Skip to main content

2016 | OriginalPaper | Buchkapitel

Privacy Preservation in Distributed Environment Using RSA-CRT

verfasst von : Raghvendra Kumar, Prasant Kumar Pattnaik, Yogesh Sharma

Erschienen in: Proceedings of the Second International Conference on Computer and Communication Technologies

Verlag: Springer India

Aktivieren Sie unsere intelligente Suche um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Most data mining applications are based on information sharing and additional challenges, when we are dealing with data that are containing sensitive or private information. There is no common data mining technique available that deals with private information without any leakage. Therefore, the knowledge extracted from such data may disclose the pattern with sensitive/private information. This may put privacy on the individual/group of parties. In the past few years, privacy preserving data mining has attracted the research interest and potential for a wide area of applications. There are many techniques for privacy preservation like cryptography, anonymity, and randomization, etc., experimented for privacy preservation in data mining. In this paper, information system-based approach is considered, so some of the attributes required higher privacy compared to the other attributes. This paper explores the use of cryptography techniques, namely RSA with Chinese remainder theorem (CRT) to encrypt and decrypt the database, when all the parties are trying to find their global result in presence of trusted third party or absence of trusted third party, without disclosing their private information to each other.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Apostol, T.: Introduction to Analytical Number Theory, Student edn. Springer International (1989) Apostol, T.: Introduction to Analytical Number Theory, Student edn. Springer International (1989)
2.
Zurück zum Zitat Boneh, D., Shacham, H.: Fast variants of RSA. Crypto Bytes, Springer 5(1), 1–9 (2002) Boneh, D., Shacham, H.: Fast variants of RSA. Crypto Bytes, Springer 5(1), 1–9 (2002)
3.
Zurück zum Zitat Sun, H.M., Wu, M.E.: An approach towards rebalanced RSA-CRT with short public exponent. Cryptology ePrint Archive: Report 2005/053 (2005) Sun, H.M., Wu, M.E.: An approach towards rebalanced RSA-CRT with short public exponent. Cryptology ePrint Archive: Report 2005/053 (2005)
4.
Zurück zum Zitat Agrawal, S., Krishnan, V., Haritsa, J.R.: On addressing efficiency concerns in privacy-preserving mining. In: Proceedings of the 9th International Conference on Database Systems for Advanced Applications. LNCS 2973, pp. 113–124. Springer-Verlag, Jeju Island Agrawal, S., Krishnan, V., Haritsa, J.R.: On addressing efficiency concerns in privacy-preserving mining. In: Proceedings of the 9th International Conference on Database Systems for Advanced Applications. LNCS 2973, pp. 113–124. Springer-Verlag, Jeju Island
5.
Zurück zum Zitat Peng, Z., Yun-Hai, T., Shi-Wei, T., Dong-Qing, Y., Xiu-Li, M.: An effective method for privacy preserving association rule mining. J. Softw. 17(8), 1764–1773 (2006)CrossRef Peng, Z., Yun-Hai, T., Shi-Wei, T., Dong-Qing, Y., Xiu-Li, M.: An effective method for privacy preserving association rule mining. J. Softw. 17(8), 1764–1773 (2006)CrossRef
6.
Zurück zum Zitat Linedell, Y., Pinkas, B.: Secure multiparty computation for privacy-preserving data mining. J. Privacy Confidentiality 1(1) 59–98 ((2009)) Linedell, Y., Pinkas, B.: Secure multiparty computation for privacy-preserving data mining. J. Privacy Confidentiality 1(1) 59–98 ((2009))
7.
Zurück zum Zitat Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. Adv. Cryptog. EUROCRYPT ’99, pp. 223–238. Prague, Czech Republic (1999) Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. Adv. Cryptog. EUROCRYPT ’99, pp. 223–238. Prague, Czech Republic (1999)
8.
Zurück zum Zitat Rivest, R., Adleman, L., Dertouzos, M.: On data banks and privacy homomorphism’s. In: R.A. De Milloetal (ed.) Foundations of Secure Computation, pp. 169–179. Academic Press (2000) Rivest, R., Adleman, L., Dertouzos, M.: On data banks and privacy homomorphism’s. In: R.A. De Milloetal (ed.) Foundations of Secure Computation, pp. 169–179. Academic Press (2000)
9.
Zurück zum Zitat Qiong, G., Xiao-hui, C.: A privacy preserving distributed for mining association rules. Int. Conf. Artif. Intell. Comput. Intell. 294–297 (2009) Qiong, G., Xiao-hui, C.: A privacy preserving distributed for mining association rules. Int. Conf. Artif. Intell. Comput. Intell. 294–297 (2009)
10.
Zurück zum Zitat Koblitz, N.: A Course in Number Theory and Cryptography, 2nd edn. Springer (1994) Koblitz, N.: A Course in Number Theory and Cryptography, 2nd edn. Springer (1994)
11.
Zurück zum Zitat Stallings, W.: Cryptography and network security, 3rd edn. Pearson Education Stallings, W.: Cryptography and network security, 3rd edn. Pearson Education
12.
Zurück zum Zitat Yao, A.C.: Protocol for secure computations. In: Proceedings of the 23rd Annual IEEE Symposium on Foundation of Computer Science, pp. 160–164 (1982) Yao, A.C.: Protocol for secure computations. In: Proceedings of the 23rd Annual IEEE Symposium on Foundation of Computer Science, pp. 160–164 (1982)
13.
Zurück zum Zitat Gold Reich, O., Micali, S., Wigderson, A.: How to play any mental game. In: Proceedings of the 19th Annual ACM Symposium on Theory of Computation, pp. 218–229 (1987) Gold Reich, O., Micali, S., Wigderson, A.: How to play any mental game. In: Proceedings of the 19th Annual ACM Symposium on Theory of Computation, pp. 218–229 (1987)
Metadaten
Titel
Privacy Preservation in Distributed Environment Using RSA-CRT
verfasst von
Raghvendra Kumar
Prasant Kumar Pattnaik
Yogesh Sharma
Copyright-Jahr
2016
Verlag
Springer India
DOI
https://doi.org/10.1007/978-81-322-2517-1_4