期刊文献+

基于可逆方阵的隐私保护关联规则挖掘 被引量:4

Invertible Matrix-based Privacy-preserving Association Rules Mining
下载PDF
导出
摘要 数据隐私问题引起人们的广泛关注,如何在分布式数据库的环境下挖掘关联规则成为研究的热点。该文探讨在垂直划分数据库中,如何在保护各方隐私数据的前提下挖掘全局频繁项集。各分布式数据库包含全局数据库的一部分属性,共同参与全局挖掘,同时各方不向外泄漏隐私数据。在商品服务器模型的研究基础上,提出一种基于可逆方阵的加密协议,对于垂直划分的分布式数据库,该协议具有较好的隐蔽性、高效性和准确性。 With the growing concern over dat- privacy-preserving problem, how to discover association rules from distributed databases becomes one of the hot topics of this field. This paper is devoted to study the problem of discovering global frequent itemsets from distributed vertically partitioned databases with the goal of preserving the confidentiality of each database. All sites are worked together to find global frequent itemsets without revealing private data, each one holds some attributes of global database. The paper presents an invertible matrix-based encryption protocol based on the research of commodity server model, which protocol is of great confidentiality, effectiveness and correctness for distributed vertically partitioned databases.
出处 《计算机工程》 CAS CSCD 北大核心 2009年第7期153-155,共3页 Computer Engineering
基金 辽宁省自然科学基金资助项目(20062114)
关键词 关联规则 分布式数据库 隐私 可逆方阵 association rules distributed database privacy invertible matrix
  • 相关文献

参考文献6

  • 1Vaidya J, Clifton C W. Privacy Preserving Association Rule Mining in Vertically Partitioned Data[C]//Proceedings of the 8th ACM International Conference on Knowledge Discovery and Data Mining. Alberta, Canada: [s. n.], 2002: 639-644.
  • 2Beaver D. Commodity-based Cryptography(Extended Abstract)[C]// Proceedings of the 29th Annual ACM Symposium on Theory of Computing. TX, USA: [s. n.], 1997: 217-221.
  • 3Beaver D. Server-assisted Cryptography[C]//Proceedings of the 1998 New Security Paradigms Workshop. Charlottesville, VA, USA:[s. n.], 1998: 92-106.
  • 4Yao A C. How to Generate and Exchange Secrets[C]//Proceedings of the 27th IEEE Symposium on Foundations of Computer Science. Los Alamitos. USA: [s. n.], 1986: 162-167.
  • 5Goldreich O, Micali S. How to Play any Mental Game-A Completeness Theorem for Protocols with Honest Majority[C]// Proceedings of the 19th ACM Symposium on the Theory of Computing. New York, USA: [s. n.], 1987: 218-229.
  • 6Atallah M J. Secure Multi-party Computational Geometry[C]// Proceedings of the 7th International Workshop on Algorithms and Data Structures. Providence, Rhode Island, USA: [s. n.], 2001: 165-179.

同被引文献33

引证文献4

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部