Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1754288.1754302acmotherconferencesArticle/Chapter ViewAbstractPublication PagescomputeConference Proceedingsconference-collections
research-article

A cryptography based privacy preserving solution to mine cloud data

Published:22 January 2010Publication History

ABSTRACT

Due to increased adoption of cloud computing, there is a growing need of addressing the data privacy during mining. On the other hand, knowledge sharing is a key to survive many business organizations. Several attempts have been made to mine the data in distributed environment however, maintaining the privacy while mining the data over cloud is a challenging task. In this paper, we present an efficient and practical cryptographic based scheme that preserves privacy and mine the cloud data which is distributed in nature. In order to address the classification task, our approach uses k-NN classifier. We extend the Jaccard measure to find the similarity between two encrypted and distributed records by conducting an equality test. In addition, our approach accelerates mining by finding nearest neighbours at local and then at global level. The proposed approach avoids transmitting the original data and sharing of the key that is required in traditional crypto based privacy preserving data mining solutions.

References

  1. R. Agrawal and R. Srikant. 2000. Privacy-preserving data mining. In SIGMOD '00: Proceedings of the 2000 ACM SIGMOD international conference on Management of data, pages 439--450. ACM Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. B. Pinkas. 2002. Cryptographic techniques for privacy-preserving data mining. SIGKDD Explor. Newsl., 4(2):12--19. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. C. Clifton, M. Kantarcioglu, J. Vaidya, X. Lin, and M. Y. Zhu. 2002. Tools for privacy preserving distributed data mining. SIGKDD Explor. Newsl., 4(2):28--34. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. N. P. Kumar, M. V. Rao, P. R. Krishna, and R. S. Bapi. 2005. Using sub-sequence information with kNN for classification of sequential data. In Distributed Computing and Internet Technology, Second International Conference, ICDCIT 2005, Bhubaneswar, India,. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. P. Paillier. 1991. Public key cryptosystem based on composite degree residuosity classes. In Eurocrypt'99, pages 223--228. Springer.Google ScholarGoogle Scholar
  6. S. Pearson. 2009. Taking account of privacy when designing cloud computing services. In CLOUD'09: Proceedings of the 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. R. L. Rivest, A. Shamir, and L. Adleman. 1978. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM, 21(2):120--126. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. P. Samarati. 2001. Protecting respondents' identities in microdata release. IEEE Transactions on Knowledge and Data Engineering, 13(6):1010--1027. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. M. Singh, P. R. Krishna, and A. Saxena. 2009. A privacy preserving Jaccard similarity function for mining encrypted data. In proceedings of TENCON 2009, Singapore. November 23--26, IEEE.Google ScholarGoogle Scholar
  10. W. K. Wong, D. W.-l. Cheung, B. Kao, and N. Mamoulis. 2009. Secure kNN computation on encrypted databases. In SIGMOD '09: Proceedings of the 35th SIGMOD international conference on Management of data, pages 139--152, New York, NY, USA. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  1. A cryptography based privacy preserving solution to mine cloud data

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      COMPUTE '10: Proceedings of the Third Annual ACM Bangalore Conference
      January 2010
      171 pages
      ISBN:9781450300018
      DOI:10.1145/1754288

      Copyright © 2010 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 22 January 2010

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate114of622submissions,18%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader