Optimized Two Party Privacy Preserving Association Rule Mining Using Fully Homomorphic Encryption
نویسندگان
چکیده
In two party privacy preserving association rule mining, the issue to securely compare two integers is considered as the bottle neck to achieve maximum privacy. Recently proposed fully homomorphic encryption (FHE) scheme by Dijk et.al. can be applied in secure computation. Kaosar, Paulet and Yi have applied it in preserving privacy in two-party association rule mining, but its performance is not very practical due to its huge cyphertext, public key size and complex carry circuit. In this paper we propose some optimizations in applying Dijk et.al.’s encryption system to securely compare two numbers. We also applied this optimized solution in preserving privacy in association rule mining (ARM) in two-party settings. We have further enhanced the two party secure association rule mining technique proposed by Kaosar et.al. The performance analysis shows that this proposed solution achieves a significant improvement.
منابع مشابه
Secure Two-Party Association Rule Mining
Association rule mining algorithm provides a means for determining rules and patterns from a large collection of data. However, when two sites want to engage in an association rule mining, data privacy concerns are raised. These concerns include loosing a competitive edge in the market place and breaching privacy laws. Techniques that have addressed this problem are data perturbation and homomo...
متن کاملProtocol Design for Privacy-Preserving Data Mining Using Partial Homomorphic Encryption
With the advance of computing power, data mining techniques can extract useful information from large amount of data. In 2012, 2.5 quintillion bytes of data (1 follow 18 zeroes) are created every day. Data privacy is of utmost concern for distributed data mining across multiple parties, which may be competitors. In this thesis, we focus on the privacy preserving techniques in distributed data m...
متن کاملA Secure Multiparty Product Protocol for Preserving the Privacy in Collaborative Data Mining
In the modern business world, collaborative data mining becomes especially important because of the mutual benefit it brings to the collaborators. During the collaboration, each party of the collaboration needs to share its data with other parties. If the parties don't care about their data privacy, the collaboration can be easily achieved. Privacy concerns parties, each having a private data s...
متن کاملSecure Outsourced Association Rule Mining using Homomorphic Encryption
Several techniques are used in data analysis, where frequent itemset mining and association rule mining are very popular among them. The motivation for ‘Data Mining as a Service’ (DMaaS) paradigm is that when the data owners are not capable of doing mining tasks internally they have to outsource the mining work to a trusted third party. Multiple data owners can also collaboratively mine by comb...
متن کاملPrivacy-Preserving Clustering Using Representatives over Arbitrarily Partitioned Data∗
The challenge in privacy-preserving data mining is avoiding the invasion of personal data privacy. Secure computation provides a solution to this problem. With the development of this technique, fully homomorphic encryption has been realized after decades of research; this encryption enables the computing and obtaining results via encrypted data without accessing any plaintext or private key in...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2011