Skip to main content

Research Repository

Advanced Search

Privacy preserving mining of association rules on horizontally
distributed databases

Alborzi, SZ; Raji, F; Saraee, MH

Authors

SZ Alborzi

F Raji



Abstract

These protocols are based on two main approaches named as: the Randomization approach and the Cryptographic approach. The first one is based on perturbation of the valuable information while the second one uses cryptographic techniques. The randomization approach is much more efficient with reduced accuracy while the cryptographic approach can provide solutions with perfect accuracy. However, the cryptographic approach is a much slower method and requires considerable computation and communication overhead. In this paper, a new protocol is proposed which combines the advantages of the two previous approaches to perform privacy preserving in distributed mining of association rules. Both the privacy and performance characteristics of the proposed protocol are studied and compared with the randomization and cryptographic approaches. The approach introduced in this paper has great advantages, such as higher flexibility and resistance against conspiracy, over the similar methods.

Citation

distributed databases. Presented at International Conference on Software and Computer Applications ICSCA 2012, Singapore

Presentation Conference Type Other
Conference Name International Conference on Software and Computer Applications ICSCA 2012
Conference Location Singapore
Start Date Jun 9, 2012
End Date Jun 10, 2012
Publication Date Jan 1, 2012
Deposit Date Jul 12, 2017
Publisher URL http://ipcsit.com/list-85-1.html www.icsca.org
Related Public URLs http://ipcsit.com/
Additional Information Event Type : Conference