메뉴 건너뛰기




Volumn 177, Issue 23, 2007, Pages 5468-5483

Two methods for privacy preserving data mining with malicious participants

Author keywords

Attacks; Data mining; Malicious model; Privacy; Protocols

Indexed keywords

ALGORITHMS; CRYPTOGRAPHY; DATA PRIVACY; NETWORK PROTOCOLS;

EID: 34548646069     PISSN: 00200255     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ins.2007.07.013     Document Type: Article
Times cited : (21)

References (30)
  • 1
    • 3142716056 scopus 로고    scopus 로고
    • R. Agrawal, J. Kiernan, R. Srikant, Y. Xu. Order preserving encryption for numeric data, in: Proceedings of SIGMOD 2004, Paris, France, 2004, pp. 563-574.
  • 2
    • 34548609030 scopus 로고    scopus 로고
    • R. Agrawal, R. Srikant. Fast algorithms for mining association rules, in: Proceedings of 20th International Conference on Very Large Databases, Chile, 1994, pp. 487-499.
  • 3
    • 0041783510 scopus 로고    scopus 로고
    • R. Agrawal, R. Srikant. Privacy-preserving data mining, in: Proceedings of ACM SIGMOD Conference on Management of Data, ACM Press, May 2000, pp. 439-450.
  • 4
    • 33749576326 scopus 로고    scopus 로고
    • J. Brickell, V. Shmatikov. Efficient anonymity preserving data collection, in: Proceedings of KDD 2006, Philadelphia, PA, USA, August 2006, pp. 76-85.
  • 5
    • 34548639229 scopus 로고    scopus 로고
    • W. Du, Z. Zhan. Building decision tree classifier on private data, in: Proceedings of the IEEE international conference on Privacy, security and data mining, vol. 14, 2002, pp. 1-8.
  • 6
    • 77952334884 scopus 로고    scopus 로고
    • W. Du, Z. Zhan. Using randomized response techniques for privacy-preserving data mining, in: Proceedings of 9th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2003, pp. 505-510.
  • 7
    • 24944523186 scopus 로고    scopus 로고
    • B. Goethals, S. Laur, H. Lipmaa, T. Mielikainen. On private scalar product computation for privacy-preserving data mining, in: The 7th Annual International Conference in Information Security and Cryptology (ICISC 2004), vol. 3506 of Lecture Notes in Computer Science, 2004, pp. 104-120.
  • 10
    • 29844458622 scopus 로고    scopus 로고
    • Z. Huang, W. Du, B. Chen. Deriving private information from randomized data, in: Proceedings of ACM SIGMOD International Conference on Management of Data, 2005, pp. 37-48.
  • 11
    • 84969524054 scopus 로고    scopus 로고
    • I. Ioannidis, A. Grama. An efficient protocol for yao's millionaires' problem, in: Proceedings of 36th Hawaii International Conference on System Sciences (HICSS'03), 2003, pp. 205-210.
  • 12
    • 33745439412 scopus 로고    scopus 로고
    • G. Jagannathan, K. Pillaipakkaamnatt, R. Wright. A new privacy-preserving distributed k-clustering algorithm, in: Proceedings of 2006 SIAM International Conference on Data Mining(SDM), 2006, pp. 492-496.
  • 13
    • 32344446366 scopus 로고    scopus 로고
    • G. Jagannathan, R. Wright. Privacy-preserving distributed k-means clustering over arbitrarily partitioned data, in: Proceedings of ACM KDD 2005, 2005, pp. 593-599.
  • 14
    • 34248346949 scopus 로고    scopus 로고
    • Qinglin Jiang, Douglas S. Reeves, Peng Ning. Improving robustness of pgp keyrings by conflict detection, in: Topics in Cryptology-CT-RSA 2004, 2004, pp. 194-207.
  • 15
    • 78449273979 scopus 로고    scopus 로고
    • W. Jiang, C. Clifton. Transforming semi-honest protocols to ensure accountability, in: The ICDM workshop on Privacy Aspects of Data Mining (PADM06), 2006, pp. 542-529.
  • 16
    • 4544361334 scopus 로고    scopus 로고
    • Privacy-preserving distributed mining of association rules on horizontally partitioned data
    • Kantarci{dotless}oǧlu M., and Clifton C. Privacy-preserving distributed mining of association rules on horizontally partitioned data. IEEE Transactions on Knowledge and Data Engineering 16 9 (2004) 1026-1037
    • (2004) IEEE Transactions on Knowledge and Data Engineering , vol.16 , Issue.9 , pp. 1026-1037
    • Kantarcioǧlu, M.1    Clifton, C.2
  • 17
    • 33749540392 scopus 로고    scopus 로고
    • M. Kantarci{dotless}oǧlu, C. Clifton, Privately computing a distributed k-nn classifier, in: Proceedings of PKDD 2004, 2004, pp. 279-290.
  • 18
    • 34548605150 scopus 로고    scopus 로고
    • M. Kantarci{dotless}oǧlu, O. Kardes. Privacy preserving data mining in malicious model. Technical Report CS-2006-06, Stevens Institute of Technology, Department of Computer Science, 2006.
  • 19
    • 33749568323 scopus 로고    scopus 로고
    • K. LeFevre, D. DeWitt, R. Ramakrishnan. Workload aware anonymization, in: Proceedings of KDD 2006, Philadelphia, PA, USA, August 2006, pp. 277-286.
  • 20
    • 84974555530 scopus 로고    scopus 로고
    • Y. Lindell, B. Pinkas. Privacy preserving data mining, in: Proceedings of CRYPTO 2000, 2000, pp. 36-54.
  • 21
    • 85084163840 scopus 로고    scopus 로고
    • D. Malkhi, N. Nisan, B. Pinkas, Y. Sella. Fairplay - a secure two-party computation system, in: Proceedings of Usenix Security Symposium 2004, 2004, pp. 20-35.
  • 22
    • 0242709355 scopus 로고    scopus 로고
    • J. Vaidya, C. Clifton. Privacy preserving association rule mining in vertically partitioned data, in: Proceedings of 8th ACM SIGKDD International conference on Knowledge discovery and data mining, 2002, pp. 639-644.
  • 23
    • 12244255356 scopus 로고    scopus 로고
    • R. Wright, Z. Yang. Privacy preserving bayesian network structure computation on distributed heterogeneous data, in: Proceedings of the 10th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2004, pp. 713-718.
  • 24
    • 32344451483 scopus 로고    scopus 로고
    • Z. Yang, S. Zhong, R. Wright. Anonymity preserving data collection, in: Proceedings of ACM KDD 2005, Chicago, August 2005, pp. 334-343.
  • 25
    • 84880121624 scopus 로고    scopus 로고
    • Z. Yang, S. Zhong, R. Wright. Privacy preserving classification of customer data without loss of accuracy, in: Proceedings of 2005 SIAM International Conference on Data Mining(SDM), California, April 2005, pp. 92-102.
  • 26
    • 0022882770 scopus 로고    scopus 로고
    • A. Yao. How to generate and exchange secrets, in: Proceedings of 27th IEEE Symposium on Foundations of Computer Science, 1986, pp. 162-167.
  • 27
    • 2442705676 scopus 로고    scopus 로고
    • Genescout: a data mining system for predicting vertebrate genes in genomic DNA sequences
    • Yin M.M., and Wang J.T.L. Genescout: a data mining system for predicting vertebrate genes in genomic DNA sequences. Information Sciences 163 1-3 (2004) 201-218
    • (2004) Information Sciences , vol.163 , Issue.1-3 , pp. 201-218
    • Yin, M.M.1    Wang, J.T.L.2
  • 28
    • 33646140552 scopus 로고    scopus 로고
    • A false negative approach to mining frequent itemsets from high speed transactional data streams
    • Yu J.X., Chong Z., Lu H., Zhang Z., and Zhou A. A false negative approach to mining frequent itemsets from high speed transactional data streams. Information Sciences 176 16 (2006) 1986-2015
    • (2006) Information Sciences , vol.176 , Issue.16 , pp. 1986-2015
    • Yu, J.X.1    Chong, Z.2    Lu, H.3    Zhang, Z.4    Zhou, A.5
  • 29
    • 19744364896 scopus 로고    scopus 로고
    • Fuzzy reasoning model under quotient space structure
    • Zhang L., and Zhang B. Fuzzy reasoning model under quotient space structure. Information Sciences 176 4 (2005) 353-364
    • (2005) Information Sciences , vol.176 , Issue.4 , pp. 353-364
    • Zhang, L.1    Zhang, B.2
  • 30
    • 33750333499 scopus 로고    scopus 로고
    • Privacy preserving algorithms for distributed mining of frequent itemsets
    • Zhong S. Privacy preserving algorithms for distributed mining of frequent itemsets. Information Sciences 177 2 (2007) 490-503
    • (2007) Information Sciences , vol.177 , Issue.2 , pp. 490-503
    • Zhong, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.