STOC '87 Proceedings of the nineteenth annual ACM symposium on Theory of computing
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Elliptic curves in cryptography
Elliptic curves in cryptography
On the design and quantification of privacy preserving data mining algorithms
PODS '01 Proceedings of the twentieth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
A fast distributed algorithm for mining association rules
DIS '96 Proceedings of the fourth international conference on on Parallel and distributed information systems
Selective private function evaluation with applications to private statistics
Proceedings of the twentieth annual ACM symposium on Principles of distributed computing
Cryptanalysis of Number Theoretic Ciphers
Cryptanalysis of Number Theoretic Ciphers
Parallel and Distributed Association Mining: A Survey
IEEE Concurrency
Parallel Mining of Association Rules
IEEE Transactions on Knowledge and Data Engineering
Some Privacy Issues in Knowledge Discovery: The OECD Personal Privacy Guidelines
IEEE Expert: Intelligent Systems and Their Applications
Fast Algorithms for Mining Association Rules in Large Databases
VLDB '94 Proceedings of the 20th International Conference on Very Large Data Bases
Data Swapping: Balancing Privacy against Precision in Mining for Logic Rules
DaWaK '99 Proceedings of the First International Conference on Data Warehousing and Knowledge Discovery
Privacy Preserving Data Mining
CRYPTO '00 Proceedings of the 20th Annual International Cryptology Conference on Advances in Cryptology
Trapdooring Discrete Logarithms on Elliptic Curves over Rings
ASIACRYPT '00 Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Secure Multi-party Computational Geometry
WADS '01 Proceedings of the 7th International Workshop on Algorithms and Data Structures
Tools for privacy preserving distributed data mining
ACM SIGKDD Explorations Newsletter
Privacy preserving mining of association rules
Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining
Privacy preserving association rule mining in vertically partitioned data
Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining
Collaborative Filtering with Privacy
SP '02 Proceedings of the 2002 IEEE Symposium on Security and Privacy
Information sharing across private databases
Proceedings of the 2003 ACM SIGMOD international conference on Management of data
On the Privacy Preserving Properties of Random Data Perturbation Techniques
ICDM '03 Proceedings of the Third IEEE International Conference on Data Mining
Privacy-preserving k-means clustering over vertically partitioned data
Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining
Privacy-preserving Bayesian network structure computation on distributed heterogeneous data
Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining
Privacy-Preserving Distributed Mining of Association Rules on Horizontally Partitioned Data
IEEE Transactions on Knowledge and Data Engineering
Privacy-Sensitive Bayesian Network Parameter Learning
ICDM '04 Proceedings of the Fourth IEEE International Conference on Data Mining
Privacy-preserving distributed k-means clustering over arbitrarily partitioned data
Proceedings of the eleventh ACM SIGKDD international conference on Knowledge discovery in data mining
Privacy-Preserving Frequent Pattern Mining across Private Databases
ICDM '05 Proceedings of the Fifth IEEE International Conference on Data Mining
Privacy-preserving collaborative association rule mining
Journal of Network and Computer Applications
Privacy-preserving distributed association rule mining via semi-trusted mixer
Data & Knowledge Engineering
Maintaining data privacy in association rule mining
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
Privacy-preserving Naïve Bayes classification
The VLDB Journal — The International Journal on Very Large Data Bases
How to generate and exchange secrets
SFCS '86 Proceedings of the 27th Annual Symposium on Foundations of Computer Science
On private scalar product computation for privacy-preserving data mining
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
Hi-index | 0.00 |
This article focuses on optimization and performance tests of association rules multiparty mining algorithms. We present how to improve Secure Set Union performance by using a Common Decrypting Key for a commutative encryption. We have also improved Secure Set Union making it fully secure in a semi-honest model. As an example of the above mentioned mechanisms application, the article presents new algorithms of mining association rules on horizontally partitioned data with preserving data privacy - CDKSU (Secure Union with Common Decrypting Key) and its fully secure version - CDKRSU (Secure Union with Common Decrypting Key and secure duplicate Removing). Those algorithms are compared with KCS scheme since they are all based on FDM. As far as the performance optimization is concerned, the application of Elliptic Curve Cryptography vs Exponential Cryptography is presented as well. The real, working system implementing given algorithms is subjected to performance tests which results are presented and analyzed.