Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/775047.775142acmconferencesArticle/Chapter ViewAbstractPublication PageskddConference Proceedingsconference-collections
Article

Privacy preserving association rule mining in vertically partitioned data

Published: 23 July 2002 Publication History

Abstract

Privacy considerations often constrain data mining projects. This paper addresses the problem of association rule mining where transactions are distributed across sources. Each site holds some attributes of each transaction, and the sites wish to collaborate to identify globally valid association rules. However, the sites must not reveal individual transaction data. We present a two-party algorithm for efficiently discovering frequent itemsets with minimum support levels, without either site revealing individual transaction values.

References

[1]
D. Agrawal and C. C. Aggarwal. On the design and quantification of privacy preserving data mining algorithms. In Proceedings of the Twentieth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, Santa Barbara, California, USA, May 21--23 2001. ACM.]]
[2]
R. Agrawal, T. Imielinski, and A. N. Swami. Mining association rules between sets of items in large databases. In P. Buneman and S. Jajodia, editors, Proceedings of the 1993 ACM SIGMOD International Conference on Management of Data, pages 207--216, Washington, D.C., May 26--28 1993.]]
[3]
R. Agrawal and R. Srikant. Fast algorithms for mining association rules. In Proceedings of the 20th International Conference on Very Large Data Bases, Santiago, Chile, Sept. 12--15 1994. VLDB.]]
[4]
R. Agrawal and R. Srikant. Privacy-preserving data mining. In Proceedings of the 2000 ACM SIGMOD Conference on Management of Data, Dallas, TX, May 14--19 2000. ACM.]]
[5]
P. Chan. An Extensible Meta-Learning Approach for Scalable and Accurate Inductive Learning. PhD thesis, Department of Computer Science, Columbia University, New York, NY, 1996. (Technical Report CUCS-044-96).]]
[6]
P. Chan. On the accuracy of meta-learning for scalable data mining. Journal of Intelligent Information Systems, 8:5--28, 1997.]]
[7]
R. Chen, K. Sivakumar, and H. Kargupta. Distributed web mining using bayesian networks from multiple data streams. In The 2001 IEEE International Conference on Data Mining. IEEE, Nov. 29 -- Dec. 2 2001.]]
[8]
D. W.-L. Cheung, V. Ng, A. W.-C. Fu, and Y. Fu. Efficient mining of association rules in distributed databases. Transactions on Knowledge and Data Engineering, 8(6):911--922, Dec. 1996.]]
[9]
W. Du and M. J. Atallah. Secure multi-party computation problems and their applications: A review and open problems. In Proceedings of the 2001 New Security Paradigms Workshop, Cloudcroft, New Mexico, Sept. 11--13 2001.]]
[10]
W. Du and M. J. Atallah. Secure multi-party computational geometry. In Proceedings of the Seventh International Workshop on Algorithms and Data Structures, Providence, Rhode Island, Aug. 8--10 2001.]]
[11]
Ford Motor Corporation. Corporate citizenship report. http://www.ford.com/en/ourCompany/community And Culture/buildingRelationships/strategicIssues/firestoneTireRecall.htm, May 2001.]]
[12]
O. Goldreich, S. Micali, and A. Wigderson. How to play any mental game - a completeness theorem for protocols with honest majority. In 19th ACM Symposium on the Theory of Computing, pages 218--229, 1987.]]
[13]
I. Ioannidis, A. Grama, and M. Atallah. A secure protocol for computing dot products in clustered and distributed environments. In The International Conference on Parallel Processing, Vancouver, Canada, Aug. 18--21 2002.]]
[14]
M. Kantarcioglu and C. Clifton. Privacy-preserving distributed mining of association rules on horizontally partitioned data. In The ACM SIGMOD Workshop on Research Issues on Data Mining and Knowledge Discovery (DMKD'02), June 2 2002.]]
[15]
Y. Lindell and B. Pinkas. Privacy preserving data mining. In Advances in Cryptology - CRYPTO 2000, pages 36--54. Springer-Verlag, Aug. 20--24 2000.]]
[16]
National Highway Traffic Safety Administration. Firestone tire recall. http://www.nhtsa.dot.gov/hot/Firestone/Index.html, May 2001.]]
[17]
A. Prodromidis, P. Chan, and S. Stolfo. Meta-learning in distributed data mining systems: Issues and approaches, chapter 3. AAAI/MIT Press, 2000.]]
[18]
S. J. Rizvi and J. R. Haritsa. Privacy-preserving association rule mining. In Proceedings of 28th International Conference on Very Large Data Bases. VLDB, Aug. 20--23 2002.]]
[19]
R. Wirth, M. Borth, and J. Hipp. When distribution is part of the semantics: A new problem class for distributed knowledge discovery. In Ubiquitous Data Mining for Mobile and Distributed Environments workshop associated with the Joint 12th European Conference on Machine Learning (ECML'0I) and 5th European Conference on Principles and Practice of Knowledge Discovery in Databases (PKDD'01), Freiburg, Germany, Sept. 3--7 2001.]]
[20]
A. C. Yao. How to generate and exchange secrets. In Proceedings of the 27th IEEE Symposium on Foundations of Computer Science, pages 162--167. IEEE, 1986.]]

Cited By

View all
  • (2024)High-Fidelity Synthetic Data Applications for Data AugmentationDeep Learning - Recent Findings and Researches [Working Title]10.5772/intechopen.113884Online publication date: 12-Jan-2024
  • (2024)A Study of Federated Learning with Internet of Things for Data Privacy and Security using Privacy Preserving TechniquesRecent Patents on Engineering10.2174/187221211766623011211025718:1Online publication date: Jan-2024
  • (2024)Fairness-Driven Private Collaborative Machine LearningACM Transactions on Intelligent Systems and Technology10.1145/363936815:2(1-30)Online publication date: 22-Feb-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
KDD '02: Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining
July 2002
719 pages
ISBN:158113567X
DOI:10.1145/775047
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 23 July 2002

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Conference

KDD02
Sponsor:

Acceptance Rates

KDD '02 Paper Acceptance Rate 44 of 307 submissions, 14%;
Overall Acceptance Rate 1,133 of 8,635 submissions, 13%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)53
  • Downloads (Last 6 weeks)6
Reflects downloads up to 16 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2024)High-Fidelity Synthetic Data Applications for Data AugmentationDeep Learning - Recent Findings and Researches [Working Title]10.5772/intechopen.113884Online publication date: 12-Jan-2024
  • (2024)A Study of Federated Learning with Internet of Things for Data Privacy and Security using Privacy Preserving TechniquesRecent Patents on Engineering10.2174/187221211766623011211025718:1Online publication date: Jan-2024
  • (2024)Fairness-Driven Private Collaborative Machine LearningACM Transactions on Intelligent Systems and Technology10.1145/363936815:2(1-30)Online publication date: 22-Feb-2024
  • (2024)Privacy and Robustness in Federated Learning: Attacks and DefensesIEEE Transactions on Neural Networks and Learning Systems10.1109/TNNLS.2022.321698135:7(8726-8746)Online publication date: Jul-2024
  • (2024)An Experimental Study on Federated Equi-JoinsIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2024.337502836:9(4443-4457)Online publication date: Sep-2024
  • (2024)Cloud-Edge–Terminal Collaboration-Enabled Device-Free Sensing Under Class-Imbalance ConditionsIEEE Internet of Things Journal10.1109/JIOT.2023.331294111:4(5980-5992)Online publication date: 15-Feb-2024
  • (2024)SiloFuse: Cross-silo Synthetic Data Generation with Latent Tabular Diffusion Models2024 IEEE 40th International Conference on Data Engineering (ICDE)10.1109/ICDE60146.2024.00016(110-123)Online publication date: 13-May-2024
  • (2024)VertiBayes: learning Bayesian network parameters from vertically partitioned data with missing valuesComplex & Intelligent Systems10.1007/s40747-024-01424-010:4(5317-5329)Online publication date: 25-Apr-2024
  • (2024)Privacy-preserving Apriori-based association rule mining over semantically secure encrypted cloud databasePeer-to-Peer Networking and Applications10.1007/s12083-024-01761-4Online publication date: 25-Sep-2024
  • (2024)EDNBC: A New Efficient Distributed Naive Bayes Classifier for Vertically Distributed DataModern Artificial Intelligence and Data Science 202410.1007/978-3-031-65038-3_38(475-488)Online publication date: 4-Oct-2024
  • Show More Cited By

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media