Privacy preserving association rules mining on distributed homogenous databases

Privacy is one of the most important properties that an information system must satisfy. In these systems, there is a need to share information among different, not trusted entities, and the protection of sensible information has a relevant role. A relatively new trend shows that classical access control techniques are not sufficient to guarantee privacy preserving when data mining techniques are used in a malicious way. Privacy preserving data mining algorithms have been recently introduced with the aim of preventing the discovery of sensible information. In this paper, we propose a modification to privacy preserving association rule mining algorithm on distributed homogenous database. Our algorithm is faster, privacy preserving and provides accurate results. The flexibility for extension to any number of sites can be achieved without any change in the implementation. Also any increase in number of these sites does not add more time overhead, because all client sites perform the mining process in the same time so the overhead is in communication time only. Finally, the total bit-communication cost for our algorithm is function in (N) sites.

[1]  Vladimir Estivill-Castro,et al.  Fast Private Association Rule Mining by A Protocol for Securely Sharing Distributed Data , 2007, 2007 IEEE Intelligence and Security Informatics.

[2]  Jiawei Han,et al.  A fast distributed algorithm for mining association rules , 1996, Fourth International Conference on Parallel and Distributed Information Systems.

[3]  David Wai-Lok Cheung,et al.  Efficient Mining of Association Rules in Distributed Databases , 1996, IEEE Trans. Knowl. Data Eng..

[4]  Gregory J. Walters Human Rights in an Information Age: A Philosophical Analysis , 2001 .

[5]  Stanley R. M. Oliveira,et al.  Toward Standardization in Privacy-Preserving Data Mining , 2004 .

[6]  Yehuda Lindell,et al.  Privacy Preserving Data Mining , 2002, Journal of Cryptology.

[7]  Michael A. Menlowe,et al.  Philosophical Dimensions of Privacy: An Anthology , 2009 .

[8]  R. Morris,et al.  A Trusted Third-Party Computation Service , 2001 .

[9]  Ananth Grama,et al.  An efficient protocol for Yao's millionaires' problem , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.

[10]  Rakesh Agarwal,et al.  Fast Algorithms for Mining Association Rules , 1994, VLDB 1994.

[11]  Elisa Bertino,et al.  A Framework for Evaluating Privacy Preserving Data Mining Algorithms* , 2005, Data Mining and Knowledge Discovery.

[12]  Chris Clifton,et al.  Privacy-preserving distributed mining of association rules on horizontally partitioned data , 2004, IEEE Transactions on Knowledge and Data Engineering.

[13]  Charu C. Aggarwal,et al.  On the design and quantification of privacy preserving data mining algorithms , 2001, PODS.

[14]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.