A high collusion-resistant approach to distributed privacy-preserving data mining

被引:0
|
作者
Urabe, Shintaro [1 ]
Wang, Jiahong [1 ]
Kodama, Eiichiro [1 ]
Takata, Toyoo [1 ]
机构
[1] Iwate Prefectural Univ, Fac Software & Informat Sci, 152-52 Sugo, Takizawa, Iwate 0200193, Japan
来源
PROCEEDINGS OF THE IASTED INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING AND NETWORKS | 2007年
关键词
data mining; preserving privacy; distributed processing; collusion-resistance;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Data mining across different companies, organizations, online shops, or the likes is necessary so as to discover valuable shared patterns, associations, trends, or dependencies in their shared data. Privacy, however, is a concern. In many situations it is required that data mining should be conducted without any privacy being violated. In response to this requirement, this paper proposes an effective distributed privacy-preserving data mining approach called CRDM (Collusion-Resistant Data Mining). CRDM is characterized by its ability to resist the collusion. Let the number of sites participating in data mining be M. Unless the number of colluding sites is not less than M - 1, privacy cannot be violated. Results of both analytical and experimental performance study demonstrated the effectiveness of CRDM.
引用
收藏
页码:326 / +
页数:2
相关论文
共 50 条
  • [1] Collusion-Resistant Protocol for Privacy-Preserving Distributed Association Rules Mining
    Ge, Xin-Jing
    Zhu, Jian-Ming
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2009, 5927 : 359 - 369
  • [2] A Collusion-Resistant and Privacy-Preserving Data Aggregation Protocol in Crowdsensing System
    Xu, Chang
    Shen, Xiaodong
    Zhu, Liehuang
    Zhang, Yan
    MOBILE INFORMATION SYSTEMS, 2017, 2017
  • [3] A Collusion-Resistant Distributed Scalar Product Protocol With Application To Privacy-Preserving Computation of Trust
    Melchor, Carlos Aguilar
    Ait-Salem, Boussad
    Gaborit, Philippe
    2009 8TH IEEE INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS, 2009, : 140 - 147
  • [4] Collusion-resistant, Lightweight and Privacy-preserving Authentication Protocol for IoV
    Lalouani, Wassila
    Younis, Mohamed
    2023 IEEE 20TH CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE, CCNC, 2023,
  • [5] Privacy-Preserving and Collusion-Resistant Charging Coordination Schemes for Smart Grids
    Baza, Mohamed
    Pazos-Revilla, Marbin
    Sherif, Ahmed
    Nabil, Mahmoud
    Aljohani, Abdulah Jeza
    Mahmoud, Mohamed
    Alasmary, Waleed
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (04) : 2226 - 2243
  • [6] Mnemosyne: Privacy-Preserving Ride Matching With Collusion-Resistant Driver Exclusion
    Li, Meng
    Gao, Jianbo
    Zhang, Zijian
    Zhu, Liehuang
    Lal, Chhagan
    Conti, Mauro
    Alazab, Mamoun
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2023, 72 (04) : 5139 - 5151
  • [7] Collusion-resistant and privacy-preserving data sharing scheme on outsourced data in e-healthcare system
    Maurya, Chanchal
    Chaurasiya, Vijay Kumar
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (26) : 40443 - 40472
  • [8] Collusion-resistant and privacy-preserving data sharing scheme on outsourced data in e-healthcare system
    Chanchal Maurya
    Vijay Kumar Chaurasiya
    Multimedia Tools and Applications, 2023, 82 : 40443 - 40472
  • [9] Towards a collusion-resistant algebraic multi-party protocol for privacy-preserving association rule mining in vertically partitioned data
    Trinca, Dragos
    Rajasekaran, Sanguthevar
    2007 IEEE INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE, VOLS 1 AND 2, 2007, : 402 - +
  • [10] A blockchain-based privacy-preserving and collusion-resistant scheme(PPCR) for double auctions
    Xuedan Jia
    Liangmin Wang
    Ke Cheng
    Pujie Jing
    Xiangmei Song
    Digital Communications and Networks, 2025, 11 (01) : 116 - 125