skip to main content
10.1145/1651415.1651420acmconferencesArticle/Chapter ViewAbstractPublication PagescikmConference Proceedingsconference-collections
short-paper

A more well-founded security proof of the privacy-preserving distributed mining of association rules protocols

Published:06 November 2009Publication History

ABSTRACT

Privacy-preserving data mining aims at discovering beneficial information from a large amount of data without violating the privacy policy. Privacy-preserving association rules mining research has already generated many interesting results. Based on commutative encryptions and the Secure Multi-party Computation (SMC) theory, Kantarcioglu and Clifton [1] propose two protocols to implement privacy-preserving mining of association rules over horizontally partitioned data. The paper addresses its incorrect security proof and introduces a more well-founded proof. This paper also identifies several other errors in [1]. This kind of protocols and their proof are a concrete application of Secure Multi-party Computation, which is be of great significances to the privacy-preserving data mining studies based on SMC. Thus establishment of the correct proof methodology is important. This paper demonstrates the correct proof methodology by correcting the fault proof in [1]

References

  1. M. Kantarcioglu, C. Clifton. Privacy-preserving Distributed Mining of Association Rules on Horizontally Partitioned Data. IEEE Trans. Knowledge and Data Engineering. (16)9,1026--1037(2004) Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. J. Vaidya, C. Clifton and M. Zhu: Privacy Preserving Data Mining (Advances in Information Security. Springer-Verlag New York Inc(2005) Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. V. S. Verykios, E. Bertino, I. N. Fovino, L.P. Provenza, Y. Saygin and Y. Theodoridis. State-of-the-art in privacy preserving data mining. SIGMOD Record, (33)1, 50--57(2004) Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. O. Goldreich. Foundations of Cryptography: Volume 2,Basic Applications. Cambridge University Press, (2004) Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. M. Bellare, P. Rogaway. Random Oracles are Practical: A Paradigm for Designing Efficient Protocols. In: ACM Conf. Computer and Communications Security, pp 62--73,(1993) Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. R. Agrawal, A. Evfimievski, and R. Srikant. Information sharing across private databases. In: Proc. ACM SIGMOD Int'l Conf. Management of Data, pp. 86--97, (2003) Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. D. Boneh. The Decision Diffie-Hellman Problem. In: Proc. Third Algorithmic Number Theory Symp., LNCS 1423, pp 48--63, (1998) Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. J. Vaidya, Chris Clifton. Secure set intersection cardinality with application to association rule mining. Journal of Computer Security, (13)4, 593--622(2005) Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. A more well-founded security proof of the privacy-preserving distributed mining of association rules protocols

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          MoSE+DQS '09: Proceedings of the first international workshop on Model driven service engineering and data quality and security
          November 2009
          74 pages
          ISBN:9781605588162
          DOI:10.1145/1651415

          Copyright © 2009 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 6 November 2009

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • short-paper

          Upcoming Conference

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader