RMIT University
Browse

Secure two-party association rule mining

conference contribution
posted on 2024-10-31, 17:47 authored by Md Golam Kaosar, Russell Paulet, Xun YiXun Yi
Association rule mining algorithm provides a means for determining rules and patterns from a large collection of data. However, when two sites want to engage in an association rule mining, data privacy concerns are raised. These concerns include loosing a competitive edge in the market place and breaching privacy laws. Techniques that have addressed this problem are data perturbation and homomorphic encryption. Homomorphic encryption based solutions produce more accurate results than data perturbation. Most previous solutions for privacy preserving association rule mining require the disclosure of intermediate mining results such as support counts and database size todetermine frequent itemset. To overcome this weakness we propose a secure comparison technique based on state-of-the-art fully homomorphic encryption scheme, by which we build secure twoparty association rule mining protocol. Our solution preserves complete privacy of both parties and it is more efficient than other solutions because there is no need for exponentiation of numbers.

History

Related Materials

  1. 1.
    ISSN - Is published in 14451336
  2. 2.

Start page

15

End page

22

Total pages

8

Outlet

9th Australasian Information Security Conference, AISC 2011

Name of conference

9th Australasian Information Security Conference

Publisher

Australian Computer Society

Place published

Darlinghurst, Australia

Start date

2011-01-17

End date

2011-01-17

Language

English

Copyright

© 2011 Australian Computer Society

Former Identifier

2006048456

Esploro creation date

2020-06-22

Fedora creation date

2015-01-15