skip to main content
10.1145/2628194.2628206acmotherconferencesArticle/Chapter ViewAbstractPublication PagesideasConference Proceedingsconference-collections
research-article

DARM: a privacy-preserving approach for distributed association rules mining on horizontally-partitioned data

Published:07 July 2014Publication History

ABSTRACT

Extracting association rules helps data owners to unveil hidden patterns from their data for the purpose of analyzing and predicting the behavior of their clients. However, mining association rules in a distributed environment is not a trivial task due to privacy concerns. Data owners are interested in collaborating with each other to mine association rules on a global level; however, they are concerned that sensitive information related to the individuals involved in their database might get compromised during the mining process. In this paper, we formulate and address the problem of answering association rules queries in a distributed environment such that the mining process is confidential and the results are differentially private. We propose a privacy-preserving distributed association rules mining approach, named DARM, where global strong association rules are determined in a confidential way, and the results returned satisfy ε-differential privacy. We conduct our experiments on real-life data, and show that our approach can efficiently answer association rules queries and is scalable with increasing data records.

References

  1. R. Agrawal and J. C. Shafer. Parallel mining of association rules. IEEE Transactions on Knowledge and Data Engineering, 8(6):962--969, Dec. 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. G. Alonso, F. Casati, H. Kuno, and V. Machiraju. Web Services: Concepts, Architectures and Applications. Springer, 1st edition, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. A. Anitha, G. R. Suhanantham, and N. Krishnan. An efficient association rule mining model for distributed databases. International Journal of Computer Science and Technology, 3(1):794--797, 2002.Google ScholarGoogle Scholar
  4. M. Arafati, G. G. Dagher, B. C. M. Fung, and P. C. K. Hung. D-mash: A framework for privacy-preserving data-as-a-service mashups. In Proceedings of the 8th IEEE International Conference on Cloud Computing (CLOUD), June 2014.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. M. Z. Ashrafi, D. Taniar, and K. Smith. Odam: an optimized distributed association rule mining algorithm. IEEE Distributed Systems Online, 5, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. K. Bache and M. Lichman. Uci machine learning repository. University of California, Irvine, School of Information and Computer Sciences, 2013.Google ScholarGoogle Scholar
  7. D. W. Cheung, J. Han, V. T. Ng, A. W. Fu, and Y. Fu. A fast distributed algorithm for mining association rules. In Proceedings of the 4th International Conference on on Parallel and Distributed Information Systems (DIS), pages 31--43, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. J. L. Dautrich, Jr. and C. V. Ravishankar. Compromising privacy in precise query protocols. In Proceedings of the 16th International Conference on Extending Database Technology (EDBT), pages 155--166, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. B. C. M. Fung, K. Wang, A. W.-C. Fu, and P. S. Yu. Introduction to Privacy-Preserving Data Publishing: Concepts and Techniques. Data Mining and Knowledge Discovery. August 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. B. C. M. Fung, K. Wang, and P. S. Yu. Anonymizing classification data for privacy preservation. IEEE Transactions on Knowledge and Data Engineering (TKDE), 19(5):711--725, May 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. F. Giannotti, L. Lakshmanan, A. Monreale, D. Pedreschi, and H. Wang. Privacy-preserving mining of association rules from outsourced transaction databases. IEEE Systems Journal, 7(3):385--395, Sept 2013.Google ScholarGoogle ScholarCross RefCross Ref
  12. P. Gurunathan, N. Ishwarya, V. Sridevi, C. Nandhini, and S. Deepalakshmi. High-dimensional confidential data mash up using service- oriented architecture. International Journal of Emerging Science and Engineering (IJESE), 1(6), April 2013.Google ScholarGoogle Scholar
  13. S. Kamara, P. Mohassel, and M. Raykova. Outsourcing multi-party computation. IACR Cryptology ePrint Archive, 2011:272.Google ScholarGoogle Scholar
  14. M. Kantarcioglu and C. Clifton. Privacy-preserving distributed mining of association rules on horizontally partitioned data. IEEE Transactions on Knowledge and Data Engineering, 16(9):1026--1037, Sept. 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. A. Machanavajjhala, D. Kifer, J. Gehrke, and M. Venkitasubramaniam. L-diversity: Privacy beyond k-anonymity. ACM Transactions on Knowledge Discovery from Data (TKDD), 1(1), 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. N. Mohammed, R. Chen, B. C. M. Fung, and P. S. Yu. Differentially private data release for data mining. In Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (SIGKDD), pages 493--501, August 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. N. Mohammed, B. C. M. Fung, P. C. K. Hung, and C. Lee. Anonymizing healthcare data: A case study on the blood transfusion service. In Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (SIGKDD), pages 1285--1294, June 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. J. S. Park, M.-S. Chen, and P. S. Yu. Efficient parallel data mining for association rules. In Proceedings of the 4th International Conference on Information and Knowledge Management (CIKM), pages 31--36, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. J. Renjit and K. Shunmuganathan. Mining the data from distributed database using an improved mining algorithm. International Journal of Computer Science and Information Security, 7(3):116âĂŞ--121, 2010.Google ScholarGoogle Scholar
  20. L. Sweeney. Achieving k-anonymity privacy protection using generalization and suppression. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 10(5):571--588, Oct. 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. T. Trojer, B. C. M. Fung, and P. C. K. Hung. Service-oriented architecture for privacy-preserving data mashup. In Proceedings of the 7th IEEE International Conference on Web Services (ICWS), pages 767--774, July 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. J. Vaidya and C. Clifton. Privacy preserving association rule mining in vertically partitioned data. In Proceedings of the 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD), pages 639--644, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. J. Vaidya and C. Clifton. Privacy-preserving data mining: why, how, and when. IEEE Security Privacy, 2(6):19--27, Nov 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. W. K. Wong, D. W. Cheung, E. Hung, B. Kao, and N. Mamoulis. Security in outsourcing of association rule mining. In Proceedings of the 33rd International Conference on Very Large Data Bases (VLDB), pages 111--122, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. N. Zhang, M. Li, and W. Lou. Distributed data mining with differential privacy. In Proceedings of the IEEE International Conference on Communications(ICC), pages 1--5, 2011.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. DARM: a privacy-preserving approach for distributed association rules mining on horizontally-partitioned data
                Index terms have been assigned to the content through auto-classification.

                Recommendations

                Comments

                Login options

                Check if you have access through your login credentials or your institution to get full access on this article.

                Sign in
                • Published in

                  cover image ACM Other conferences
                  IDEAS '14: Proceedings of the 18th International Database Engineering & Applications Symposium
                  July 2014
                  411 pages
                  ISBN:9781450326278
                  DOI:10.1145/2628194

                  Copyright © 2014 ACM

                  Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                  Publisher

                  Association for Computing Machinery

                  New York, NY, United States

                  Publication History

                  • Published: 7 July 2014

                  Permissions

                  Request permissions about this article.

                  Request Permissions

                  Check for updates

                  Qualifiers

                  • research-article

                  Acceptance Rates

                  Overall Acceptance Rate74of210submissions,35%

                PDF Format

                View or Download as a PDF file.

                PDF

                eReader

                View online with eReader.

                eReader