PUMA
Istituto di Scienza e Tecnologie dell'Informazione     
Jiang W., Atzori M. Secure distributed k-Anonymous pattern mining. In: International Conference on Data Mining, ICDM'06 (Hong Kong, 18-22 December 2006). Proceedings, pp. 319 - 329. IEEE Computer Society, 2006.
 
 
Abstract
(English)
Privacy-Preserving Data Mining is an important area that studies privacy issues of data mining. When the goal is to share data mining results, two privacy-related problems may arise. The first one is how to compute the data-mining results among several parties without sharing the data. Cryptography-based primitives are the basic tool used to develop ad-hoc secure multi-party computation protocols that share information as less as possible during the computation under different adversary models. The second one is how to produce data mining results that provably do not contain threats to the anonymity of individuals. The concept of k-anonymity has been used to discover anonymity-preserving frequent patterns, and centralized algorithms have been developed. In this paper and for the first time, we study how to produce anonymity-preserving data mining results in a distributed environment. We present two privacy-preserving strategies and show their feasibility through experimental analysis.
URL: http://ieeexplore.ieee.org/iel5/4053012/4053013/04053059.pdf?tp=&arnumber=4053059&isnumber=4053013
Subject Privacy
H.2.8 Database Applications. Data Mining


Icona documento 1) Download Document PDF


Icona documento Open access Icona documento Restricted Icona documento Private

 


Per ulteriori informazioni, contattare: Librarian http://puma.isti.cnr.it

Valid HTML 4.0 Transitional