Efficient Privacy-Preserving Data Mining in Malicious Model

被引:0
作者
Emura, Keita [1 ]
Miyaji, Atsuko [1 ]
Rahman, Mohammad Shahriar [1 ]
机构
[1] Japan Adv Inst Sci & Technol, Ctr Highly Dependable Embedded Syst Technol, Nomi, Ishikawa 9231292, Japan
来源
ADVANCED DATA MINING AND APPLICATIONS, ADMA 2010, PT I | 2010年 / 6440卷
关键词
Privacy-preserving Data Mining; Malicious Model; Threshold Two-party Computation; Efficiency; PUBLIC-KEY ENCRYPTION; COMPUTATION;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In many distributed data mining settings, disclosure of the original data sets is not acceptable due to privacy concerns. To address such concerns, privacy-preserving data mining has been an active research area in recent years. While confidentiality is a key issue, scalability is also an important aspect to assess the performance of a privacy-preserving data mining algorithms for practical applications. With this in mind, Kantarcioglu et al. proposed secure dot product and secure set-intersection protocols for privacy-preserving data mining in malicious adversarial model using zero knowledge proofs, since the assumption of semi-honest adversary is unrealistic in some settings. Both the computation and communication complexities are linear with the number of data items in the protocols proposed by Kantarcioglu et al. In this paper, we build efficient and secure dot product and set-intersection protocols in malicious model. In our work, the complexity of computation and communication for proof of knowledge is always constant (independent of the number of data items), while the complexity of computation and communication for the encrypted messages remains the same as in Kantarcioglu et al.'s work (linear with the number of data items). Furthermore, we provide the security model in Universal Composability framework.
引用
收藏
页码:370 / 382
页数:13
相关论文
共 50 条
  • [21] A Swarm-based Data Sanitization Algorithm in Privacy-Preserving Data Mining
    Ming-Tai, Jimmy
    Lin, Jerry Chun-Wei
    Djenouri, Youcef
    Fournier-Viger, Philippe
    Zhang, Yuyu
    2019 IEEE CONGRESS ON EVOLUTIONARY COMPUTATION (CEC), 2019, : 1461 - 1467
  • [22] Privacy-preserving data mining for open government data from heterogeneous sources
    Lee, Jae-Seong
    Jun, Seung-Pyo
    GOVERNMENT INFORMATION QUARTERLY, 2021, 38 (01)
  • [23] Privacy-Preserving Big Data Stream Mining: Opportunities, Challenges, Directions
    Cuzzocrea, Alfredo
    2017 17TH IEEE INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOPS (ICDMW 2017), 2017, : 992 - 994
  • [24] An unsupervised embedding harmonization system for privacy-preserving data mining in healthcare
    Li, Mai
    Lin, Ying
    Chen, Hua
    Aparasu, Rajender R.
    IISE TRANSACTIONS ON HEALTHCARE SYSTEMS ENGINEERING, 2024, 14 (01) : 1 - 17
  • [25] Efficient Privacy-Preserving Link Discovery
    He, Xiaoyun
    Vaidya, Jaideep
    Shafiq, Basit
    Adam, Nabil
    Terzi, Evimaria
    Grandison, Tyrone
    ADVANCES IN KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2009, 5476 : 16 - +
  • [26] Efficient Privacy-Preserving Recommendations based on Social Graphs
    Wainakh, Aidmar
    Grube, Tim
    Daubert, Joerg
    Muehlhaeuser, Max
    RECSYS 2019: 13TH ACM CONFERENCE ON RECOMMENDER SYSTEMS, 2019, : 78 - 86
  • [27] Privacy-preserving data (stream) mining techniques and their impact on data mining accuracy: a systematic literature review
    Hewage, U. H. W. A.
    Sinha, R.
    Naeem, M. Asif
    ARTIFICIAL INTELLIGENCE REVIEW, 2023, 56 (09) : 10427 - 10464
  • [28] Efficient data perturbation for privacy preserving and accurate data stream mining
    Chamikara, M. A. P.
    Bertok, P.
    Liu, D.
    Camtepe, S.
    Khalil, I
    PERVASIVE AND MOBILE COMPUTING, 2018, 48 : 1 - 19
  • [29] Privacy-preserving data (stream) mining techniques and their impact on data mining accuracy: a systematic literature review
    U. H. W. A. Hewage
    R. Sinha
    M. Asif Naeem
    Artificial Intelligence Review, 2023, 56 : 10427 - 10464
  • [30] Privacy-preserving data mining of medical data using data separation-based techniques
    Gang, Kou
    Yi, Peng
    Yong, Shi
    Zhengxin, Chen
    Data Science Journal, 2007, 6 (SUPPL.) : S429 - S434