Privacy-preserving data mining
SIGMOD '00 Proceedings of the 2000 ACM SIGMOD international conference on Management of data
Communications of the ACM
Using unknowns to prevent discovery of association rules
ACM SIGMOD Record
Limiting privacy breaches in privacy preserving data mining
Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Privacy-preserving Distributed Clustering using Generative Models
ICDM '03 Proceedings of the Third IEEE International Conference on Data Mining
Privacy-preserving k-means clustering over vertically partitioned data
Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining
Privacy preserving mining of association rules
Information Systems - Knowledge discovery and data mining (KDD 2002)
Privacy-Preserving Distributed Mining of Association Rules on Horizontally Partitioned Data
IEEE Transactions on Knowledge and Data Engineering
Random-data perturbation techniques and privacy-preserving data mining
Knowledge and Information Systems
Privacy Preserving Clustering on Horizontally Partitioned Data
ICDEW '06 Proceedings of the 22nd International Conference on Data Engineering Workshops
Distributed clustering based on sampling local density estimates
IJCAI'03 Proceedings of the 18th international joint conference on Artificial intelligence
ESORICS'05 Proceedings of the 10th European conference on Research in Computer Security
Distributed privacy preserving k-means clustering with additive secret sharing
PAIS '08 Proceedings of the 2008 international workshop on Privacy and anonymity in information society
Arbitrarily distributed data-based recommendations with privacy
Data & Knowledge Engineering
Privacy-preserving SOM-based recommendations on horizontally distributed data
Knowledge-Based Systems
International Journal of Data Warehousing and Mining
Hi-index | 0.00 |
In this paper, we propose a privacy preserving distributed clustering protocol for horizontally partitioned data based on a very efficient homomorphic additive secret sharing scheme. The model we use for the protocol is novel in the sense that it utilizes two noncolluding third parties. We provide a brief security analysis of our protocol from information theoretic point of view, which is a stronger security model. We show communication and computation complexity analysis of our protocol along with another protocol previously proposed for the same problem. We also include experimental results for computation and communication overhead of these two protocols. Our protocol not only out-performs the others in execution time and communication overhead on data holders, but also uses a more efficient model for many data mining applications.