(homomorphic) encryption of “1” (“yes”) or “0”
(“no”) and the system computes the aggregates.
While the scheme in (Yang et al, 2005) is based
on the homomorphic model of (Cramer et al, 1997)
that supports 1-out-of-2 (“yes”/ “no”) selections, we
believe that future research could also look at some
very efficient extensions of the homomorphic model,
where 1-out-of-L or K-out-of-L selections are
allowed (e.g., Baudron et al, 2001; Damgard et al,
2003). In this way, the overall bits of information
that a database sends to the miner could be
increased, leading to new possibilities.
4 CONCLUSIONS
We believe that valuable knowledge can be
borrowed from the vast cryptographic literature on
e-auction and e-voting systems, in order to be
adapted to the specific requirements for privacy
preserving data mining systems in a distributed
environment. These systems tend to balance well the
efficiency and security criteria, because they need to
be implementable in medium to large scale
environments.
Of course, further research is needed to choose
and then adapt the specific cryptographic techniques
to the DM environment, taking into account the kind
of databases to work with, the kind of knowledge to
be mined, as well as the kind of specific DM
technique to be used.
REFERENCES
Agrawal, R., Srikant, R., 2000. Privacy-preserving data
μining. In ACM SIGMOD Conference on Management
of Data. ACM Press, pp. 439-450.
Anderson, R., 2001. Security engineering – A guide to
building dependable distributed systems. Wiley
Computer Publishing.
Baudron, O., Fouque, P., Pointcheval, D., Poupard, G.,
Stern, J., 2001. Practical Multi-Candidate Election
System. In 20th ACM Symposium on Principles of
Distributed Computing. ACM Press, pp. 274–283.
Chen, M., Han, J., Yu, P., 1996. Data mining: An
overview from a database perspective. In IEEE
Transactions on Knowledge and Data Engineering.
IEEE Press, Vol. 8 (6), pp. 866-883.
Cramer, R., Gennaro, R., Schoenmakers, B., 1997. A
secure and optimally efficient multi-authority election
scheme. In European Transactions on
Telecommunications. Vol. 8 (5), pp. 481-490.
Damgard, I., Jurik, M., Nielsen, J., 2003. A generalization
of Paillier's public-key system with applications to
electronic voting. Manuscript. Available at:
www.daimi.au.dk/~ivan/GenPaillier_finaljour.ps
Deloitte, 2007. Global security survey 2007. Deloitte
Touche Tohmatsu. Available at:
http://www.deloitte.com/dtt/cda/doc/content/arg_cons
_encuesta-global-Seguridad-2007_20071031(2).pdf
Desmedt, Y., 1994. Threshold Cryptography. In European
Transactions on Telecommunications. Vol. 5(4), pp.
449–457.
Dunham, M., 2002. Data mining, introductory and
advanced topics. Prentice Hall.
Ferrer, J. (Ed.), 2002. Inference control in statistical
databases, from theory to practice. Springer, LNCS
Vol. 2316.
Goldwasser, S., 1997. Multi-party computations: Past and
present. In 16th Annual ACM Symposium on
principles of Distributed Computing. ACM, pp. 1-6.
Gritzalis, D. (Ed.), 2002. Secure electronic voting: trends
and perspectives, capabilities and limitations. Kluwer
Academic Publishers.
Kantarcioglu, M., Clifton, C., 2004. Privacy-preserving
distributed mining of association rules on horizontally
partitioned data. In IEEE Transactions on Knowledge
and Data Engineering. IEEE Press, Vol. 16 (9), pp.
1026-1037.
Lindell, Y., Pinkas, B., 2000. Privacy preserving data
mining. In Advances in Cryptology - CRYPTO ’00.
Springer, LNCS Vol. 1880, pp. 36–53.
Naor, M., Pinkas, B., Sumner, R., 1999. Privacy
preserving auctions and mechanism design. In 1st
ACM conference on Electronic commerce. ACM
Press, pp. 129 – 139.
Parkes, D., Rabin, M., Shieber, S., Thorpe, C., 2006.
Practical secrecy-preserving, verifiably correct and
trustworthy auctions. In 8th ACM International
Conference on Electronic Commerce. ACM Press, pp.
70 – 81.
Pinkas, B., 2002. Cryptographic techniques for privacy-
preserving data mining. In SIGKDD Explorations.
ACM Press, Vol. 4(2), pp. 12-19.
Schoenmakers, B., 1999. A Simple Publicly Verifiable
Secret Sharing Scheme and Its Application to
Electronic Voting. In Advances in Cryptology–
CRYPTO’99. Springer LNCS Vol. 1666. pp. 148-164.
Vaidya, J., Clifton, C., 2002. Privacy preserving
association rule mining in vertically partitioned data.
In 8th ACM SIGKDD International Conference on
Knowledge Discovery and Data Mining. ACM Press,
pp. 639-644.
Wang, J., Zhang, J., 2007. Addressing accuracy issues in
privacy preserving data mining through matrix
Factorization. In ISI’07, IEEE International
Conference on Intelligence and Security Informatics.
IEEE Press, pp. 217-220.
Yang, Z., Zhong, S., Wright, R., 2005. Privacy-preserving
classification of customer data without loss of
accuracy. In SDM’05 SIAM Data Mining Conference.
Yao, A., 1986. How to generate and exchange secrets. In
27th Symposium on Foundations of Computer
Science. IEEE Press, pp. 162–167.
WEBIST 2008 - International Conference on Web Information Systems and Technologies
304