计算机科学 ›› 2017, Vol. 44 ›› Issue (8): 157-161.doi: 10.11896/j.issn.1002-137X.2017.08.028

• 信息安全 • 上一篇    下一篇

一种改进的水平分布式环境下基于同态加密的隐私保护算法

张燕平,凌捷   

  1. 广东工业大学计算机学院 广州510006,广东工业大学计算机学院 广州510006
  • 出版日期:2018-11-13 发布日期:2018-11-13
  • 基金资助:
    本文受广东省科技计划项目(2014A010103029,2015B010128014,2015B090906015,2016B010107002,2016B090918039)资助

Improved Algorithm for Privacy-preserving Association Rules Mining on Horizontally Distributed Databases

ZHANG Yan-ping and LING Jie   

  • Online:2018-11-13 Published:2018-11-13

摘要: 提出了一种改进的水平分布式环境下关联规则挖掘的隐私保护算法,该算法应用部分隐藏的随机化回答方法和同态加密技术,引入半可信第三方,将各站点的数据集进行扰乱和隐藏,并将数据的水平格式表示转换成垂直格式表示,通过位运算计算局部支持数,利用Paillier算法计算全局支持数。所提算法具有站点之间无须通信、支持数计算效率高、I/O操作次数少以及传输安全等优点。实验结果表明,所提算法提高了局部支持数的计算效率并减少了I/O操作次数。

关键词: 关联规则挖掘,隐私保护,同态加密,位运算

Abstract: An improved privacy-preserving algorithm based on homomorphic for association rules mining on horizontally partitioned environment was proposed in this paper.The algorithm utilizes the approach of randomized response with partial hiding and homomorphic encryption technology,introduces a semi-trusted third party,disruptes and hides the data sets of each site,convertes the horizontal format into vertical format,calculates the number of local support by bit operation and uses Paillier algorithm to compute the number of global support.The algorithm has some advantages,such as no need for communication between sites,high computational efficiency of support,fewer I/O operations and safe transport.Experimental results show that the algorithm can improve the computational efficiency of local support and reduce the number of I/O operations.

Key words: Association rules mining,Privacy-preserving,Homomorphic encryption,Bit operation

[1] LIU Y H,ZHANG T Y,JIN X L,et al.Personal Privacy Protection in the Era of Big Data[J].Journal of Computer Research and Development,2015,52(1):229-247.(in Chinese) 刘雅辉,张铁赢,靳小龙,等.大数据时代的个人隐私保护[J].计算机研究与发展,2015,52(1):229-247.
[2] KANTARCIOGLU M,CLIFTION C.Privacy-preserving dis-tributed mining of association rules on horizontally partitioned data[J].IEEE Trans.on Knowledge and Data Engineering,2004,6(9):1026-1037.
[3] LIU F,XUE A R,WANG W.Hybrid algorithm for privacy preserving association rules mining[J].Application Research of Computers,2012,29(3):1107-1110.(in Chinese) 刘峰,薛安荣,王伟.一种隐私保护关联规则挖掘的混合算法[J].计算机应用研究,2012,29(3):1107-1110.
[4] QIAN P,WU M.Survey of privacy preserving data mining me-thods based on homomorphic encryption[J].Application Research of Computers,2011,28(5):1614-1617.(in Chinese) 钱萍,吴蒙.同态加密隐私保护数据挖掘方法综述[J].计算机应用研究,2011,28(5):1614-1617.
[5] XUAN C N,LE H B,CAO T A.An Enhanced Scheme for Privacy-Preserving Association Rules Mining on Horizontally Distributed Databases[C]∥2012 IEEE RIVF International Confe-rence on Computing and Communication Technologies,Research,Innovation,and Vision for the Future (RIVF).IEEE,2012:1-4.
[6] CHEN Y C.Research on Privacy Preserving Algorithms for Association Rules Mining in Distributed Environment[D].Nanning:Guangxi University,2013.(in Chinese) 陈玉婵.面向关联规则挖掘的分布式隐私保护算法研究[D].南宁:广西大学,2013.
[7] RANA S,THILAGAM P S.Hierarchical Homomorphic En-cryption Based Privacy Preserving Distributed Association Rule Mining[C]∥International Conference on Information Technology.IEEE,2014:379-385.
[8] KAOSAR M G,PAULET R,YI X.Fully homomorphic encryption based two-party association rulemining[J].Data & Know-ledge Engineering,2012,76-78(2):1-15.
[9] RIVEST R.On databanks and privacy homomorphism[J].Foun- dations of Secure Computation,1978,4(11):169-179.
[10] FENG D G,ZHANG M,LI H.Big Data Security and PrivacyProtection[J].Chinese Journal of Computers,2014,37(1):246-258.(in Chinese) 冯登国,张敏,李昊.大数据安全与隐私保护[J].计算机学报,2014,37(1):246-258.
[11] HUANG L S,TIAN M M,HUANG H.Preserving Privacy in Big Data:A Survey from the Cryptographic Perspective[J].Journal of Software,2015,26(4):945-959.(in Chinese) 黄刘生,田苗苗,黄河.大数据隐私保护密码技术研究综述[J].软件学报,2015,26(4):945-959.
[12] ZHANG P,DONG Y H,TANG S H,et al.An Effective Me-thod for Privacy Preserving Association Rule Mining[J].Journal of Software,2006,7(8):1764-1774.(in Chinese) 张鹏,童云海,唐世渭,等.一种有效的隐私保护关联规则挖掘方法[J].软件学报,2006,17(8):1764-1774.
[13] FU S,ZHOU H J.The Research and Improvement of AprioriAlgoruthm for Mining Association Rules[J].Microelectronics &Computer,2013(9):110-114.(in Chinese) 付沙,周航军.关联规则挖掘Apriori算法的研究与改进[J].微电子学与计算机,2013(9):110-114.
[14] HSSEIN M,EL-SISI A,ISMAIL N.Fast Cryptographic Privacy Preserving Association Rules Mining on Distributed Homogenous Data Base[C]∥Proceedings of the 12th Internatio-nal Conference on Knowledge-Based Intelligent Information and Engineering Systems,Part II.Springer-Verlag,2008:607-616.
[15] ZHANG Y,WANG H G,SHAO Z Z,et al.Frequentitemsetsmining based on Apriori-bit[J].Application Research of Computers,2013,30(9):2610-2612.(in Chinese) 张岳,王洪国,邵增珍,等.基于先验位运算的频繁项集挖掘[J].计算机应用研究,2013,30(9):2610-2612.
[16] WAHAB A,OMAR,HACHAMI,et al.DARM:a privacy-preser-ving approach for distributed association rules mining on horizontally-partitioned data[C]∥International Database Enginee-ring & Applications Symposium.ACM,2014.
[17] YI X,RAO F Y,BERTINO E,et al.Privacy-Preserving Associa-tion Rule Mining in Cloud Computing[C]∥ Proceedings of the 10th ACM Symposium on Information,Computer and Communications Security.ACM,2015:439-450.

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!