Author : Nikhil Puri 1
Date of Publication :7th April 2016
Abstract: This paper presents secure mining of association rules in horizontally distributed databases by proposing a protocol. This protocol is made up of the Fast Distributed Mining (FDM) algorithm which is consist of unsecured version of the Apriori algorithm. Our protocol made up of two novel secure multi-party algorithms — one that calculates the unions of private subsets that each of the interacting players hold, and another that tests the inclusion of an element held by one player in a subset held by another. The main merit of our protocol is to provide privacy with respect to the protocol. It is also useful in terms of simplicity and is also significantly more efficient in terms of communication rounds, communication cost and computational cost.
Reference :
-
- R.Agrawal and R.Srikant, “Fast algorithms for mining association rules in large databases,” In VLDB, pages 487– 499, 1994.
- D.Beaver, S. Micali, and P.Rogaway, “The round complexity of secure protocols,” In STOC, pages 503–513, 1990.
- M.Bellare, R. Canetti, and H. Krawczyk, “Keying hash functions for message authentication,” In Crypto, pages 1– 15, 1996.
- A. Ben-David, N. Nisan, and B. Pinkas, “FairplayMP - A system for secure multi-party computation” In CCS, pages 257–266, 2008.
- J.Brickell and V.Shmatikov, “Privacy-preserving graph algorithms in the semi-honest model,” In ASIACRYPT, pages 236–252, 2005.
- Rajkumar.S, V.Elavaras, “A fast distributed algorithm for mining association rules,” In PDIS, pages 31–42, 1996
- Tamir Tassa, D.W.L Cheung, V.T.Y. Ng, A.W.C. Fu, and Y. Fu., “Efficient mining of association rules in distributed databases,” IEEE Trans. Knowl. Data Eng., 8(6):911–922, 1996
- S.Pavithra, P.Prasanna, “A novel secure multiparty algorithms in horizontally distributed database for fast distributed database,” 24:106–110, 1978.
- Bollu Jyothi, K.Venkateswara Rao, “Secure Mining of Association Rules in Horizontally Distributed Databases” (Protecting Sensitive Labels in Social Network Data Anonymization) pages 639–644, 2002.
- N.Kowsalya, M. Saraswath, “Privacy Preserving and Secure Mining of Association Rules in Distributed Data Base,” pages 139–147, 2005.