Privacy Preserving Mining of Distributed Data Using Steganography

Privacy preserving mining of distributed data has numerous applications. Several constraints can imposed by the applications, it includes how the data is distributed; when the data is distributed privacy should be preserved...etc. Data mining has operated on a data warehousing model of gathering all data into a central site, then running an algorithm against that data. Privacy considerations may prevent this approach. This paper presents steganography techniques and shows how they can be used to solve several privacy-preserving data mining problems. Steganography is a technique to hide secret information in some other data (we call it a vessel) without leaving any apparent evidence of data alteration.

[1]  Vipin Kumar,et al.  Distributed and parallel knowledge discovery (workshop session) (title only) , 2000, Knowledge Discovery and Data Mining.

[2]  Ramakrishnan Srikant,et al.  Fast Algorithms for Mining Association Rules in Large Databases , 1994, VLDB.

[3]  Silvio Micali,et al.  How to play ANY mental game , 1987, STOC.

[4]  Rong Chen,et al.  Distributed Web mining using Bayesian networks from multiple data streams , 2001, Proceedings 2001 IEEE International Conference on Data Mining.

[5]  David Wai-Lok Cheung,et al.  Efficient Mining of Association Rules in Distributed Databases , 1996, IEEE Trans. Knowl. Data Eng..

[6]  Rüdiger Wirth,et al.  When Distribution is Part of the Semantics: A New Problem Class for Distributed Knowledge Discovery , 2001 .

[7]  Ramakrishnan Srikant,et al.  Fast algorithms for mining association rules , 1998, VLDB 1998.

[8]  Shamkant B. Navathe,et al.  An Efficient Algorithm for Mining Association Rules in Large Databases , 1995, VLDB.

[9]  Yehuda Lindell,et al.  Privacy Preserving Data Mining , 2000, Journal of Cryptology.

[10]  Philip K. Chan,et al.  Meta-learning in distributed data mining systems: Issues and approaches , 2007 .

[11]  Salvatore J. Stolfo,et al.  On the Accuracy of Meta-learning for Scalable Data Mining , 2004, Journal of Intelligent Information Systems.

[12]  Mihir Bellare Advances in Cryptology — CRYPTO 2000 , 2000, Lecture Notes in Computer Science.

[13]  Rakesh Agrawal,et al.  Privacy-preserving data mining , 2000, SIGMOD 2000.

[14]  Philip K. Chan,et al.  Advances in Distributed and Parallel Knowledge Discovery , 2000 .

[15]  Mohammed J. Zaki Parallel and distributed association mining: a survey , 1999, IEEE Concurr..

[16]  Andrew Chi-Chih Yao,et al.  How to generate and exchange secrets , 1986, 27th Annual Symposium on Foundations of Computer Science (sfcs 1986).

[17]  Salvatore J. Stolfo,et al.  An extensible meta-learning approach for scalable and accurate inductive learning , 1996 .

[18]  Zvi Galil,et al.  Proceedings of the 30th IEEE symposium on Foundations of computer science , 1994, FOCS 1994.