TY - GEN
T1 - A distributed privacy-preserving association rules mining scheme using frequent-pattern tree
AU - Su, Chunhua
AU - Sakurai, Kouichi
PY - 2008/12/1
Y1 - 2008/12/1
N2 - Association rules mining is a frequently used technique which finds interesting association and correlation relationships among large set of data items which occur frequently together. Nowadays, data collection is ubiquitous in social and business areas. Many companies and organizations want to do the collaborative association rules mining to get the joint benefits. However, the sensitive information leakage is a problem we have to solve and privacy-preserving techniques are strongly needed. In this paper, we focus on the privacy issue of the association rules mining and propose a secure frequent-pattern tree (FP-tree) based scheme to preserve private information while doing the collaborative association rules mining. We show that our scheme is secure and collusion-resistant for n parties, which means that even if n - 1 dishonest parties collude with a dishonest data miner in an attempt to learn the associations rules between honest respondents and their responses, they will be unable to success.
AB - Association rules mining is a frequently used technique which finds interesting association and correlation relationships among large set of data items which occur frequently together. Nowadays, data collection is ubiquitous in social and business areas. Many companies and organizations want to do the collaborative association rules mining to get the joint benefits. However, the sensitive information leakage is a problem we have to solve and privacy-preserving techniques are strongly needed. In this paper, we focus on the privacy issue of the association rules mining and propose a secure frequent-pattern tree (FP-tree) based scheme to preserve private information while doing the collaborative association rules mining. We show that our scheme is secure and collusion-resistant for n parties, which means that even if n - 1 dishonest parties collude with a dishonest data miner in an attempt to learn the associations rules between honest respondents and their responses, they will be unable to success.
UR - http://www.scopus.com/inward/record.url?scp=68849114362&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=68849114362&partnerID=8YFLogxK
U2 - 10.1007/978-3-540-88192-6-17
DO - 10.1007/978-3-540-88192-6-17
M3 - Conference contribution
AN - SCOPUS:68849114362
SN - 3540881913
SN - 9783540881919
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 170
EP - 181
BT - Advanced Data Mining and Applications - 4th International Conference, ADMA 2008, Proceedings
T2 - 4th International Conference on Advanced Data Mining and Applications, ADMA 2008
Y2 - 8 October 2008 through 10 October 2008
ER -