Abstract
Privacy preserving mining of distributed data has numerous applications. Several constraints can imposed by the applications, it includes how the data is distributed; when the data is distributed privacy should be preserved...etc. Data mining has operated on a data warehousing model of gathering all data into a central site, then running an algorithm against that data. Privacy considerations may prevent this approach. This paper presents steganography techniques and shows how they can be used to solve several privacy-preserving data mining problems. Steganography is a technique to hide secret information in some other data (we call it a vessel) without leaving any apparent evidence of data alteration.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Agrawal, R., Srikant, R.: Fast algorithms for mining association rules. In: Proceedings of the 20th International Conference on Very Large Data Bases, Santiago, Chile, VLDB, September 12-15 (1994)
Agrawal, R., Srikant, R.: Privacy-preserving data mining. In: Proceedings of the 1997 ACM SIGMOD Conference on Management of Data, Dallas, TX, May 14-19. ACM, New York (2000)
Chan, P.: An Extensible Meta-Learning Approach for Scalable and Accurate Inductive Learning. PhD thesis, Department of Computer Science, Columbia University, New York, NY (1996) (Technical Report CUCS-044-96)
Chan, P.: On the accuracy of meta-learning for scalable data mining. Journal of Intelligent Information Systems 8, 5–28 (1997)
Cheung, D.W.-L., Ng, V., Fu, A.W.-C., Fu, Y.: Efficient mining of association rules in distributed databases. Transactions on Knowledge and Data Engineering 8(6), 911–922 (1996)
Chen, R., Sivakumar, K., Kargupta, H.: Distributed web mining using bayesian networks from multiple data streams. In: The 2001 IEEE International Conference on Data Mining, November 29-December 2. IEEE, Los Alamitos (2001)
Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game - a completeness theorem for protocols with honest majority. In: 19th ACM Symposium on the Theory of Computing, pp. 218–229 (1987)
Kargupta, H., Chan, P. (eds.): Advances in Distributed and Parallel Knowledge Discovery. AAAI/MIT Press (2000)
Lindell, Y., Pinkas, B.: Privacy preserving data mining. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 36–54. Springer, Heidelberg (2000)
Prodromidis, A., Chan, P., Stolfo, S.: Meta-learning in distributed data mining systems: Issues and approaches, ch. 3. AAAI/MIT Press (2000)
Savasere, A., Omiecinski, E., Navathe, S.B.: An e±cient algorithm for mining association rules in large databases. In: Proceedings of 21th International Conference on Very Large Data Bases, VLDB, September 11-15, pp. 432–444 (1995)
Wirth, R., Borth, M., Hipp, J.: When distribution is part of the semantics: A new problem class for distributed knowledge discovery. In: Ubiquitous Data Mining for Mobile and Distributed Environments workshop associated with the Joint 12th European Conference on Machine Learning (ECML 2001) and 5th European Conference on Principles and Practice of Knowledge Discovery in Databases (PKDD 2001), Freiburg, Germany, September 3-7 (2001)
Yao, A.C.: How to generate and exchange secrets. In: Proceedings of the 27th IEEE Symposium on Foundations of Computer Science, pp. 162–167. IEEE, Los Alamitos (1986)
Zaki, M.J.: Parallel and distributed association mining: A survey. IEEE Concurrency, special issue on Parallel Mechanisms for Data Mining 7(4), 14–25 (1999)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Aruna Kumari, D., Raja Sekhar Rao, K., Suman, M. (2010). Privacy Preserving Mining of Distributed Data Using Steganography. In: Meghanathan, N., Boumerdassi, S., Chaki, N., Nagamalai, D. (eds) Recent Trends in Network Security and Applications. CNSA 2010. Communications in Computer and Information Science, vol 89. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14478-3_27
Download citation
DOI: https://doi.org/10.1007/978-3-642-14478-3_27
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-14477-6
Online ISBN: 978-3-642-14478-3
eBook Packages: Computer ScienceComputer Science (R0)