to find the sum
∑
V
ik
.
Regarding the security analysis, our protocol that
finds global cycles based on efficient private
matching is semantically secure from attackers and
also preserves privacy. The data of all the clients is
private as the leader only sees the encrypted
coefficients. The leader’s privacy is also protected as
he only sends across encrypted shares that XOR to y
and hence the actual value of y is not known to the
different participants.
Our protocol based on secret sharing, is also
semantically secure from the network attackers. i.e.
network attackers cannot learn any valuable
information except for the shares of each of the
parties which would be of no use. This algorithm
can also effectively prevent collusive behaviour if
the number of collusive parties c < p-1.
4 CONCLUSIONS
In this paper we define a new problem of detecting
partial and total global cycles in a co-opetative setup
while maintaining the privacy of the individual
parties.
We extend the interleaved algorithm to find
global cycles in cyclic association rules privately.
Our first algorithm has higher computation cost and
lesser communication cost compared to the second
one based on Shamir’s Secret sharing.
However there are a few open research
challenges that which include applying these privacy
preserving theories to other temporal rule mining
methods like calendric association rules, temporal
predicate association rules, OLAP cubes and
sequential association rules. The algorithm could
also be extended to a heterogeneous setup and to
malicious models. Since our approach considers the
threshold count at each of the parties individually for
a particular item and gives equal importance to all
the participants; an extension to this could be to
privately decipher global cyclic association rules
considering the global count of the respective item
and hence giving importance to the parties with
respect to their transaction data size.
REFERENCES
Aggarwal, C. C. and Yu, P. S., (2008). A general survey
of privacy-preserving data mining models and
algorithms. In Privacy-Preserving Data Mining,
volume 34 of The Kluwer International Series on
Advances in Database Systems, pages 11–52. Springer
US.
Ben Ahmed, E. and Gouider, M. S., (2010). Towards a
new mechanism of extracting cyclic association rules
based on partition aspect. In Research Challenges in
Information Science (RCIS), 2010 Fourth Interna
tional Conference on, pages 69 –78.
Freedman, M. J., Nissim, K., and Pinkas, B., (2004).
Efficient private matching and set intersection. Pages
1–19. Springer-Verlag.
Ge, X., Yan, L., Zhu, J., and Shi, W., (2010). Privacy
preserving distributed association rule mining based
on the secret sharing technique. In Software Engineer
ing and Data Mining (SEDM), 2010 2nd International
Conference on, pages 345 –350.
Kantarcioglu, M., (2008). A Survey of Privacy-Preserving
Methods Across Horizontally Partitioned Data. In
Privacy-Preserving Data Mining, volume 34 of Ad-
vances in Database Systems, pages 313–335. Springer
US.
Kantarcioglu, M. and Clifton, C., (2004). Privacy
preserving distributed mining of association rules on
horizontally partitioned data. Knowledge and Data
Engineering, IEEE Transactions on, 16(9):1026 1037.
Kargupta, H., Das, K., and Liu, K., (2007). Multi-party,
privacy-preserving distributed data mining using a
game theoretic framework. In Proceedings of the 11th
European conference on Principles and Practice of
Knowledge Discovery in Databases, PKDD 2007,
pages 523–531, Berlin, Heidelberg. Springer-Verlag.
Ozden, B., Ramaswamy, S., and Silberschatz, A. (1998).
Cyclic association rules. In Proceedings of the Four-
teenth International Conference on Data Engineering,
ICDE ’98, pages 412–421, Washington, DC, USA.
IEEE Computer Society.
Pedersen, T. B., Saygin, Y., and Savas, E. (2007). Secret
Sharing vs. Encryption-based Techniques For Privacy
Preserving Data Mining. Sciences-New York,
(December):17–19.
Sang, Y., Shen, H., and Tian, H., (2009). Privacy
preserving tuple matching in distributed databases.
IEEE Trans. on Knowl. and Data Eng., 21:1767–1782.
Shamir, A., (1979). How to share a secret. Commun. ACM,
22:612–613.
Shi, E., Chan, T.-H. H., Rieffel, E. G., Chow, R., and
Song, D., (2011). Privacy-preserving aggregation of
timeseries data. In NDSS.
Vaidya, J. (2008). A survey of privacy-preserving methods
across vertically partitioned data.
Venkatadri.Mand Reddy, D. L. C., (2011). Article: A
review on data mining from past to the future.
International Journal of Computer Applications,
15(7):19–22.
PrivacyPreservingApproachesforGlobalCycleDetectionsforCyclicAssociationRulesinDistributedDatabases
371