Distributed anonymous data perturbation method for privacy-preserving data mining

被引:10
作者
Li, Feng [1 ]
Ma, Jin [1 ]
Li, Jian-hua [1 ]
机构
[1] Shanghai Jiao Tong Univ, Sch Elect Informat & Elect Engn, Shanghai 200030, Peoples R China
来源
JOURNAL OF ZHEJIANG UNIVERSITY-SCIENCE A | 2009年 / 10卷 / 07期
基金
中国国家自然科学基金;
关键词
Privacy-preserving data mining (PPDM); Distributed data mining; Data perturbation;
D O I
10.1631/jzus.A0820320
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Privacy is a critical requirement in distributed data mining. Cryptography-based secure multiparty computation is a main approach for privacy preserving. However, it shows poor performance in large scale distributed systems. Meanwhile, data perturbation techniques are comparatively efficient but are mainly used in centralized privacy-preserving data mining (PPDM). In this paper, we propose a light-weight anonymous data perturbation method for efficient privacy preserving in distributed data mining. We first define the privacy constraints for data perturbation based PPDM in a semi-honest distributed environment. Two protocols are proposed to address these constraints and protect data statistics and the randomization process against collusion attacks: the adaptive privacy-preserving summary protocol and the anonymous exchange protocol. Finally, a distributed data perturbation framework based on these protocols is proposed to realize distributed PPDM. Experiment results show that our approach achieves a high security level and is very efficient in a large scale distributed environment.
引用
收藏
页码:952 / 963
页数:12
相关论文
共 22 条
[1]  
Agrawal D., 2001, PROC 20 ACM SIGMOD S, P247, DOI [10.1145/375551.375602, DOI 10.1145/375551.375602]
[2]  
Agrawal R, 2000, SIGMOD REC, V29, P439, DOI 10.1145/335191.335438
[3]  
ASHLEY P, 2003, ENTERPRISE PRIVACY A
[4]  
ASHRAFI MZ, 2003, PRIVACY PRESERVING D, P279, DOI DOI 10.1007/B94926
[5]  
Beaver D., 1992, CRYPTO, V576, P377, DOI DOI 10.1007/3-540-46766-1
[6]   A framework for evaluating privacy preserving data mining algorithms [J].
Bertino, E ;
Fovino, IN ;
Provenza, LP .
DATA MINING AND KNOWLEDGE DISCOVERY, 2005, 11 (02) :121-154
[7]  
Chaum D., 1988, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, P11, DOI 10.1145/62212.62214
[8]  
Chawla S, 2005, LECT NOTES COMPUT SC, V3378, P363
[9]  
Cramer R, 2001, LECT NOTES COMPUT SC, V2045, P280
[10]  
Cranor Lorrie, 2002, The Platform for Privacy Preferences 1.0 (P3P1.0) Specification