Volume 1, Issue 1, July 2013, Page: 1-6
To Allot Secrecy-Safe Association Rules Mining Schema Using FP Tree
S. Suresh, Sri Venkateswara College of Engineering, Chennai
S. Uvaraj, Arulmigu Meenakshi Amman College of Engineering, Kanchipuram
N. Kannaiya Raja, Defence Engineering College, Ethiopia
Received: Jun. 1, 2013;       Published: Jun. 20, 2013
DOI: 10.11648/j.se.20130101.11      View  2981      Downloads  100
Abstract
Association rules mining is a frequently used technique which finds interesting association and correlation relationships among large set of data items which occur frequently together. Nowadays, data collection is ubiquitous in social and business areas. Many companies and organi¬zations want to do the collaborative association rules mining to get the joint benefits. However, the sensitive information leakage is a problem we have to solve and privacy- preserving techniques are strongly needed. In this paper, we focus on the privacy issue of the association rules mining and propose a secure frequent-pattern tree (FP-tree) based scheme to pre- serve private information while doing the collaborative association rules mining. We display that our schema is secure and collusion-resistant for n parties, which means that even if n - 1 dishonest party collude with a dishonest data miner in an attempt to learn the associations’ rules between honest respondents and their responses, they will be unable to success.
Keywords
Association Rules, Privacy-Preserving, Cryptographic Protocol
To cite this article
S. Suresh, S. Uvaraj, N. Kannaiya Raja, To Allot Secrecy-Safe Association Rules Mining Schema Using FP Tree, Software Engineering. Vol. 1, No. 1, 2013, pp. 1-6. doi: 10.11648/j.se.20130101.11
Reference
[1]
Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game. In: Proceedings of the 19th annual ACM symposium on Theory of computing (1987)
[2]
Han, J., Pei, J., Yin, Y., Mao, R.: Mining Frequent Patterns without Candidate Generation: A Frequent-Pattern Tree Approach. Data Mining and Knowledge Discovery, 53–87 (2004)
[3]
Kantarcioglu, M., Clifton, C.: Privacy-Preserving Distributed Mining of association rules on horizontally partitioned data. In: Proceedings of the ACM SIGMOD Workshop on Research Issues on Data Mining and Knowledge Discovery (2002)
[4]
Lindell, Y., Pinkas, B.: Privacy preserving data mining. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 36–54. Springer, Heidelberg (2000)
[5]
Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592. Springer, Heidelberg (1999)
[6]
Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)
[7]
Vaidya, J.S., Clifton, C.: Privacy Preserving Association Rule Mining in Vertically Partitioned Data. In: Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (2002)
[8]
Yao, A.C.: Protocols for Secure Computation. In: 23rd FOCS (1982)
[9]
Zhan, J.Z., Matwin, S., Chang, L.: Privacy-Preserving Collaborative Association Rule Mining. In: Procceding of DBSec 2005, pp. 153–165 (2005)
[10]
Freedman, M., Nissim, K., Pinkas, B.: Efficient Private Matching and Set Intersection. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 1–19. Springer, Heidelberg (2004)
[11]
Agrawal, R., Imielinski, T., Swami, A.N.: Mining association rules between sets of items in large databases. In: Proceedings of the ACM SIGMOD International Conference on Management of Data (1993)
[12]
Agrawal, R., Srikant, R.: Privacy-Preserving Data Mining. In: ACM SIGMOD Int’l Conf. on Management of Data, Dallas (May 2000)
[13]
Evfimievski, A., Srikant, R., Agrawal, R., Gehrke, J.: Privacy Preserving Mining of Association Rules. In: Proc. of 8th ACM SIGKDD Intl. Conf. on Knowledge Discovery and Data Mining (KDD) (2002)
[14]
Feldman, P.: A practical scheme for non-interactive verifiable secret sharing. In: Proc. of FOCS, pp. 427–437 (1987)
[15]
Fukazawa, T.,Wang, J., Takata, T., Miyazak, M.: An Effective Distributed Privacy- Preserving Data Mining Algorithm. In: Fifth International Conference on Intelligent Data Engineering and Automated Learning, UK (2004)
[16]
Goldreich, O.: Foundations of Cryptography, vol. 2, ch.7. Cambridge Univ. Press, Cambridge (2004)
Browse journals by subject