skip to main content
10.1145/2663715.2669611acmconferencesArticle/Chapter ViewAbstractPublication PagescikmConference Proceedingsconference-collections
research-article

Hiding a Needle in a Haystack: Privacy Preserving Apriori algorithm inMapReduce Framework

Published:07 November 2014Publication History

ABSTRACT

In the last few years, Hadoop become a "de facto" standard to process large scale data as an open source distributed system. With combination of data mining techniques, Hadoop improve data analysis utility. That is why, there are amount of research is studied to apply data mining technique to mapreduce framework in Hadoop. However, data mining have a possibility to cause a privacy violation and this threat is a huge obstacle for data mining using Hadoop. To solve this problem, numerous studies have been conducted. However, existing studies were insufficient and had several drawbacks. In this paper, we propose the privacy preserving data mining technique in Hadoop that is solve privacy violation without utility degradation. We focus on association rule mining algorithm that is representative data mining algorithm. We validate the proposed technique to satisfy performance and preserve data privacy through the experimental results.

References

  1. R. Agrawal and R. Srikant, "Privacy-Preserving Data Mining," In Proc. of Conf. on Management of Data, ACM SIGMOD, Dallas, TX, pp.439--450, 2000 Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. C. C. Aggarwal and P. S. Yu, "Privacy-Preserving Data Mining: A Survey," Handbook of Database Security : Application and Trends, Gertz, M. and Jajodia, S. (Eds.), pp.431--460, Springer, 2008.Google ScholarGoogle Scholar
  3. K. Chen and L. Liu, "Privacy Preserving Data Classification with Rotation Perturbation," In Proc. of the 5th IEEE Int'l Conf. on Data Minig, Atlanta GA, pp.589--592,. 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. B. C. M. Fung, K. Wang, R. Chen, and P. S. Yu,"Privacy-Preserving Data Publishing: A Survey of Recent Developments,"ACM Computing Surveys, vol.42, no.4, pp.14--53,. 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Paranthaman, J., and T. Aruldoss Albert Victoire. "Hybrid techniques for Privacy preserv-ing in Data Mining." Life Science Journal 10.7s, 2013.Google ScholarGoogle Scholar
  6. A. Friedman and A. Schuster, "Data Mining with Differential Privacy," In Proc. of the 16th ACM Int'l Conf. on Knowledge Discovery and Data Mining, Washington, DC, pp.493--502, Jul. 2010 Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. 9. Gurusamy, Kirubhakar, and Venkatesh Chakrapani. "An assessment of Identity Security in Data Mining." International Journa of Science and Modern Engineering (IJISME) 1.7, 29--31, 2013.Google ScholarGoogle Scholar
  8. Dwork, Cynthia. "Differential privacy", In: Automata, languages and programming. Springer Berlin Heidelberg, pp. 1--12, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Li, Haoran, et al. "Privacy Preserving RBF Kernel Support Vector Machine." BioMed re-search international, 2014.Google ScholarGoogle Scholar
  10. Wong KokSeng, KIM MyungHo. "Preserving Differential Privacy for Similarity Meas-urement in Smart Environments", The Scientific World Journal, 2014.Google ScholarGoogle Scholar
  11. A. C. Yao, "Protocols for Secure Computations,"In Proc. of the 23th IEEE Symp. on Foundations of Computer Science, Chicago, Illinois, pp.160--164, Nov. 1982. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. J. Vaidya and C. Clifton, "Privacy Preserving Association Rule Mining in Vertically Partitioned Data," In Proc. of the 8th ACM Int'l Conf. on Knowledge Discovery and Data Min-ing, Alberta, Canada, pp.639--644, Jul. 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. W. Du and M. J. Atallah, "Privacy-Preserving Cooperative Statistical Analysis," In Proc. of the 17th Conf. on Annual Computer Security Applications, New Orleans, Louisiana, pp.102--110, Dec. 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. A.Evfimievski, R. Srikant, R. Agrawal, J.Gehrke, "Privacy Preserving Mining of Association Rules", Information Systems, VOl. 29, pp.343--364. 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. ApacheMahout machine learning library. http://mahout.apache.org/. Accessed on 10 Mar 2013.Google ScholarGoogle Scholar
  16. Ko SY, Jeon K, Morales R, "The hybrex model for confidentiality and privacy in cloud computing", In Proceedings of the 3rd USENIX conference on hot topics in cloud compu-ting (HotCloud'11), pp.1--5, 2011 Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. X Zhang, C Liu, S Nepal, C Yang, J Chen, "Privacy Preservation over Big Data in Cloud Systems", Security, Privacy and Trust in Cloud Systems, pp.239--257, 2014.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Hiding a Needle in a Haystack: Privacy Preserving Apriori algorithm inMapReduce Framework

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      PSBD '14: Proceedings of the First International Workshop on Privacy and Secuirty of Big Data
      November 2014
      54 pages
      ISBN:9781450315838
      DOI:10.1145/2663715

      Copyright © 2014 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 7 November 2014

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      PSBD '14 Paper Acceptance Rate5of12submissions,42%Overall Acceptance Rate5of12submissions,42%

      Upcoming Conference

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader