DocumentCode
3105191
Title
Secure Distributed k-Anonymous Pattern Mining
Author
Jiang, Wei ; Atzori, Maurizio
Author_Institution
Purdue Univ., West Lafayette, IN
fYear
2006
fDate
18-22 Dec. 2006
Firstpage
319
Lastpage
329
Abstract
Privacy-preserving data mining is an important area that studies privacy issues of data mining. When the goal is to share data mining results, two privacy-related problems may arise. The first one is how to compute the data-mining results among several parties without sharing the data. Cryptography-based primitives are the basic tool used to develop ad-hoc secure multi-party computation protocols that share information as less as possible during the computation under different adversary models. The second one is how to produce data mining results that provably do not contain threats to the anonymity of individuals. The concept of k-anonymity has been used to discover anonymity-preserving frequent patterns, and centralized algorithms have been developed. In this paper and for the first time, we study how to produce anonymity-preserving data mining results in a distributed environment. We present two privacy-preserving strategies and show their feasibility through experimental analysis.
Keywords
cryptographic protocols; data mining; data privacy; ad-hoc secure multiparty computation protocols; anonymity preservation; cryptography-based primitives; distributed environment; distributed k-anonymous pattern mining security; k-anonymity; privacy preservation; Association rules; Cryptographic protocols; Cryptography; Data mining; Data privacy; Decision making; History; Itemsets; Protection;
fLanguage
English
Publisher
ieee
Conference_Titel
Data Mining, 2006. ICDM '06. Sixth International Conference on
Conference_Location
Hong Kong
ISSN
1550-4786
Print_ISBN
0-7695-2701-7
Type
conf
DOI
10.1109/ICDM.2006.140
Filename
4053059
Link To Document