Privacy Preserving Distributed Data Mining

作者: Zhenmin Lin

DOI:

关键词: Information privacyData miningComputer scienceSecure multi-party computationPaillier cryptosystemIterative methodFast inverse square rootHomomorphic encryptionProtocol (science)Scheme (programming language)

摘要: OF DISSERTATION PRIVACY PRESERVING DISTRIBUTED DATA MINING Privacy preserving distributed data mining aims to design secure protocols which allow multiple parties conduct collaborative while protecting the privacy. My research focuses on and implementation of privacy two-party based homomorphic encryption. I present new results in this area, including for basic operations two fundamental protocols. propose a number additive secretsharing scheme derive relationship between secret its shares, with we develop e cient comparison division public divisor also inverse square root protocol Newton's iterative method hence solution problem. In addition, exponential Taylor series expansions. All these are implemented using multiplication can be used particular, tasks: linear regression EM clustering. Both work arbitrarily partitioned datasets. The is provably semi-honest model, clustering discloses only iterations. provide proof-of-concept C++, Paillier cryptosystem.

参考文章(38)
Hiranmayee Subramaniam, Rebecca N. Wright, Zhiqiang Yang, Experimental Analysis of a Privacy-Preserving Scalar Product Protocol ∗ Computer Systems: Science & Engineering. ,vol. 21, ,(2006)
Ramakrishnan Srikant, Rakesh Agrawal, Fast Algorithms for Mining Association Rules in Large Databases very large data bases. pp. 487- 499 ,(1994)
Yehuda Lindell, Benny Pinkas, Privacy Preserving Data Mining international cryptology conference. pp. 36- 54 ,(2000) , 10.1007/3-540-44598-6_3
Philip K. Chan, Salvatore J. Stolfo, On the Accuracy of Meta-learning for Scalable Data Mining intelligent information systems. ,vol. 8, pp. 5- 28 ,(1997) , 10.1023/A:1008640732416
Usama M. Fayyad, Paul S. Bradley, Refining Initial Points for K-Means Clustering international conference on machine learning. pp. 91- 99 ,(1998)
Takashi Nishide, Kazuo Ohta, Multiparty computation for interval, equality, and comparison without bit-decomposition protocol public key cryptography. ,vol. 343, pp. 343- 360 ,(2007) , 10.1007/978-3-540-71677-8_23
Xiaodong Lin, Chris Clifton, Michael Zhu, Privacy-preserving clustering with distributed EM mixture modeling Knowledge and Information Systems. ,vol. 8, pp. 68- 81 ,(2005) , 10.1007/S10115-004-0148-7
M.J. Zaki, Parallel and distributed association mining: a survey IEEE Concurrency. ,vol. 7, pp. 14- 25 ,(1999) , 10.1109/4434.806975
Ankur Bansal, Tingting Chen, Sheng Zhong, Privacy preserving Back-propagation neural network learning over arbitrarily partitioned data Neural Computing and Applications. ,vol. 20, pp. 143- 150 ,(2011) , 10.1007/S00521-010-0346-Z