Privacy Preserving Data Mining by Cyptography

被引:0
作者
Sharma, Anand [1 ]
Ojha, Vibha [2 ]
机构
[1] MITS, CSE Dept, FET, Lakshmangarh, Sikar, India
[2] IITM, CSE Dept, Gwalior, India
来源
RECENT TRENDS IN NETWORK SECURITY AND APPLICATIONS | 2010年 / 89卷
关键词
Privacy preserving; Oblivious transfer; Cryptography;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
It is obvious that if a data mining algorithm is run against the union of the databases, and its output becomes known to one or more of the parties, it reveals something about the contents of the other databases. Research in secure distributed computation, which was done as part of a larger body of research in the theory of cryptography, has achieved remarkable results. These results were shown using generic constructions that can be applied to any function that has an efficient representation as a circuit. We describe these results, discuss their efficiency, and demonstrate their relevance to privacy preserving computation of data mining algorithms. Note that we consider here a distributed computing scenario, rather than a scenario where all data is gathered in a central server, which then runs the algorithm against all data. (The central server scenario introduces interesting privacy issues, too, but they are outside the scope of this paper.)
引用
收藏
页码:576 / +
页数:2
相关论文
共 19 条
[1]  
[Anonymous], 1981, TR81 AIK COMP LAB
[2]  
[Anonymous], 2002, SECURE MULTIPA UNPUB
[3]  
BEAVER D, 1990, PROCEEDINGS OF THE TWENTY SECOND ANNUAL ACM SYMPOSIUM ON THEORY OF COMPUTING, P503, DOI 10.1145/100216.100287
[4]  
Bellare M., 1989, P ANN INT CRYPT C SA, P547, DOI DOI 10.1007/0-387-34805-0_48
[5]  
Ben-Or M., 1988, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, P1, DOI 10.1145/62212.62213
[6]  
Chaum D., 1988, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, P11, DOI 10.1145/62212.62214
[7]  
CRAMER R, 2000, INTRO SECURE COMPUTA
[8]  
DAI W, 2002, CRYPTO LIB BENCHMARK
[9]   A RANDOMIZED PROTOCOL FOR SIGNING CONTRACTS [J].
EVEN, S ;
GOLDREICH, O ;
LEMPEL, A .
COMMUNICATIONS OF THE ACM, 1985, 28 (06) :637-647
[10]   Comparing information without leaking it [J].
Fagin, R ;
Naor, M ;
Winkler, P .
COMMUNICATIONS OF THE ACM, 1996, 39 (05) :77-85