An Improved EMHS Algorithm for Privacy Preserving in Association Rule Mining on Horizontally Partitioned Database

The advances of data mining techniques played an important role in many areas for various applications. In context of privacy and security issues, the problems caused by association rule mining technique are recently investigated. The misuse of this technique may disclose the database owner’s sensitive information to others. Hence, the privacy of individuals is not maintained. Many of the researchers have recently made an effort to preserve privacy of sensitive knowledge or information in a real database. In this paper, we have modified EMHS Algorithm to improve its efficiency by using Elliptic Curve Cryptography. We have used ElGamal Cryptography technique of ECC for homomorphic encryption. Analysis of the experiment on various datasets show that proposed algorithm is efficient compared to EMHS in terms of computation time.

[1]  Vivek Kapoor,et al.  Elliptic curve cryptography , 2008, UBIQ.

[2]  Vassilios S. Verykios,et al.  Disclosure limitation of sensitive rules , 1999, Proceedings 1999 Workshop on Knowledge and Data Engineering Exchange (KDEX'99) (Cat. No.PR00453).

[3]  N MuthuLakshmi Privacy Preserving Association Rule Mining without Trusted Party for Horizontally Partitioned Databases , 2012 .

[4]  Vladimir Estivill-Castro,et al.  Fast Private Association Rule Mining by A Protocol for Securely Sharing Distributed Data , 2007, 2007 IEEE Intelligence and Security Informatics.

[5]  Elisa Bertino,et al.  State-of-the-art in privacy preserving data mining , 2004, SGMD.

[6]  Lakhmi C. Jain,et al.  Knowledge-Based Intelligent Information and Engineering Systems , 2004, Lecture Notes in Computer Science.

[7]  Hoai Bac Le,et al.  An Enhanced Scheme for Privacy-Preserving Association Rules Mining on Horizontally Distributed Databases , 2012, 2012 IEEE RIVF International Conference on Computing & Communication Technologies, Research, Innovation, and Vision for the Future.

[8]  N. Koblitz Elliptic curve cryptosystems , 1987 .

[9]  Xiao-hui Cheng,et al.  A Privacy-Preserving Distributed Method for Mining Association Rules , 2009, 2009 International Conference on Artificial Intelligence and Computational Intelligence.

[10]  Behrouz A. Forouzan,et al.  Cryptography and network security , 1998 .

[11]  Chris Clifton,et al.  Defining Privacy for Data Mining , 2002 .

[12]  Rakesh Agrawal,et al.  Privacy-preserving data mining , 2000, SIGMOD 2000.

[13]  A. El-Sisi Fast Cryptographic Privacy Preserving Association Rules Mining on Distributed Homogenous Database , 2008, Int. Arab J. Inf. Technol..

[14]  Petra Perner,et al.  Data Mining - Concepts and Techniques , 2002, Künstliche Intell..