Open Access Open Access  Restricted Access Subscription or Fee Access

Available Protocols for Multi-party Computation in Privacy Preserving Data Mining

S. Bhanumathi, Dr.P. Sakthivel

Abstract


Privacy preservation is an important component in designing various data mining applications to seek a trade-off between mining utilities and protecting private information. Due to vast advancements in internet, computing and communication, multiparty computation has great opportunities to perform cooperative computation on multiple parties. In multiparty computation, set of parties with similar background wants to collaboratively compute some function on their private inputs. This major challenge on researchers is how to protect privacy of their sensitive input data without disclosing it to others. Privacy preservation is done by Secure Multiparty Computation, Data Perturbation, Anonymization and Role based access control in multiparty environments. Several protocols have been developed for privacy preserving multiparty computation. These protocols are used to perform multiparty collaborative data mining to preserve privacy of data and knowledge when common users are involved in data mining. This paper describes various protocols for Secure Multiparty Computation and Data Perturbation along with certain security properties like correctness and privacy. Finally the comparisons of various protocols are also discussed.


Keywords


Privacy Preservation, Data Perturbation, Secure Multiparty Computation, Privacy Preserving Collaborative Data Mining, Security, Privacy

Full Text:

PDF

References


Feng He,Ting Wang,”Research and Application of Secure Multi-party Computation in Several Computational Geometry Problems”, In AmericanJournal of Engineering & Tech. Research,Vol.11,No.9,pp.2514-2519,2011.

D.K.Mshra and Priyanka Jange, ”Hybrid Technique for Secure Sum Protocol”,In World of Computer Science & Information Technology Journal, vol.1,No.5,pp.198-2011.

Zulfa Shaikh,Poonm Garg,”A Comparative Study of Available Protocols during Privacy Preservation in Secure Multi-party Computation”, In Journal of Emerging trends in Computing & Information Science,Vol.2,No.5,pp.219-221,May 2011.

Rashid and D.K.Mishra,”A Modified ck-Secure Sum Protocol for Multi-prty Computation”,In Journal of Computing ,Vol.2, pp.62-66,Feb 2010.

D.K.Mishra and Rashid,”A Distributed k-Secure Sum Protocol for Secure Multi-party Computation”, Journal of Computing,Vol.2,pp.68-72,Mar 2010.

Keke Chen and Ling Liu,”Privacy Preserving Multi-party Collaborative Mining with Geometric Data Perturbation ”,IEEE Trans. On Parallel and Distributed Systems,Vol.20,No.12,pp.1764-1776, Dec 2009.

Jianming Zhu,”A New Scheme to Privacy Preserving Collaborative Data Mining”,In fifth International Conference on Information Assurance & Security,IEEE,pp.468-471,2009.

Rohit Pathak and Sathyadhar Joshi,”Security Analysis of Secure Multi-Party Computation using Virtual Parties for Computation on Encrypted Data along with Performance”,International Symposium on Computing Communication &Control(ISCCC),Vol.1,pp.41-45,2009.

Youwen Zhu,Wei Yang and Haung,”Three New Approaches to Privacy Preserving add to Multiply Protocol & its Application”,Second International workshop on Knowledge Discovery &Data Mining,IEEE, pp.554-588,2009.

K.Chen and L.Liu,”Space Adaptation:PrivacyPreserving Multi-party Collaborative Mining with Geometric Perturbation”,Proc. IEEE Conf. Principles on Distributed Computing,2007.

D.K.Mishra and M.Changwani,”Anonymity Enabled Secure Multi-prty Computation for Indian BPO”,In Proc. TENCON,IEEE,pp.1-4,2007.

K.Chen and L.Liu,”Towards Attack-Resilient Geometric Data Perturbation”,In Proc. SIAM Data mining Conf.,2007.

K.Liu,H.Kargupta and J.Ryan,”Random Projection-based Multiplicative Data Perturbation for Privacy Preserving distributed Data Mining”, In IEEE Trans. Knowledge and Data Eng.,Vol.18,No.1,pp.92-106,Jan 2006.

Y.Sang and Hong Shen,”Privacy Preserving Set Intersection Protocol Secure Against Malicious Behaviors”,International Conf. on Information & Communication Secuity,2006.

H.Yu,J.Vaidya and X.Jiang,”Privacy Preserving SVM Classification on Vertically Partitioned Data,”Proc. Pacific-Asia Conf. KnowledgeDiscovery and Data Mining,2006.

K.chen and L.Liu,”A Random Rotation Perturbation a Approach to Privacy Preserving Data Classification”,In Proc. Int’l Conf. Data Mining(ICDM),2005.

K.Kantarcioglu and C.Clifton,”Privacy Preserving Distributed Mining of Association Rules on Horizontally Partitioned Data”,IEEE,Trans. Knowledge and Data Eng.,Vol.16,No.9,pp.1026-1037,2004.

Mikhail J.Atallah and Wenliang Du,”Secure Multi-party Computational Geometry Lecturer notes in Computer Science, pp.1-15,2003.

Wei-Jiang Xu,”Research on Private Data Protection and its Applications in Network Computing”,2008.


Refbacks

  • There are currently no refbacks.