Research on Privacy Preserving Data Mining Association Rules Protocol

Article Preview

Abstract:

Privacy preserving in data mining is a significant direction. There has been growing interests in private concerns for future data mining research. Privacy preserving data mining concentrates on developing accurate models without sharing precise individual data records. A privacy preserving association rule mining algorithm was introduced. This algorithm preserved privacy of individual values by computing scalar product. Then, the data mining and secure multiparty computation are briefly introduced. And proposes an implementation for privacy preserving mining protocol based secure multiparty computation protocol.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 756-759)

Pages:

1661-1664

Citation:

Online since:

September 2013

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Vaidya J., Clifton C., Secure set intersection cardinality with application to association rule mining, Journal of Computer Security, Vol. 13, No. 4, pp.593-622, (2005).

DOI: 10.3233/jcs-2005-13401

Google Scholar

[2] Agrawal R., Srikant R., Privacy-preserving data mining,. In Proceedings of the 2000 ACM SIGMOD Conference on Management of Data, pp.439-450, (2000).

DOI: 10.1145/335191.335438

Google Scholar

[3] Songjie Gong, Learning User Interest Model for Content-based Filtering in Personalized Recommendation System, International Journal of Digital Content Technology and its Applications, Vol. 6, No. 11, p.155 ~ 162, (2012).

DOI: 10.4156/jdcta.vol6.issue11.20

Google Scholar

[4] Songjie Gong, Privacy-preserving Collaborative Filtering based on Randomized Perturbation Techniques and Secure Multiparty Computation, International Journal of Advancements in Computing Technology, Vol. 3, No. 4, p.89 ~ 99, (2011).

DOI: 10.4156/ijact.vol3.issue4.10

Google Scholar

[5] Songjie Gong, A Personalized Recommendation Algorithm on Integration of Item Semantic Similarity and Item Rating Similarity, Journal of Computers, Volume 6, Number 5, May (2011).

DOI: 10.4304/jcp.6.5.1047-1054

Google Scholar

[6] Wright R., Yang Z., Privacy-preserving Bayesian network structure computation on distributed heterogeneous data, In Proceedings of the 10th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp.713-718, (2004).

DOI: 10.1145/1014052.1014145

Google Scholar

[7] Du W., Zhan Z., Using randomized response techniques for privacy-preserving data mining, In Proceedings of Knowledge Discovery and Data Mining, pp.505-510, (2003).

DOI: 10.1145/956750.956810

Google Scholar

[8] Boneh D. The decision diffie-hellman problem,. In Proceedings of the 3rd Algorithmic Number Theory Symposium, pp.48-63, (1998).

DOI: 10.1007/bfb0054851

Google Scholar

[9] Songjie Gong, A Collaborative Filtering Recommendation Algorithm Based on Trust Network and Trust Factor, Journal of Convergence Information Technology, Vol. 8, No. 5, (2013).

DOI: 10.4156/jcit.vol8.issue5.129

Google Scholar

[10] Songjie Gong, A Collaborative Filtering Recommendation Algorithm Based on User Clustering and Item Clustering, Journal of Software, Volume 5, Number 7, July 2010, pp: 745-752.

DOI: 10.4304/jsw.5.7.745-752

Google Scholar