Secure Mining of Association Rules in Distributed Datasets

The arrival of Information Age, with its rapid development of information technology, has provided a wide space for Data Analysis and Mining. Yet growth in this market could be held back by privacy concerns. This paper addresses the problem of secure association rule mining where transactions are distributed across sources. The existing solutions for distributed data(vertical partition and horizontal partition) have high complexity of encryption and incomplete definition of attributes of multiple parties. In this paper, we study how to maintain differential privacy in distributed databases for mining of association rules without revealing each party’s raw transactions despite how strong background knowledge the attackers have. We use a intermediate server for data consolidation without assuming it is safe. Our methods offer enhanced privacy against various attacks model. In addition, it is simpler and is significantly more efficient in terms of communication rounds and computation overhead.

[1]  Kejia Zhang,et al.  A Novel Method for Location Privacy Protection in LBS Applications , 2019, Secur. Commun. Networks.

[2]  Jiguo Yu,et al.  A Differential-Private Framework for Urban Traffic Flows Estimation via Taxi Companies , 2019, IEEE Transactions on Industrial Informatics.

[3]  Cynthia Dwork,et al.  Differential Privacy , 2006, ICALP.

[4]  Cynthia Dwork,et al.  Calibrating Noise to Sensitivity in Private Data Analysis , 2006, TCC.

[5]  Zhipeng Cai,et al.  A Private and Efficient Mechanism for Data Uploading in Smart Cyber-Physical Systems , 2020, IEEE Transactions on Network Science and Engineering.

[6]  Chris Clifton,et al.  Privacy-preserving distributed mining of association rules on horizontally partitioned data , 2004, IEEE Transactions on Knowledge and Data Engineering.

[7]  Xiang Cheng,et al.  DP-Apriori: A differentially private frequent itemset mining algorithm based on transaction splitting , 2015, Comput. Secur..

[8]  Gu Si-yang,et al.  Privacy preserving association rule mining in vertically partitioned data , 2006 .

[9]  Vassilios S. Verykios,et al.  Disclosure limitation of sensitive rules , 1999, Proceedings 1999 Workshop on Knowledge and Data Engineering Exchange (KDEX'99) (Cat. No.PR00453).

[10]  Guisheng Yin,et al.  RiPPAS: A Ring-Based Privacy-Preserving Aggregation Scheme in Wireless Sensor Networks , 2017, Sensors.

[11]  Mohsen Guizani,et al.  Lclean: A Plausible Approach to Individual Trajectory Data Sanitization , 2018, IEEE Access.

[12]  Yingshu Li,et al.  Data Linkage in Smart Internet of Things Systems: A Consideration from a Privacy Perspective , 2018, IEEE Communications Magazine.

[13]  Gan Wen-yon Frequent Pattern Mining with Differential Privacy Based on Transaction Truncation , 2015 .

[14]  Kejia Zhang,et al.  Research on Trajectory Data Releasing Method via Differential Privacy Based on Spatial Partition , 2018, Secur. Commun. Networks.

[15]  Yingshu Li,et al.  Collective Data-Sanitization for Preventing Sensitive Information Inference Attacks in Social Networks , 2018, IEEE Transactions on Dependable and Secure Computing.

[16]  Zhipeng Cai,et al.  Trading Private Range Counting over Big IoT Data , 2019, 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS).

[17]  Marina Blanton,et al.  Secure Multiparty Computation , 2011, Encyclopedia of Cryptography and Security.

[18]  Jianzhong Li,et al.  Location-privacy-aware review publication mechanism for local business service systems , 2017, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.

[19]  Sheng Zhong,et al.  Privacy-preserving algorithms for distributed mining of frequent itemsets , 2007, Inf. Sci..

[20]  Yehuda Lindell,et al.  Privacy Preserving Data Mining , 2000, Journal of Cryptology.

[21]  Kejia Zhang,et al.  HRR: a data cleaning approach preserving local differential privacy , 2018, Int. J. Distributed Sens. Networks.

[22]  Ninghui Li,et al.  PrivBasis: Frequent Itemset Mining with Differential Privacy , 2012, Proc. VLDB Endow..

[23]  Shipra Agrawal,et al.  FRAPP: a framework for high-accuracy privacy-preserving mining , 2004, 21st International Conference on Data Engineering (ICDE'05).

[24]  Kun Liu,et al.  Random projection-based multiplicative data perturbation for privacy preserving distributed data mining , 2006, IEEE Transactions on Knowledge and Data Engineering.

[25]  Yang Tang,et al.  A Privacy Preserving Algorithm for Mining Distributed Association Rules , 2011, 2011 International Conference on Computer and Management (CAMAN).

[26]  Hongli Zhang,et al.  Mobile cloud sensing, big data, and 5G networks make an intelligent and smart world , 2015, IEEE Network.

[27]  Yi Liang,et al.  Deep Learning Based Inference of Private Information Using Embedded Sensors in Smart Devices , 2018, IEEE Network.

[28]  Xiaojiang Du,et al.  Publishing histograms with outliers under data differential privacy , 2016, Secur. Commun. Networks.