Privacy preserving data mining algorithms without the use of secure computation or perturbation

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    14 Scopus citations

    Abstract

    In our era Knowledge is not "just" information anymore, it is an asset. Data mining can be used to extract important knowledge from large databases. These days, it is often the case that such databases are distributed among several organizations who would like to cooperate in order to extract global knowledge, but at the same time, privacy concerns may prevent the parties from directly sharing the data among them. The two current main methods to perform data mining tasks without compromising privacy are: the perturbation method and the secure computation method. Many papers and published algorithms are based on those two methods. Yet, both have some disadvantages, like reduced accuracy for the first and increased overhead for the second. In this article we offer a new paradigm to perform privacy-preserving distributed data mining without using those methods, we present three algorithms for association rule mining which use this paradigm, and discuss their privacy and performance characteristics.

    Original languageEnglish
    Title of host publicationProceedings - 10th International Database Engineering and Applications Symposium, IDEAS 2006
    Pages121-128
    Number of pages8
    DOIs
    StatePublished - 1 Dec 2006
    Event10th International Database Engineering and Applications Symposium, IDEAS 2006 - Delhi, India
    Duration: 11 Dec 200614 Dec 2006

    Publication series

    NameProceedings of the International Database Engineering and Applications Symposium, IDEAS
    ISSN (Print)1098-8068

    Conference

    Conference10th International Database Engineering and Applications Symposium, IDEAS 2006
    Country/TerritoryIndia
    CityDelhi
    Period11/12/0614/12/06

    Keywords

    • Association rules
    • Distributed data mining
    • Privacy
    • Secure computation

    ASJC Scopus subject areas

    • General Computer Science
    • General Engineering

    Fingerprint

    Dive into the research topics of 'Privacy preserving data mining algorithms without the use of secure computation or perturbation'. Together they form a unique fingerprint.

    Cite this