Advertisement

Privacy Preserving Association Rule Mining in Horizontally Partitioned Databases Without Involving Trusted Third Party (TTP)

Conference paper
Part of the Smart Innovation, Systems and Technologies book series (SIST, volume 44)

Abstract

In this research work, we design a security protocol that derives association rules securely from the horizontally distributed databases without a trusted third party (TTP), even communication channel is unsecured between involving sites. It ensures privacy and security of owner’s with the help of elliptic curve based Diffie-Hellman and Digital Signature Algorithm.

Keywords

Distributed association rule Privacy Elliptic curve cryptography 

References

  1. 1.
    Kantarcioglu, M., Clifton, C.: Privacy-preserving distributed mining of association rules on horizontally partitioned data. Trans. Knowl. Data Eng. 16, 1026–1037 (2004)CrossRefGoogle Scholar
  2. 2.
    Modi, C., Rao, U.P., Patel, D.R.: A survey on preserving for sensitive association rules in databases. In: Recent Trends in Business Administration and Information Processing, pp. 538–544 (2010)Google Scholar
  3. 3.
    Modi, C.N., Rao, U.P., Patel, D.R.: Maintaining and in privacy preserving association rule. In: International Conference on Computing, Communication and Networking Technologies, pp. 1–6 (2010)Google Scholar
  4. 4.
    Vaidya, J., Clifton, C.: Privacy preserving association rule mining in vertically partitioned data. In: ACM SIGKDD Conference on Knowledge Discovery and Data Mining, pp. 639–644 (2002)Google Scholar
  5. 5.
    Liu, J., Piao, X., Huang, S.: A privacy-preserving mining algorithm of association rules in distributed databases. In: IMSCCS 2, 746–750 (2006)Google Scholar
  6. 6.
    Mathews, M.T., Manju, E.V.: Extended distributed rk—secure sum protocol in apriori algorithm for privacy preserving. Int. J. Res. Eng. Adv. Technol. 2(1), 1–5 (2014)Google Scholar
  7. 7.
    Chaturvedi, G.K., Gawande, R.M.: Privacy preserving association rules mining in horizontally distributed databases using FDM and K and C algorithm. Int. J. Eng. Dev. Res. 2(3), 3334–3337 (2014)Google Scholar
  8. 8.
    Muthu Lakshmi, N.V., Rani, K.S.: Privacy preserving association rule mining without trusted party for horizontally partitioned databases. Int. J. Data Min. Knowl. Manage. Process 2(2), 17–29 (2012)CrossRefGoogle Scholar
  9. 9.
    Borhade, S.S., Shinde, B.B.: Privacy preserving data mining using association rule with condensation approach. Int. J. Comput. Sci. Inf. Technol. 5(2), 1560–1563 (2014)Google Scholar
  10. 10.
    Wahab, O.A., Hachami, M.O., Zaffari, A., Vivas, M., Dagher, G.G.: DARM: a privacy-preserving approach for distributed association rules mining on horizontally-partitioned data. In: 18th International Database Engineering and Applications Symposium, pp. 1–8 (2014)Google Scholar
  11. 11.
    Koblitz, N.: Elliptic curve cryptosystems. Math. Comput. 48, 203–209 (1987)MathSciNetCrossRefMATHGoogle Scholar
  12. 12.
    Han, J., Kamber, M.: Data Mining: Concepts and Techniques. Morgan Kaufmann Publishers Inc., San Francisco (2001)Google Scholar

Copyright information

© Springer India 2016

Authors and Affiliations

  1. 1.National Institute of Technology GoaFarmagudiIndia
  2. 2.National Institute of TechnologySuratIndia

Personalised recommendations