Skip to main content

Using Cryptography for Privacy Protection in Data Mining Systems

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 4845))

Abstract

To conduct data mining including mining on the web data, we often need to collect data from various parties. Privacy concerns may prevent the parties from directly sharing the data and some types of information about the data. How multiple parties collaboratively conduct data mining without breaching data privacy presents a challenge. In this paper, we present a solution for privacy-preserving k-Medoids clustering which is one of data mining tasks. The solution is based on the cryptography technology.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Agrawal, D., Aggarwal, C.: On the design and quantification of privacy preserving data mining algorithms. In: Proceedings of the Twenti- eth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, Santa Barbara, CA, May 21-23, pp. 247–255. ACM Press, New York (2001)

    Chapter  Google Scholar 

  2. Agrawal, R., Srikant, R.: Privacy-preserving data mining. In: Proceedings of the ACM SIGMOD Conference on Management of Data, pp. 439–450. ACM Press, New York (2000)

    Chapter  Google Scholar 

  3. Berkhin, P.: Survey of clustering data mining techniques. Technical report, Accrue Software, San Jose, CA (2002)

    Google Scholar 

  4. Chaum, D.: Security without identification. Communication of the ACM 28(10), 1030–1044 (1985)

    Article  Google Scholar 

  5. Du, W., Zhan, Z.: Building decision tree classifier on private data. In: IEEE Intertional Workshop on Privacy, Security, and Data Mining, Maebashi City, Japan, December 9, IEEE Computer Society Press, Los Alamitos (2002)

    Google Scholar 

  6. Du, W., Zhan, Z.: Using randomized response techniques for privacy-preserving data mining. In: Proceedings of The 9th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, August 24 - 27, ACM Press, New York (2003)

    Google Scholar 

  7. Epic. Privacy and human rights an international survey of privacy laws and developments. In: Electronic Privacy Information Center (May 2003), http://www.epic.org

  8. Evfimievski, A., Gehrke, J.E., Srikant, R.: Limiting privacy breaches in privacy preserving data mining. In: Proceedings of the 22nd ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems (PODS 2003), San Diego, CA, ACM Press, New York (2003)

    Google Scholar 

  9. Evfmievski, A., Srikant, R., Agrawal, R., Gehrke, J.: Privacy preserving mining of association rules. In: Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Edmonton, Alberta, Canada, July 23-26, pp. 217–228. ACM Press, New York (2002)

    Chapter  Google Scholar 

  10. Goldreich, O.: Secure multi-party computation (working draft) (1998), http://www.wisdom.weizmann.ac.il/home/oded/public_html/foc.html

  11. Goldreich, O.: The foundations of cryptography, vol. 2. Cambridge University Press, Cambridge (2004)

    Google Scholar 

  12. Han, J., Kamber, M.: Data Mining: Concepts and Techniques. Morgan Kaufmann, San Francisco (2000)

    Google Scholar 

  13. Kantarcioglu, M., Clifton, C.: Privacy-preserving distributed mining of association rules on horizontally partitioned data. In: DMK 2002. The ACM SIGMOD Workshop on Research Issues on Data Mining and Knowledge Discovery, Madison, WI, pp. 24–31. ACM Press, New York (2002)

    Google Scholar 

  14. Kargupta, H., Datta, S., Wang, Q., Sivakumar, K.: On the privacy preserving properties of random data perturbation techniques. In: ICDM 2003. Proceedings of the Third IEEE International Conference on Data Mining, Melbourne, FL, November 19-22, IEEE Computer Society Press, Los Alamitos (2003)

    Google Scholar 

  15. Kaufman, L., Rousseeuw, P.: Finding groups in data. Wiley, New York (1990)

    Google Scholar 

  16. Lin, X., Clifton, C., Zhu, M.: Privacy preserving clustering with distributed em mixture modeling. In: Knowledge and Information Systems (2004)

    Google Scholar 

  17. Lindell, Y., Pinkas, B.: Privacy preserving data mining. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  18. Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223–238. Springer, Heidelberg (1999)

    Google Scholar 

  19. Rivest, R., Adleman, L., Dertouzos, M.: On data banks and privacy homomorphisms. In: DeMillo, R.A., et al. (eds.) Foundations of Secure Computation, pp. 169–179. Academic Press, London (1978)

    Google Scholar 

  20. Rizvi, S., Haritsa, J.: Maintaining data privacy in association rule mining. In: Proceedings of the 28th VLDB Conference, Hong Kong, China (2002)

    Google Scholar 

  21. Vaidya, J., Clifton, C.: Privacy preserving association rule mining in vertically partitioned data. In: Proceedings of the 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Edmonton, Alberta, Canada, July 23-26, ACM Press, New York (2002)

    Google Scholar 

  22. Vaidya, J., Clifton, C.: Privacy-preserving decision trees over vertically partitioned data. In: 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security Nathan Hale Inn, University of Connecticut, Storrs, CT, U.S.A (August 7-10, 2005)

    Google Scholar 

  23. Vaidya, J., Clifton, C.W.: Privacy preserving k-means clustering over vertically partitioned data. In: Proceedings of the 9th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, August 24-27, ACM Press, New York (2003)

    Google Scholar 

  24. Weight, J.: Ensuring trust in the electronic health record. In: Electronic Health Information and Privacy Conference, Ottawa, Canada (2005)

    Google Scholar 

  25. Wright, R., Yang, Z.: Privacy-preserving bayesian network structure computation on distributed heterogeneous data. In: Proceedings of the 10th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD), ACM Press, New York (2004)

    Google Scholar 

  26. Yao, A.C.: Protocols for secure computations. In: Proceedings of the 23rd Annual IEEE Symposium on Foundations of Computer Science, IEEE Computer Society Press, Los Alamitos (1982)

    Google Scholar 

  27. Zhan, J.: Privacy Preserving Collaborative Data Mining. PhD thesis, Department of Computer Science, University of Ottawa (2006)

    Google Scholar 

  28. Zhan, J., Matwin, S.: A crypto-based approach to privacy preserving collaborative data mining. In: Workshop on Privacy Aspect of Data Mining (PADM 2006) in conjunction with the IEEE International Conference on Data Mining (ICDM 2006), HongKong, December 1, IEEE Computer Society Press, Los Alamitos (2006)

    Google Scholar 

  29. Zhan, J., Matwin, S., Chang, L.: Privacy-preserving collaborative association rule mining. In: 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Nathan Hale Inn, University of Connecticut, Storrs, CT, U.S.A (August 7-10, 2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Ning Zhong Jiming Liu Yiyu Yao Jinglong Wu Shengfu Lu Kuncheng Li

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zhan, J. (2007). Using Cryptography for Privacy Protection in Data Mining Systems. In: Zhong, N., Liu, J., Yao, Y., Wu, J., Lu, S., Li, K. (eds) Web Intelligence Meets Brain Informatics. WImBI 2006. Lecture Notes in Computer Science(), vol 4845. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-77028-2_29

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-77028-2_29

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-77027-5

  • Online ISBN: 978-3-540-77028-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics