首页> 外文期刊>IEICE Transactions on Information and Systems >Privacy Preserving Using Dummy Data for Set Operations in Itemset Mining Implemented with ZDDs
【24h】

Privacy Preserving Using Dummy Data for Set Operations in Itemset Mining Implemented with ZDDs

机译:使用ZDD实现的项集挖掘中使用虚拟数据进行集合操作的隐私保护

获取原文
获取原文并翻译 | 示例
           

摘要

We present a privacy preserving method based on inserting dummy data into original data on the data structure called Zero-suppressed BDDs (ZDDs). Our task is distributed itemset mining, which is frequent itemset mining from horizontally partitioned databases stored in distributed places called sites. We focus on the fundamental case in which there are two sites and each site has a database managed by its owner. By dividing the process of distributed itemset mining into the set union and the set intersection, we show how to make the operations secure in the sense of undistinguishability of data, which is our criterion for privacy preserving based on the already proposed criterion, p-indistinguishability. Our method conceals the original data in each operation by inserting dummy data, where ZDDs, BDD-based directed acyclic graphs, are adopted to represent sets of itemsets compactly and to implement the set operations in constructing the distributed itemset mining process. As far as we know, this is the first technique which gives a concrete representation of sets of itemsets and an implementation of set operations for privacy preserving in distributed itemset mining. Our experiments show that the proposed method provides undistinguishability of dummy data. Furthermore, we compare our method with Secure Multiparty Computation (SMC), which is one of the well-known techniques of secure computation.
机译:我们提出了一种隐私保护方法,该方法基于将虚拟数据插入原始数据的数据结构中,该数据结构称为零抑制BDD(ZDD)。我们的任务是分布式项目集挖掘,这是从存储在称为站点的分布式位置中的水平分区数据库中频繁进行项目集挖掘。我们关注的基本情况是有两个站点,每个站点都有一个由其所有者管理的数据库。通过将分布式项目集挖掘的过程分为集合联合和集合相交,我们展示了如何在数据不可区分性的意义上确保操作的安全性,这是我们基于已经提出的标准p-不可区分性的隐私保护准则。 。我们的方法通过插入虚拟数据来隐藏每个操作中的原始数据,其中采用ZDD(基于BDD的有向无环图)来紧凑地表示项目集集,并在构造分布式项目集挖掘过程中实现集合操作。据我们所知,这是第一种技术,它给出项目集集的具体表示形式,并实现了用于分布式项目集挖掘中的隐私保护的集操作的实现。我们的实验表明,所提出的方法提供了虚拟数据的不可区分性。此外,我们将我们的方法与安全多方计算(SMC)进行了比较,后者是安全计算的众所周知的技术之一。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号