Privacy preserving data mining algorithms without the use of secure computation or perturbation

Alex Gurevich, Ehud Gudes

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

14 Scopus citations

Abstract

In our era Knowledge is not "just" information anymore, it is an asset. Data mining can be used to extract important knowledge from large databases. These days, it is often the case that such databases are distributed among several organizations who would like to cooperate in order to extract global knowledge, but at the same time, privacy concerns may prevent the parties from directly sharing the data among them. The two current main methods to perform data mining tasks without compromising privacy are: the perturbation method and the secure computation method. Many papers and published algorithms are based on those two methods. Yet, both have some disadvantages, like reduced accuracy for the first and increased overhead for the second. In this article we offer a new paradigm to perform privacy-preserving distributed data mining without using those methods, we present three algorithms for association rule mining which use this paradigm, and discuss their privacy and performance characteristics.

Original languageEnglish
Title of host publicationProceedings - 10th International Database Engineering and Applications Symposium, IDEAS 2006
Pages121-128
Number of pages8
DOIs
StatePublished - 1 Dec 2006
Event10th International Database Engineering and Applications Symposium, IDEAS 2006 - Delhi, India
Duration: 11 Dec 200614 Dec 2006

Publication series

NameProceedings of the International Database Engineering and Applications Symposium, IDEAS
ISSN (Print)1098-8068

Conference

Conference10th International Database Engineering and Applications Symposium, IDEAS 2006
Country/TerritoryIndia
CityDelhi
Period11/12/0614/12/06

Keywords

  • Association rules
  • Distributed data mining
  • Privacy
  • Secure computation

ASJC Scopus subject areas

  • General Computer Science
  • General Engineering

Fingerprint

Dive into the research topics of 'Privacy preserving data mining algorithms without the use of secure computation or perturbation'. Together they form a unique fingerprint.

Cite this