메뉴 건너뛰기




Volumn , Issue , 2007, Pages 325-331

Fast private association rule mining by a protocol for securely sharing distributed data

Author keywords

[No Author keywords available]

Indexed keywords

ASSOCIATION RULES; CLIENT SERVER COMPUTER SYSTEMS; DISTRIBUTED DATABASE SYSTEMS; INTELLIGENT AGENTS; NETWORK PROTOCOLS;

EID: 34748826799     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (10)

References (51)
  • 2
    • 33745899910 scopus 로고    scopus 로고
    • A. Amirbekyan and V. Estivill-Castro, Privacy preserving bscan for vertically partitioned data. in IEEE International Conference on Intelligence and Security Informatics, ISI 2006, ser. Lecture Notes in Computer Science, S. Mehrotra, D. Zeng, H. Chen, B. Thuraisingham, and F.-Y. Wang, Eds., 3975. San Diego, CA, USA: Springer, May 23-24 2006, pp. 141-153.
    • A. Amirbekyan and V. Estivill-Castro, "Privacy preserving bscan for vertically partitioned data." in IEEE International Conference on Intelligence and Security Informatics, ISI 2006, ser. Lecture Notes in Computer Science, S. Mehrotra, D. Zeng, H. Chen, B. Thuraisingham, and F.-Y. Wang, Eds., vol. 3975. San Diego, CA, USA: Springer, May 23-24 2006, pp. 141-153.
  • 3
    • 33745884370 scopus 로고    scopus 로고
    • A. HajYasien, V. Estivill-Castro, and R. Topor, Sanitization of databases for refined privacy trade-offs. in IEEE International Conference on Intelligence and Security Informatics, ISI 2006, ser Lecture Notes in Computer Science, S. Mehrotra, D. Zeng, H. Chen, B. Thuraisingham, and F.-Y. Wang, Eds., 3975. San Diego, CA, USA: Springer, May 23-24 2006, pp. 522-528.
    • A. HajYasien, V. Estivill-Castro, and R. Topor, "Sanitization of databases for refined privacy trade-offs." in IEEE International Conference on Intelligence and Security Informatics, ISI 2006, ser Lecture Notes in Computer Science, S. Mehrotra, D. Zeng, H. Chen, B. Thuraisingham, and F.-Y. Wang, Eds., vol. 3975. San Diego, CA, USA: Springer, May 23-24 2006, pp. 522-528.
  • 4
    • 24944535795 scopus 로고    scopus 로고
    • J. Zhan, A. Matwin, and L. Chang, Private mining of association rules, in IEEE International Conference on Intelligence and Security Informatics, ISI 2005, ser. Lecture Notes in Computer Science, P. Kantor, G. Muresan, E Roberts, D. Zeng, F.-Y. Wang, H. Chen, and R. Merkle, Eds., 3495. Atlanta, GA, USA: Springer, May 19-20 2005, pp. 72-80.
    • J. Zhan, A. Matwin, and L. Chang, "Private mining of association rules," in IEEE International Conference on Intelligence and Security Informatics, ISI 2005, ser. Lecture Notes in Computer Science, P. Kantor, G. Muresan, E Roberts, D. Zeng, F.-Y. Wang, H. Chen, and R. Merkle, Eds., vol. 3495. Atlanta, GA, USA: Springer, May 19-20 2005, pp. 72-80.
  • 5
    • 26444613270 scopus 로고    scopus 로고
    • Privacy-preserving collaborative association rule mining
    • Data and Applications Security XIX, 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, DBSec, Storrs, CT, USA: Springer, August 7-10
    • _, "Privacy-preserving collaborative association rule mining." in Data and Applications Security XIX, 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, DBSec, ser. Lecture Notes in Computer Science, vol. 3654. Storrs, CT, USA: Springer, August 7-10 2005, pp. 153-165.
    • (2005) ser. Lecture Notes in Computer Science , vol.3654 , pp. 153-165
    • Mena, J.1
  • 6
    • 35048843897 scopus 로고    scopus 로고
    • N. Zhang, S. Wang, and W. Zhao, A new scheme on privacy preserving association rule mining. in PKDD 2004, 8th European Conference on Principles and Practice of Knowledge Discovery in Databases, Pisa, Italy, September 20-24, 2004, Proceedings, ser. Lecture Notes in Computer Science, J.-F. Boulicaut, F. Esposito, F. Giannotti, and D. Pedreschi, Eds., 3202. Pisa, Italy: Springer, September 20-24 2004, pp. 484-495.
    • N. Zhang, S. Wang, and W. Zhao, "A new scheme on privacy preserving association rule mining." in PKDD 2004, 8th European Conference on Principles and Practice of Knowledge Discovery in Databases, Pisa, Italy, September 20-24, 2004, Proceedings, ser. Lecture Notes in Computer Science, J.-F. Boulicaut, F. Esposito, F. Giannotti, and D. Pedreschi, Eds., vol. 3202. Pisa, Italy: Springer, September 20-24 2004, pp. 484-495.
  • 7
    • 4544302774 scopus 로고    scopus 로고
    • Privacy-preserving association rule mining in large-scale distributed systems
    • Chicago, Illinois, USA: IEEE Computer Society, April 19-22
    • A. Schuster, R. Wolff, and B. Gilburd, "Privacy-preserving association rule mining in large-scale distributed systems," in 4th IEEE/ACM International Symposium on Cluster Computing and the Grid (CCGRID). Chicago, Illinois, USA: IEEE Computer Society, April 19-22 2004, pp. 411-418.
    • (2004) 4th IEEE/ACM International Symposium on Cluster Computing and the Grid (CCGRID) , pp. 411-418
    • Schuster, A.1    Wolff, R.2    Gilburd, B.3
  • 10
    • 4544361334 scopus 로고    scopus 로고
    • Privacy-preserving distributed mining of association rules on horizontally partitioned data
    • _, "Privacy-preserving distributed mining of association rules on horizontally partitioned data." IEEE Trans. Knowl. Data Eng., vol. 16, no. 9, pp. 1026-1037, 2004.
    • (2004) IEEE Trans. Knowl. Data Eng , vol.16 , Issue.9 , pp. 1026-1037
    • Kantarcioglu, M.1    Clifton, C.2
  • 12
    • 34748891952 scopus 로고    scopus 로고
    • W Du and Z. Zhan, Building decision tree classifier on private data, in Privacy, Security and Data Mining, V. Estivill-Castro and C. Clifton, Eds., IEEE ICDM Workshop Proceedings, 14 in the Conferences in Research and Practice in Information Technology Series. Sydney Australia: Australian Computer Society December 2002, pp. 1-8.
    • W Du and Z. Zhan, "Building decision tree classifier on private data," in Privacy, Security and Data Mining, V. Estivill-Castro and C. Clifton, Eds., IEEE ICDM Workshop Proceedings, Volume 14 in the Conferences in Research and Practice in Information Technology Series. Sydney Australia: Australian Computer Society December 2002, pp. 1-8.
  • 13
    • 34748828734 scopus 로고    scopus 로고
    • M. Shaneck, Y. Kim, and V. Kumar, Privacy preserving nearest neighbor search, University of Minnesota, Department of Computer Science and Engineering, 4-192 EECS Building, 200 Union St SE, Minneapolis, MIN, USA, Tech. Rep. 06-0149, 2006, to appear in the 2006 IEEE International Workshop on Privacy Aspects of Data Mining, December 2006.
    • M. Shaneck, Y. Kim, and V. Kumar, "Privacy preserving nearest neighbor search," University of Minnesota, Department of Computer Science and Engineering, 4-192 EECS Building, 200 Union St SE, Minneapolis, MIN, USA, Tech. Rep. 06-0149, 2006, to appear in the 2006 IEEE International Workshop on Privacy Aspects of Data Mining, December 2006.
  • 14
    • 77952332120 scopus 로고    scopus 로고
    • Privacy-preserving k-means clustering over vertically partitioned data
    • Washington, D.C, US: ACM Press, August 24-27
    • J. Vaidya and C. C. Clifton, "Privacy-preserving k-means clustering over vertically partitioned data," in Proceedings of the SIGKDD-AMC Conference of Data Mining. Washington, D.C., US: ACM Press, August 24-27 2003, pp. 206-215.
    • (2003) Proceedings of the SIGKDD-AMC Conference of Data Mining , pp. 206-215
    • Vaidya, J.1    Clifton, C.C.2
  • 15
    • 14244267516 scopus 로고    scopus 로고
    • V. Estivill-Castro, Private representative-based clustering for vertically partitioned data, in Fifth Mexican International Conference on Computer science (ENC 04), R. Baeza-Yates, J. Marroquin, and E. Chávez, Eds., SMCC. Colima, Mexico: IEEE Computer Society Press, September 2004, pp. 160-167.
    • V. Estivill-Castro, "Private representative-based clustering for vertically partitioned data," in Fifth Mexican International Conference on Computer science (ENC 04), R. Baeza-Yates, J. Marroquin, and E. Chávez, Eds., SMCC. Colima, Mexico: IEEE Computer Society Press, September 2004, pp. 160-167.
  • 16
  • 20
    • 33751363543 scopus 로고    scopus 로고
    • Two new techniques for hiding sensitive itemsets and their empirical evaluation
    • Data Warehousing and Knowledge Discovery, 8th International Conference, DaWaK 2006, Krakow, Poland: Springer, September 4-8
    • A. HajYasien and V. Estivill-Castro, "Two new techniques for hiding sensitive itemsets and their empirical evaluation." in Data Warehousing and Knowledge Discovery, 8th International Conference, DaWaK 2006, ser. Lecture Notes in Computer Science, vol. 4081. Krakow, Poland: Springer, September 4-8 2006, pp. 302-311.
    • (2006) ser. Lecture Notes in Computer Science , vol.4081 , pp. 302-311
    • HajYasien, A.1    Estivill-Castro, V.2
  • 21
    • 0344990562 scopus 로고    scopus 로고
    • Using unknowns to prevent discovery of association rules
    • December
    • Y. Saygin, V. S. Verykios, and C. Clifton, "Using unknowns to prevent discovery of association rules," SIGMOD Record, vol. 30(4), pp. 45-54, December 2001.
    • (2001) SIGMOD Record , vol.30 , Issue.4 , pp. 45-54
    • Saygin, Y.1    Verykios, V.S.2    Clifton, C.3
  • 22
    • 0024914229 scopus 로고
    • Security-control methods for statistical databases: A comparative study
    • R. Adam and J. Wortmann, "Security-control methods for statistical databases: A comparative study" ACM Computing Surveys, vol. 21, 1989.
    • (1989) ACM Computing Surveys , vol.21
    • Adam, R.1    Wortmann, J.2
  • 23
    • 0041379358 scopus 로고    scopus 로고
    • Protecting data through 'perturbation' techniques: Impact on the knowledge discovery process, ournal of Database
    • April-June
    • R. Wilson and P. P. A. Rosen, "Protecting data through 'perturbation' techniques: Impact on the knowledge discovery process," ournal of Database Management, vol. 14, no. 2, pp. 14-26, April-June 2003.
    • (2003) Management , vol.14 , Issue.2 , pp. 14-26
    • Wilson, R.1    Rosen, P.P.A.2
  • 24
    • 84958048324 scopus 로고    scopus 로고
    • Data swapping: Balancing privacy against precision in mining for logic rules
    • Data Warehousing and Knowledge Discovery DaWaK-99, M. Mohania and A. Tjoa, Eds. Florence, Italy
    • V. Estivill-Castro and L. Brankovic, "Data swapping: Balancing privacy against precision in mining for logic rules," in Data Warehousing and Knowledge Discovery DaWaK-99, M. Mohania and A. Tjoa, Eds. Florence, Italy: Springer-Verlag Lecture Notes in Computer Science 1676, 1999, pp. 389-398.
    • (1999) Springer-Verlag Lecture Notes in Computer Science , vol.1676 , pp. 389-398
    • Estivill-Castro, V.1    Brankovic, L.2
  • 32
    • 4544312695 scopus 로고    scopus 로고
    • Cryptographic techniques for privacy-preserving data mining
    • B. Pinkas, "Cryptographic techniques for privacy-preserving data mining," in Proc. of the ACM SIGKDD Explorations, vol. 4, no. 2, 2002, pp. 12-19.
    • (2002) Proc. of the ACM SIGKDD Explorations , vol.4 , Issue.2 , pp. 12-19
    • Pinkas, B.1
  • 34
    • 1142303699 scopus 로고    scopus 로고
    • Information sharing across private databases
    • San Diego, CA: ACM Press, June
    • R. Agrawal, A. Evfimievski, and R. Srikant, "Information sharing across private databases," in Proc. of ACM SIGMOD. San Diego, CA: ACM Press, June 2003.
    • (2003) Proc. of ACM SIGMOD
    • Agrawal, R.1    Evfimievski, A.2    Srikant, R.3
  • 35
    • 84974555530 scopus 로고    scopus 로고
    • Privacy preserving data mining
    • Proceedings of CRYPTO-00 Advances in Cyptology, M. Bellare, Ed. Santa Barbara, California, USA:, August 20-24
    • Y. Lindell and P. B., "Privacy preserving data mining," in Proceedings of CRYPTO-00 Advances in Cyptology, M. Bellare, Ed. Santa Barbara, California, USA: Springer-Verlag Lecture Notes in Computer Science 1880, August 20-24 2000, pp. 36-54.
    • (2000) Springer-Verlag Lecture Notes in Computer Science , vol.1880 , pp. 36-54
    • Lindell, Y.1    B., P.2
  • 38
    • 0003839182 scopus 로고    scopus 로고
    • Secure multi-party computation
    • O. Goldreich, "Secure multi-party computation," Working Draft, 1998.
    • (1998) Working Draft
    • Goldreich, O.1
  • 41
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • February
    • R. Rivest, A. Shamir, and L. Adelman, "A method for obtaining digital signatures and public-key cryptosystems," Communications of the ACM, vol. 21, no. 2, pp. 120-126, February 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adelman, L.3
  • 42
    • 34748867354 scopus 로고    scopus 로고
    • Performance comparisons of public-key cryptosystems
    • San Francisco, USA, January
    • M. Wiener, "Performance comparisons of public-key cryptosystems," in Proc. of the RSA Data Security Conference, San Francisco, USA, January 1998.
    • (1998) Proc. of the RSA Data Security Conference
    • Wiener, M.1
  • 43
    • 34748821935 scopus 로고    scopus 로고
    • Rsa laboratories web site
    • Online, Available: url=http
    • "Rsa laboratories web site." [Online]. Available: url=http://www.devx.com/security/Link/8206
  • 46
    • 34748829316 scopus 로고    scopus 로고
    • Openssl
    • Online, Available: url=http
    • "Openssl." [Online]. Available: url=http://www.openssl.org/
  • 48
    • 0004141908 scopus 로고    scopus 로고
    • 3rd ed. New York, NY: Prentice Hall, March
    • A. S. Tanenbaum, Computer Networks, 3rd ed. New York, NY: Prentice Hall, March 1996.
    • (1996) Computer Networks
    • Tanenbaum, A.S.1
  • 49
    • 0030379749 scopus 로고    scopus 로고
    • Efficient mining of association rules of distributed databases
    • December
    • D. W.-L. Cheung, V. Ng, W.-C. Fu, and Y. Fu, "Efficient mining of association rules of distributed databases," IEEE Transactions Knowledge Data Engineering, vol. 8, no. 6, pp. 911-922, December 1996.
    • (1996) IEEE Transactions Knowledge Data Engineering , vol.8 , Issue.6 , pp. 911-922
    • Cheung, D.W.-L.1    Ng, V.2    Fu, W.-C.3    Fu, Y.4
  • 50
    • 34748860516 scopus 로고    scopus 로고
    • I.-H. Harm, K.-L. Hui, T. Lee, and P. I.P.L., Online information privacy: Measuring the cost-benefit trade-off, in Proc. of the Twenty-Third International Conference on Information Systems(ICIS), Barcelona, Spain, December 2002.
    • I.-H. Harm, K.-L. Hui, T. Lee, and P. I.P.L., "Online information privacy: Measuring the cost-benefit trade-off," in Proc. of the Twenty-Third International Conference on Information Systems(ICIS), Barcelona, Spain, December 2002.
  • 51
    • 0008715899 scopus 로고    scopus 로고
    • Freebies and privacy: What net users think
    • Technical report, Opinion Research Corporation, no. 3, p, July
    • A. Westin, "Freebies and privacy: What net users think," Technical report, Opinion Research Corporation, vol. 4, no. 3, p. 26, July 1999.
    • (1999) , vol.4 , pp. 26
    • Westin, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.