An Overview of Secure Mining of Association Rules in Horizontally Distributed Databases
Keywords:
Privacy Preserving Data Mining, Distributed Computation, Frequent Item sets, Association RulesAbstract
In this paper, propose a protocol for secure mining of association rules in horizontally distributed databases. Now a day the current leading protocol is Kantarcioglu and Clifton. This protocol is based on the Fast Distributed Mining (FDM) algorithm which is an unsecured distributed version of the Apriori algorithm. The main ingredients in this protocol are two novel secure multi-party algorithms 1. That computes the union of private subsets that each of the interacting players hold, and 2. Tests the inclusion of an element held by one player in a subset held by another. In this protocol offers enhanced privacy with respect to the other one. Differences in this protocol, it is simpler and is significantly more efficient in terms of communication rounds, communication cost and computational cost [1]
References
. Tamir Tassa, "Secure Mining of Association Rules in Horizontally Distributed Databases."201
. Jump up to: a b O'Brien, J. & Marakas, G.M. (2008) Management Information Systems (pp. 35-39). New York, NY: McGraw-Hill Irwin.
. M. Kantarcioglu and C. Clifton. Privacypreserving distributed mining of association rules on horizontally partitioned data. IEEE Transactions on Knowledge and Data Engineering, 16:1026-1037, 2004.
. T. Tassa and D. Cohen. Anonymization of centralized and distributed social networks by sequential clustering. IEEE Transactions on Knowledge and Data Engineering, 2012.
. T. Tassa and D. Cohen. Anonymization of centralized and distributed social networks by sequential clustering. IEEE Transactions on Knowledge and Data Engineering, 2012.
. J. Vaidya and C. Clifton. Privacy preserving association rule mining in vertically partitioned data. In KDD, pages 639-644, 2002.
. S. Zhong, Z. Yang, and R.N. Wright. Privacyenhancing kanonymization of customer data. In PODS, pages 139-147, 2005.
. David W. Cheungt Jiawei Hans Vincent T. NgttAda W. Fuss Yongjian FuI. "A Fast Distributed Algorithm for Mining Association Rules".
. Shikha Sharma, Prof. Pooja Jain, " A Novel Data Mining Approach for Information Hiding".
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2014 COMPUSOFT: An International Journal of Advanced Computer Technology
This work is licensed under a Creative Commons Attribution 4.0 International License.
©2023. COMPUSOFT: AN INTERNATIONAL OF ADVANCED COMPUTER TECHNOLOGY by COMPUSOFT PUBLICATION is licensed under a Creative Commons Attribution 4.0 International License. Based on a work at COMPUSOFT: AN INTERNATIONAL OF ADVANCED COMPUTER TECHNOLOGY. Permissions beyond the scope of this license may be available at Creative Commons Attribution 4.0 International Public License.