida, USA, pp. 31–42 (1996)

    Google Scholar 

  3. Kantarcioglu, M., Clifton, C.: Privacy-preserving Distributed Mining of Association Rules on Horizontally Partitioned Data. IEEE Transactions on Knowledge and Data Engineering (to appear)

    Google Scholar 

  4. Goldreich, O.: Secure multi-party computation (September 1998) (working draft). [Online]. Available: http://www.wisdom.weizmann.ac.il/~oded/pp.html

  5. Reiter, M.K., Rubin, A.D.: Crowds: Anonymity for Web Transactions. ACM Transactions on Information System Security 1(1), 66–92

    Google Scholar 

  6. Chaum, D.: Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. Comm. of the ACM 24(2), 84–88

    Google Scholar 

  7. Goldschlag, D., Reed, M., Syverson, P.: Onion Routing for Anonymous and Private Internet Connections. Comm. of the ACM 42(2), 39–41

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Fukasawa, T., Wang, J., Takata, T., Miyazaki, M. (2004). An Effective Distributed Privacy-Preserving Data Mining Algorithm. In: Yang, Z.R., Yin, H., Everson, R.M. (eds) Intelligent Data Engineering and Automated Learning – IDEAL 2004. IDEAL 2004. Lecture Notes in Computer Science, vol 3177. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-28651-6_47

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-28651-6_47

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-22881-3

  • Online ISBN: 978-3-540-28651-6

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics