메뉴 건너뛰기




Volumn 63, Issue 2, 2007, Pages 550-567

Privacy-preserving distributed association rule mining via semi-trusted mixer

Author keywords

Data security; Privacy preserving distributed data mining

Indexed keywords

DATA SITES; DISTRIBUTED ASSOCIATION RULE MINING PROTOCOLS; PRIVACY-PRESERVING DISTRIBUTED DATA MINING; SEMI-TRUSTED MIXER MODELS;

EID: 34447285506     PISSN: 0169023X     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.datak.2007.04.001     Document Type: Article
Times cited : (39)

References (38)
  • 1
    • 34447251486 scopus 로고    scopus 로고
    • D. Struck, Don't store my data, Japanese tell government, in: International Herald Tribune, 25 Aug. 2002.
  • 2
    • 10944270172 scopus 로고    scopus 로고
    • Privacy-preserving data mining: why, how and when
    • Vaidya J., and Clifton C. Privacy-preserving data mining: why, how and when. IEEE Security and Privacy 2 6 (2004) 19-27
    • (2004) IEEE Security and Privacy , vol.2 , Issue.6 , pp. 19-27
    • Vaidya, J.1    Clifton, C.2
  • 4
    • 0036811662 scopus 로고    scopus 로고
    • K-anonymity: a model for protecting privacy, International Journal on Uncertainty
    • Sweeney L. K-anonymity: a model for protecting privacy, International Journal on Uncertainty. Fuzziness and Knowledge-based Systems 10 5 (2002) 557-570
    • (2002) Fuzziness and Knowledge-based Systems , vol.10 , Issue.5 , pp. 557-570
    • Sweeney, L.1
  • 5
    • 0041783510 scopus 로고    scopus 로고
    • R. Agrawal, R. Srikant, Privacy-preserving data mining, in: Proceedings of ACM SIGMOD International Conference on Management of Data, 2000, pp. 439-450.
  • 6
    • 33746437508 scopus 로고    scopus 로고
    • Privacy preserving data mining
    • Lindell Y., and Pinkas B. Privacy preserving data mining. Journal of Cryptology 15 3 (2002) 177-206
    • (2002) Journal of Cryptology , vol.15 , Issue.3 , pp. 177-206
    • Lindell, Y.1    Pinkas, B.2
  • 8
    • 4544361334 scopus 로고    scopus 로고
    • Privacy-preserving distributed mining of association rules on horizontally partitioned data
    • Kantarcioglu M., and Clifton C. Privacy-preserving distributed mining of association rules on horizontally partitioned data. IEEE Trans. Knowledge and Data Engineering 16 9 (2004) 1026-1037
    • (2004) IEEE Trans. Knowledge and Data Engineering , vol.16 , Issue.9 , pp. 1026-1037
    • Kantarcioglu, M.1    Clifton, C.2
  • 14
    • 34447293269 scopus 로고    scopus 로고
    • M. Kantarcioglu, J. Vaidya, Privacy-preserving naive Bayes classifier for horizontally partitioned data, in: Proc. IEEE Workshop on Privacy Preserving Data Mining, 2003, pp. 3-9.
  • 15
    • 2942536415 scopus 로고    scopus 로고
    • J. Vaidya, C. Clifton, Privacy preserving naive Bayes classifier on vertically partitioned data, in: Proc. 2004 SIAM International Conference on Data Mining, 2004.
  • 16
    • 12244255356 scopus 로고    scopus 로고
    • R. Wright, Z. Yang, Privacy-preserving Baysian network structure computation on distributed heterogeneous data, in: Proc. KDD'04, 2004, pp. 713-718.
  • 17
    • 84880121624 scopus 로고    scopus 로고
    • Z. Yang, S. Zhong, R. Wright, Privacy-preserving classification of customer data without loss of accuracy, in: 5th SIAM International Conference on Data Mining, 2005.
  • 18
    • 78149340011 scopus 로고    scopus 로고
    • H. Kargupta, S. Datta, Q. Wang, K. Sivakumar, On the privacy preserving properties of random data perturbation techniques, in: Proc. 3rd Int'l Conf. on Data Mining, 2003, 99-106.
  • 19
    • 0022882770 scopus 로고    scopus 로고
    • A.C. Yao, How to generate and exchange secrets, in: Proc. 27th IEEE Symposium on Foundations of Computer Science, 1986, pp. 162-167.
  • 20
    • 0023545076 scopus 로고    scopus 로고
    • O. Goldreich, S. Micali, A. Wigderson, How to play any mental game - a completeness theorem for protocols with honest majority, in: Proc. 19th ACM Symposium on the Theory of Computing, 1987, pp. 218-229.
  • 21
    • 84898947315 scopus 로고    scopus 로고
    • D. Chaum, C. Crepeau, I. Damgard, Multiparty unconditionally secure protocols, in: Proc. 20th ACM Symposium on the Theory of Computing, 1988, pp. 11-19.
  • 22
    • 0030387678 scopus 로고    scopus 로고
    • D.W.-L. Cheung, J. Han, V. Ng, A.W.-C. Fu, Y. Fu, A fast distributed algorithm for mining association rules, in: Proc. 1996 Int'l Conf. Parallel and Distributed Information Systems (PDIS'96), 1996, pp. 31-42.
  • 23
    • 34447293734 scopus 로고    scopus 로고
    • J.C. Benaloh, Secret sharing homomorphisms: Keeping shares of a secret, in: Proc. Crypto'86, 1986 pp. 251-260.
  • 24
    • 0040655149 scopus 로고
    • A communication-privacy tradeoff for modular addition
    • Chor B., and Kushilevitz E. A communication-privacy tradeoff for modular addition. Information Processing Letters 45 4 (1993) 205-210
    • (1993) Information Processing Letters , vol.45 , Issue.4 , pp. 205-210
    • Chor, B.1    Kushilevitz, E.2
  • 25
    • 84874800178 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • ElGamal T. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inform. Theory IT-31 (1985) 469-472
    • (1985) IEEE Trans. Inform. Theory IT-31 , pp. 469-472
    • ElGamal, T.1
  • 26
    • 34447273570 scopus 로고    scopus 로고
    • R. Agrawal, R. Srikant, Fast algorithms for mining association rules, in: Proc. 20th Int'l Conf. Very Large Data Bases, 1994, pp. 487-499.
  • 28
    • 84942550998 scopus 로고    scopus 로고
    • P. Paillier, Public-key cryptosystems based on composite degree residuosity classes, in: Proc. Eurocrypt'99, 1999, pp. 223-238.
  • 30
    • 34447272207 scopus 로고    scopus 로고
    • M.K. Franklin, M.K. Reiter, Fair exchange with a semi-trusted party, in: Proc. CCS'97, 1997.
  • 31
    • 21944438947 scopus 로고    scopus 로고
    • Identity-based fault-tolerant conference key agreement
    • Yi X. Identity-based fault-tolerant conference key agreement. IEEE Trans. Dependable and Secure Computing 1 3 (2004) 170-178
    • (2004) IEEE Trans. Dependable and Secure Computing , vol.1 , Issue.3 , pp. 170-178
    • Yi, X.1
  • 32
    • 34447270236 scopus 로고    scopus 로고
    • NBS FIPS PUB 46, Data Encryption Standard (National Bureau of Standards, US Department of ommerce, 1977).
  • 33
    • 34447250757 scopus 로고    scopus 로고
    • FIPS PUB 197, Advanced Encryption Standard (Federal Information Processing Standards Publications, US Department of Commerce/N.I.S.T., National Technical Information Service, 2001).
  • 34
    • 0036538428 scopus 로고    scopus 로고
    • A secure fault-tolerant conference key agreement protocol
    • Tzeng W.G. A secure fault-tolerant conference key agreement protocol. IEEE Trans. Computers 51 4 (2002) 373-379
    • (2002) IEEE Trans. Computers , vol.51 , Issue.4 , pp. 373-379
    • Tzeng, W.G.1
  • 35
    • 84919085619 scopus 로고
    • An improved algorithm for computing logarithm over GF(p) and its cryptographic significance
    • Pohlig S.C., and Hellman M.E. An improved algorithm for computing logarithm over GF(p) and its cryptographic significance. IEEE Trans. Information Theory IT-24 (1978) 106-110
    • (1978) IEEE Trans. Information Theory IT-24 , pp. 106-110
    • Pohlig, S.C.1    Hellman, M.E.2
  • 37
    • 34447291556 scopus 로고    scopus 로고
    • H. Lipmaa, AES candidates, A survey of implementation .
  • 38
    • 34447289975 scopus 로고    scopus 로고
    • M. Scott, Comparison of methods for modular exponentiation on 32-bit Intel 80x86 processors .


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.