Privacy preserving association rule mining with scalar product

One crucial aspect of distributed data mining is privacy preserving. Secure multiparty computation (SMC) is a useful approach to solve privacy preserving in distributed data mining. When data is vertically partitioned, scalar product is a feasible tool to securely discover frequent itemsets of association rule mining. We first show that several of the private scalar product protocols and analysis their insecurity. Then we develop a new and efficient protocol to perform two-party scalar product with an untrusted third party. The method is described in detail in this paper with complete analysis to demonstrate its effectiveness. Our protocol maintains integrity and high security of the data sets of each party while keeping communication and computation cost low.

[1]  Charu C. Aggarwal,et al.  On the design and quantification of privacy preserving data mining algorithms , 2001, PODS.

[2]  Alexandre V. Evfimievski,et al.  Privacy preserving mining of association rules , 2002, Inf. Syst..

[3]  Gu Si-yang,et al.  Privacy preserving association rule mining in vertically partitioned data , 2006 .

[4]  Ramakrishnan Srikant,et al.  Fast algorithms for mining association rules , 1998, VLDB 1998.

[5]  Wenliang Du,et al.  A practical approach to solve Secure Multi-party Computation problems , 2002, NSPW '02.

[6]  Wenliang Du,et al.  Privacy-preserving collaborative filtering using randomized perturbation techniques , 2003, Third IEEE International Conference on Data Mining.

[7]  Donald Beaver,et al.  Commodity-based cryptography (extended abstract) , 1997, STOC '97.

[8]  Chris Clifton,et al.  Tools for privacy preserving distributed data mining , 2002, SKDD.

[9]  Chris Clifton,et al.  Privately Computing a Distributed k-nn Classifier , 2004, PKDD.

[10]  Tomasz Imielinski,et al.  Mining association rules between sets of items in large databases , 1993, SIGMOD Conference.

[11]  Philip K. Chan,et al.  Advances in Distributed and Parallel Knowledge Discovery , 2000 .

[12]  Mikhail J. Atallah,et al.  A secure protocol for computing dot-products in clustered and distributed environments , 2002, Proceedings International Conference on Parallel Processing.

[13]  Yehuda Lindell,et al.  Privacy Preserving Data Mining , 2002, Journal of Cryptology.

[14]  Chris Clifton,et al.  Leveraging the "Multi" in secure multi-party computation , 2003, WPES '03.

[15]  Bart Goethals,et al.  On Private Scalar Product Computation for Privacy-Preserving Data Mining , 2004, ICISC.