SZ Alborzi
Privacy preserving mining of association rules on horizontally
distributed databases
Alborzi, SZ; Raji, F; Saraee, MH
Abstract
These protocols are based on two main approaches named as: the Randomization approach and the Cryptographic approach. The first one is based on perturbation of the valuable information while the second one uses cryptographic techniques. The randomization approach is much more efficient with reduced accuracy while the cryptographic approach can provide solutions with perfect accuracy. However, the cryptographic approach is a much slower method and requires considerable computation and communication overhead. In this paper, a new protocol is proposed which combines the advantages of the two previous approaches to perform privacy preserving in distributed mining of association rules. Both the privacy and performance characteristics of the proposed protocol are studied and compared with the randomization and cryptographic approaches. The approach introduced in this paper has great advantages, such as higher flexibility and resistance against conspiracy, over the similar methods.
Citation
distributed databases. Presented at International Conference on Software and Computer Applications ICSCA 2012, Singapore
Presentation Conference Type | Other |
---|---|
Conference Name | International Conference on Software and Computer Applications ICSCA 2012 |
Conference Location | Singapore |
Start Date | Jun 9, 2012 |
End Date | Jun 10, 2012 |
Publication Date | Jan 1, 2012 |
Deposit Date | Jul 12, 2017 |
Publisher URL | http://ipcsit.com/list-85-1.html www.icsca.org |
Related Public URLs | http://ipcsit.com/ |
Additional Information | Event Type : Conference |
You might also like
Features in extractive supervised single-document summarization: case of Persian news
(2024)
Journal Article
Deriving Environmental Risk Profiles for Autonomous Vehicles From Simulated Trips
(2023)
Journal Article
DeepClean : a robust deep learning technique for autonomous vehicle camera data privacy
(2022)
Journal Article
Machine learning-based optimized link state routing protocol for D2D communication in 5G/B5G
(2022)
Presentation / Conference
Downloadable Citations
About USIR
Administrator e-mail: library-research@salford.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2025
Advanced Search