An Efficient Approach for Privacy Preserving Distributed Mining of Association Rules in Unsecured Environment

被引:0
作者
Modi, Chirag N. [1 ]
Patil, Ashwini R. [2 ]
Doshi, Nishant [3 ]
机构
[1] Natl Inst Technol Goa, Ponda, Goa, India
[2] Natl Inst Technol Surat, Surat, Gujarat, India
[3] MEFGI, Dept Comp Engn, Rajkot 360003, Gujarat, India
来源
2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI) | 2015年
关键词
Distributed Data Mining; Association Rules; Onion Routing; Elliptic Curve Cryptography;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Distributed data mining techniques are widely used for many applications viz; marketing, decision making, statistical analysis etc. In distributed data environment, each of the involving sites contains local information which will be collaborated to extract global mining result. However, these techniques have been investigated in terms of privacy and security concerns of individual site's information. To solve this problem, many cryptography techniques have been investigated. Still there is a room for further improvement. In this paper, we propose an efficient approach for privacy preserving distributed association rule mining. We use onion routing protocol in order to exchange information among involving sites. We use an elliptic curve (EC) based cryptography in order to achieve security and privacy of individual site's information in unsecured distributed environment. Finally, we analyze proposed solution in terms of security, privacy, computational cost and communication cost.
引用
收藏
页码:753 / 758
页数:6
相关论文
共 27 条
[1]  
[Anonymous], 2002, SIGKDD, DOI DOI 10.1145/775047.775142
[2]  
[Anonymous], 1999, KDEX WORKSH, DOI [10.1109/KDEX.1999.836532, DOI 10.1109/KDEX.1999.836532]
[3]  
Borhade S.S., 2014, INT J COMPUT SCI INF, V5, P1560
[4]  
Chaturvedi G.K., 2014, INT J ENG DEV RES, V2, P3334
[5]  
Clifton C., 2002, NAT SCI FDN WORKSH N, V1, P1
[6]  
Clifton Chris., 1996, P ACM SIGMOD WORKSHO, P15
[7]  
Dingledine R., TOR ONION ROUTER
[8]   Exact Knowledge Hiding through Database Extension [J].
Gkoulalas-Divanis, Aris ;
Verykios, Vassilios S. .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2009, 21 (05) :699-713
[9]  
GKOULALASDIVANI.A, 2006, P ACM C INF KNOWL MA
[10]   Onion Routing for anonymous and private Internet connections [J].
Goldschlag, D ;
Reed, M ;
Syverson, P .
COMMUNICATIONS OF THE ACM, 1999, 42 (02) :39-41