scheme to preserve privacy.
Mobile agent as one of the models for distributed
applications has been used for data mining tasks. Sev-
eral agent-based data mining methods were devel-
oped, such as creating an accurate global model using
a modified decision tree algorithm (Baik et al., 2005),
and a bidding mobile agent scheme (Peng et al., 2005)
to achieve privacy. The paper (Cartrysse and van der
Lubbe, 2004) addressed the privacy problems in agent
technology and offered several solutions.
6 CONCLUSIONS
Distributed data mining is one of the distributed appli-
cations for which there are potential risks of leaking
data privacy when distribute sites communicate to ob-
tain global knowledge. In this paper, we proposed an
agent-based approach to address this problem to mine
association rules securely from data resides across
multiple sites. The privacy preserving characteristics
of this approach relies on the encryption and decryp-
tion techniques that are applied to the calculation of
the union of the frequent k-itemsets and the sum of
the support counts. In the proposed method, several
types of agents are used to perform the encryption and
decryption of the secure union and secure sum oper-
ations. In an experiment with about 8,000 transac-
tions, the result (globally frequent k-itemset) by our
approach applied to the data distributed cross three
sites is the same as the result that would be obtained
from the Aprior algorithm with the same data reside
on a single host. And, the data carried by the agents
are scrambled, indistinguishable and only being en-
crypted and decrypted when all the hosts participate.
Although our agent system is capable of securely
computing the frequent itemsets, there are areas that
need further study such as system stability (e.g. re-
cover from single site crash) and security improve-
ment (e.g. trustworthiness of the agent server).
REFERENCES
Agrawal, D. and Aggarwal, C. C. (2001). On the de-
sign and quantification of privacy preserving data min-
ing algorithms. In Proceedings of the 20th ACM
SIGMOD-SIGACT-SIGART symposium on Principles
of Database, pages 247–255. ACM.
Baik, S. W., Bala, J., and Cho, J. S. (2005). Agent based dis-
tributeddata mining. In Parallel and Distributed Com-
puting: Applications and Technologies, volume 3320
of Lecture Notes in Computer Science, pages 42–45.
Springer.
Cartrysse, K. and van der Lubbe, J. C. A. (2004). Privacy
in mobile agents. In IEEE First Symposium on Multi-
Agent Security and Survivability, pages 73–82. IEEE
Computer Society.
Cheung, D. W.-L., Ng, V. T. Y., Fu, A. W.-C., and Fu, Y.
(1996). Efficient mining of association rules in dis-
tributed databases. IEEE Transactions on Knowledge
and Data Engineering, 8(6):911–922.
Clifton, C. and Marks, D. (1996). Security and privacy im-
plications of data mining. In ACM SIGMOD Work-
shop on Research Issues on Data Mining and Knowl-
edge Discovery, pages 15–19.
da Silva, J. C., Klusch, M., Lodi, S., and Moro, G. (2006).
Privacy-preserving agent-based distributed data clus-
tering. Web Intelligence and Agent Systems, 4(2):221–
238.
Kantarcioglu, M. and Clifton, C. (2004). Privacy-
preserving distributed mining of association rules on
horizontally partitioned data. IEEE Transactions on
Knowledge and Data Engineering, 16(9):1026–1037.
Lange, D. B. and Oshima, M. (1998a). Mobile agents with
Java: The Aglet API. World Wide Web, 1(3):111–121.
Lange, D. B. and Oshima, M. (1998b). Programming
and Deploying Java Mobile Agents Aglets. Addison-
Wesley Longman Publishing.
Peng, K., Dawson1, E., Nieto1, J. G., Okamoto1, E., and
Lpez, J. (2005). A novel method tomaintain privacy in
mobile agent applications. In Cryptology and Network
Security, volume 3810 of Lecture Notes in Computer
Science, pages 247–260. Springer.
Rizvi, S. J. and Haritsa, J. R. (2002). Maintaining data pri-
vacy in association rule mining. In Proceedings of
the 28th International Conference on Very Large Data
Bases, pages 682–693. ACM.
ICE-B 2009 - International Conference on E-business
26