Skip to main content

Privacy Preserving Mining of Distributed Data Using Steganography

  • Conference paper
Recent Trends in Network Security and Applications (CNSA 2010)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 89))

Included in the following conference series:

  • 3503 Accesses

Abstract

Privacy preserving mining of distributed data has numerous applications. Several constraints can imposed by the applications, it includes how the data is distributed; when the data is distributed privacy should be preserved...etc. Data mining has operated on a data warehousing model of gathering all data into a central site, then running an algorithm against that data. Privacy considerations may prevent this approach. This paper presents steganography techniques and shows how they can be used to solve several privacy-preserving data mining problems. Steganography is a technique to hide secret information in some other data (we call it a vessel) without leaving any apparent evidence of data alteration.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Agrawal, R., Srikant, R.: Fast algorithms for mining association rules. In: Proceedings of the 20th International Conference on Very Large Data Bases, Santiago, Chile, VLDB, September 12-15 (1994)

    Google Scholar 

  2. Agrawal, R., Srikant, R.: Privacy-preserving data mining. In: Proceedings of the 1997 ACM SIGMOD Conference on Management of Data, Dallas, TX, May 14-19. ACM, New York (2000)

    Google Scholar 

  3. Chan, P.: An Extensible Meta-Learning Approach for Scalable and Accurate Inductive Learning. PhD thesis, Department of Computer Science, Columbia University, New York, NY (1996) (Technical Report CUCS-044-96)

    Google Scholar 

  4. Chan, P.: On the accuracy of meta-learning for scalable data mining. Journal of Intelligent Information Systems 8, 5–28 (1997)

    Article  Google Scholar 

  5. Cheung, D.W.-L., Ng, V., Fu, A.W.-C., Fu, Y.: Efficient mining of association rules in distributed databases. Transactions on Knowledge and Data Engineering 8(6), 911–922 (1996)

    Article  Google Scholar 

  6. Chen, R., Sivakumar, K., Kargupta, H.: Distributed web mining using bayesian networks from multiple data streams. In: The 2001 IEEE International Conference on Data Mining, November 29-December 2. IEEE, Los Alamitos (2001)

    Google Scholar 

  7. Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game - a completeness theorem for protocols with honest majority. In: 19th ACM Symposium on the Theory of Computing, pp. 218–229 (1987)

    Google Scholar 

  8. Kargupta, H., Chan, P. (eds.): Advances in Distributed and Parallel Knowledge Discovery. AAAI/MIT Press (2000)

    Google Scholar 

  9. Lindell, Y., Pinkas, B.: Privacy preserving data mining. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 36–54. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  10. Prodromidis, A., Chan, P., Stolfo, S.: Meta-learning in distributed data mining systems: Issues and approaches, ch. 3. AAAI/MIT Press (2000)

    Google Scholar 

  11. Savasere, A., Omiecinski, E., Navathe, S.B.: An e±cient algorithm for mining association rules in large databases. In: Proceedings of 21th International Conference on Very Large Data Bases, VLDB, September 11-15, pp. 432–444 (1995)

    Google Scholar 

  12. Wirth, R., Borth, M., Hipp, J.: When distribution is part of the semantics: A new problem class for distributed knowledge discovery. In: Ubiquitous Data Mining for Mobile and Distributed Environments workshop associated with the Joint 12th European Conference on Machine Learning (ECML 2001) and 5th European Conference on Principles and Practice of Knowledge Discovery in Databases (PKDD 2001), Freiburg, Germany, September 3-7 (2001)

    Google Scholar 

  13. Yao, A.C.: How to generate and exchange secrets. In: Proceedings of the 27th IEEE Symposium on Foundations of Computer Science, pp. 162–167. IEEE, Los Alamitos (1986)

    Google Scholar 

  14. Zaki, M.J.: Parallel and distributed association mining: A survey. IEEE Concurrency, special issue on Parallel Mechanisms for Data Mining 7(4), 14–25 (1999)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Aruna Kumari, D., Raja Sekhar Rao, K., Suman, M. (2010). Privacy Preserving Mining of Distributed Data Using Steganography. In: Meghanathan, N., Boumerdassi, S., Chaki, N., Nagamalai, D. (eds) Recent Trends in Network Security and Applications. CNSA 2010. Communications in Computer and Information Science, vol 89. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14478-3_27

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-14478-3_27

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-14477-6

  • Online ISBN: 978-3-642-14478-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics