TY - GEN
T1 - Privacy preserving data mining algorithms without the use of secure computation or perturbation
AU - Gurevich, Alex
AU - Gudes, Ehud
PY - 2006/12/1
Y1 - 2006/12/1
N2 - In our era Knowledge is not "just" information anymore, it is an asset. Data mining can be used to extract important knowledge from large databases. These days, it is often the case that such databases are distributed among several organizations who would like to cooperate in order to extract global knowledge, but at the same time, privacy concerns may prevent the parties from directly sharing the data among them. The two current main methods to perform data mining tasks without compromising privacy are: the perturbation method and the secure computation method. Many papers and published algorithms are based on those two methods. Yet, both have some disadvantages, like reduced accuracy for the first and increased overhead for the second. In this article we offer a new paradigm to perform privacy-preserving distributed data mining without using those methods, we present three algorithms for association rule mining which use this paradigm, and discuss their privacy and performance characteristics.
AB - In our era Knowledge is not "just" information anymore, it is an asset. Data mining can be used to extract important knowledge from large databases. These days, it is often the case that such databases are distributed among several organizations who would like to cooperate in order to extract global knowledge, but at the same time, privacy concerns may prevent the parties from directly sharing the data among them. The two current main methods to perform data mining tasks without compromising privacy are: the perturbation method and the secure computation method. Many papers and published algorithms are based on those two methods. Yet, both have some disadvantages, like reduced accuracy for the first and increased overhead for the second. In this article we offer a new paradigm to perform privacy-preserving distributed data mining without using those methods, we present three algorithms for association rule mining which use this paradigm, and discuss their privacy and performance characteristics.
KW - Association rules
KW - Distributed data mining
KW - Privacy
KW - Secure computation
UR - http://www.scopus.com/inward/record.url?scp=39749193934&partnerID=8YFLogxK
U2 - 10.1109/IDEAS.2006.37
DO - 10.1109/IDEAS.2006.37
M3 - Conference contribution
AN - SCOPUS:39749193934
SN - 0769525776
SN - 9780769525778
T3 - Proceedings of the International Database Engineering and Applications Symposium, IDEAS
SP - 121
EP - 128
BT - Proceedings - 10th International Database Engineering and Applications Symposium, IDEAS 2006
T2 - 10th International Database Engineering and Applications Symposium, IDEAS 2006
Y2 - 11 December 2006 through 14 December 2006
ER -