skip to main content
10.1145/1140402.1140404acmconferencesArticle/Chapter ViewAbstractPublication PagesmodConference Proceedingsconference-collections
Article

Using secure coprocessors for privacy preserving collaborative data mining and analysis

Published: 25 June 2006 Publication History

Abstract

Secure coprocessors have traditionally been used as a keystone of a security subsystem, eliminating the need to protect the rest of the subsystem with physical security measures. With technological advances and hardware miniaturization they have become increasingly powerful. This opens up the possibility of using them for non traditional use. This paper describes a solution for privacy preserving data sharing and mining using cryptographically secure but resource limited coprocessors. It uses memory light data mining methodologies along with a light weight database engine with federation capability, running on a coprocessor. The data to be shared resides with the enterprises that want to collaborate. This system will allow multiple enterprises, which are generally not allowed to share data, to do so solely for the purpose of detecting particular types of anomalies and for generating alerts. We also present results from experiments which demonstrate the value of such collaborations.

References

[1]
Patriot Act, http://thomas.loc.gov/cgi-bin/bdquery/z?d107:h.r.03162.]]
[2]
Graham-Leach-Bailey Act, http://www.ftc.gov/privacy/glbact.]]
[3]
T. W. Arnold, L. P. Van Doorn, "The IBM PCIXCC: A new cryptographic coprocessor for the IBM eServer", IBM Journal of Research and Development, Vol 48, May 2004]]
[4]
Cloudscape, http://www306.ibm.com/software/data/cloudscape.]]
[5]
D. P. Hansen, C. Daly, K. Harrap, J. Jacquet, M. O'Dwyer, C. Pang, J. Ryan-Brown, "Health Data Integration (HDI): Research Software to Commercial Product", Australian Software Engineering Conference, 2005]]
[6]
Entity Analytics Solutions, http://www.ibm.com/software/data/db2/eas]]
[7]
R. Agrawal, D. Asonov, R. Srikant, "Enabling Sovereign Information Sharing Using Web Services", Proceedings of the SIGMOD 2004]]
[8]
M. Kantarcioglu, C. Clifton, "Security issues in querying encrypted data", Technical Report TR-04-013, Purdue University, 2004]]
[9]
Privacy Preserving Analytics, CSIRO Annual Report 2004-5 and CSIRO "PPA for Health Data" brochure]]
[10]
C. Clifton, W. Du, M. Atallah, "ITR: Distributed Data Mining to Protect Information Privacy", Purdue University]]
[11]
K. Goldman, E. Valdez: "Matchbox: Secure Data Sharing", IEEE Internet Computing, 8(6) 2004, pp 18--24.]]
[12]
FIPS Standards, http://csrc.nist.gov/cryptval/140-2.htm]]
[13]
IBM 4758, http://www-.ibm.com/security/cryptocards/pcicc/overview.shtml]]
[14]
T. Agarwala, J. L. Martin, J. H. Mirza, D. C. Sadler, D. M. Dias, M. Snir," SP2 system architecture", IBM System Journal, Volume 34, No. 2, 1995]]
[15]
C. K. Baru, G. Fecteau, A. Goyal, H. Hsiao, A. Jhingran, S. Padmanabhan, G. P. Copeland, W. G. Wilson, "DB2 Parallel Edition", IBM Systems Journal, Vol. 34, No. 2, 1995]]
[16]
N. Abe, C. Apte, B. Bhattacharjee, K. Goldman, J. Langford, B. Zadrozny, "Sampling Approach to Resource Light Data Mining", SIAM Workshop on Data Mining in Resource Constrained Environments 2004]]
[17]
B. Zadrozny and C. Elkan, "Learning and making decisions when costs and probabilities are both unknown", Proceedings of the Seventh International Conference on Knowledge Discovery and Data Mining, pp 204--213, 2001.]]
[18]
B. Zadrozny, J. Langford and N. Abe, "Cost-sensitive learning by cost-proportionate example weighting", Proceedings of the Third IEEE International Conference on Data Mining, pp 435--442, 2003]]
[19]
J. von Neumann, "Various techniques used in connection with random digits", Applied Mathematics Series, 12, pp 36--38, National Bureau of Standards, 1951.]]
[20]
S. S. Bay, "UCI KDD Archive", Department of Information and Computer Sciences, University of California, Irvine, http://kdd.ics.uci.edu/, 2000.]]
[21]
J. Quinlan, "C4.5: Programs for Machine Learning", Morgan Kaufmann, San Mateo, CA, 1993]]
[22]
KDD-cup-98 Results, http://www.kdnuggets.com/meetings/kdd98/kdd-cup-98-results.html.]]
[23]
PKDD'99 Discovery Challenge: A collaborative effort in knowledge discovery from databases, http://lisp.vse.cz/pkdd99/chall.htm.]]
[24]
L. Breiman, Bagging Predictors, Machine Learning, 24, pp 123--140, 1996]]
[25]
PPC 405GPr Embedded Processor Data Sheet, AMCC, 2005]]
[26]
A. Freier, P. Karlton, P. Kocher, "The SSL Protocol, Version 3.0", Transport layer Security Working Group, 1996, http://wp.netscape.com/eng/ssl3]]
[27]
ANSI X3.106, "American National Standard for Information Systems-Data Link Encryption", American National Standards Institute, 1983]]
[28]
R. Rivest, "The MD5 Message Digest Algorithm", April 1992]]
[29]
FIPS Standards, http://www.itl.nist.gov/fipspubs/fip1801.htm]]

Cited By

View all
  • (2018)Efficient paillier cryptoprocessor for privacy-preserving data miningSecurity and Communication Networks10.1002/sec.14429:11(1535-1546)Online publication date: 20-Dec-2018
  • (2014)TrustedDBIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2013.3826:3(752-765)Online publication date: 1-Mar-2014
  • (2014)Encrypted Scalar Product Protocol for Outsourced Data MiningProceedings of the 2014 IEEE International Conference on Cloud Computing10.1109/CLOUD.2014.53(336-343)Online publication date: 27-Jun-2014
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
DaMoN '06: Proceedings of the 2nd international workshop on Data management on new hardware
June 2006
49 pages
ISBN:1595934669
DOI:10.1145/1140402
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 25 June 2006

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. collaboration
  2. data mining
  3. federation
  4. privacy

Qualifiers

  • Article

Acceptance Rates

DaMoN '06 Paper Acceptance Rate 6 of 6 submissions, 100%;
Overall Acceptance Rate 94 of 127 submissions, 74%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)4
  • Downloads (Last 6 weeks)0
Reflects downloads up to 03 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2018)Efficient paillier cryptoprocessor for privacy-preserving data miningSecurity and Communication Networks10.1002/sec.14429:11(1535-1546)Online publication date: 20-Dec-2018
  • (2014)TrustedDBIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2013.3826:3(752-765)Online publication date: 1-Mar-2014
  • (2014)Encrypted Scalar Product Protocol for Outsourced Data MiningProceedings of the 2014 IEEE International Conference on Cloud Computing10.1109/CLOUD.2014.53(336-343)Online publication date: 27-Jun-2014
  • (2013)Hardware-Based Security for Ensuring Data Privacy in the CloudSecurity Engineering for Cloud Computing10.4018/978-1-4666-2125-1.ch008(147-170)Online publication date: 2013
  • (2013)Empowering privacy based multi-level trust using random perturbation techniques2013 International Conference on Information Communication and Embedded Systems (ICICES)10.1109/ICICES.2013.6508258(551-554)Online publication date: Feb-2013
  • (2012)Enabling Multilevel Trust in Privacy Preserving Data MiningIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2011.12424:9(1598-1612)Online publication date: 1-Sep-2012
  • (2011)TrustedDBProceedings of the 2011 ACM SIGMOD International Conference on Management of data10.1145/1989323.1989346(205-216)Online publication date: 12-Jun-2011
  • (2010)Location privacy: going beyond K-anonymity, cloaking and anonymizersKnowledge and Information Systems10.1007/s10115-010-0286-z26:3(435-465)Online publication date: 3-Mar-2010
  • (2009)Privacy as a ServiceProceedings of the 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing10.1109/DASC.2009.139(711-716)Online publication date: 12-Dec-2009
  • (2009)Private Information Retrieval Techniques for Enabling Location Privacy in Location-Based ServicesPrivacy in Location-Based Applications10.1007/978-3-642-03511-1_3(59-83)Online publication date: 30-Jul-2009
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media