Distributed anonymous data perturbation method for privacy-preserving data mining

被引:0
作者
Feng Li
Jin Ma
Jian-hua Li
机构
[1] Shanghai Jiao Tong University,School of Electronic Information and Electrical Engineering
来源
Journal of Zhejiang University-SCIENCE A | 2009年 / 10卷
关键词
Privacy-preserving data mining (PPDM); Distributed data mining; Data perturbation; TP391.7;
D O I
暂无
中图分类号
学科分类号
摘要
Privacy is a critical requirement in distributed data mining. Cryptography-based secure multiparty computation is a main approach for privacy preserving. However, it shows poor performance in large scale distributed systems. Meanwhile, data perturbation techniques are comparatively efficient but are mainly used in centralized privacy-preserving data mining (PPDM). In this paper, we propose a light-weight anonymous data perturbation method for efficient privacy preserving in distributed data mining. We first define the privacy constraints for data perturbation based PPDM in a semi-honest distributed environment. Two protocols are proposed to address these constraints and protect data statistics and the randomization process against collusion attacks: the adaptive privacy-preserving summary protocol and the anonymous exchange protocol. Finally, a distributed data perturbation framework based on these protocols is proposed to realize distributed PPDM. Experiment results show that our approach achieves a high security level and is very efficient in a large scale distributed environment.
引用
收藏
页码:952 / 963
页数:11
相关论文
共 26 条
[1]  
Agrawal R.(2000)Privacy-preserving data mining ACM SIGMOD Record 29 439-450
[2]  
Srikant R.(1991)Foundations of secure interactive computing CRYPTO 1991 377-391
[3]  
Beaver D.(2005)A framework for evaluating privacy preserving data mining algorithms Data Min. Knowl. Discov. 11 121-154
[4]  
Bertino E.(2004)Privacy preserving mining of association rules Inf. Syst. 29 343-364
[5]  
Fovino I.N.(2004)Data swapping: variations on a theme by dalenius and reiss Priv. Statist. Datab. 3050 14-29
[6]  
Provenza L.P.(2007)Multi-party, privacy-preserving distributed data mining using a game theoretic framework LNCS 4702 523-411
[7]  
Evfimievski A.(1985)A data distortion by probability distribution ACM Trans. Datab. Syst. 10 395-238
[8]  
Srikant R.(1999)Public-key cryptosystems based on composite degree residuosity classes Advances in Cryptology EUROCRYPT 99 223-693
[9]  
Agrawal R.(2002)Maintaining Data Privacy in Association Rule Mining Proc. 28th Int. Conf. on Very Large Data Bases 28 682-588
[10]  
Gehrke J.(2002)Achieving Int. J. Uncert., Fuzz. and Knowl.-based Syst. 10 571-752