Computer Science ›› 2017, Vol. 44 ›› Issue (8): 157-161.doi: 10.11896/j.issn.1002-137X.2017.08.028

Previous Articles     Next Articles

Improved Algorithm for Privacy-preserving Association Rules Mining on Horizontally Distributed Databases

ZHANG Yan-ping and LING Jie   

  • Online:2018-11-13 Published:2018-11-13

Abstract: An improved privacy-preserving algorithm based on homomorphic for association rules mining on horizontally partitioned environment was proposed in this paper.The algorithm utilizes the approach of randomized response with partial hiding and homomorphic encryption technology,introduces a semi-trusted third party,disruptes and hides the data sets of each site,convertes the horizontal format into vertical format,calculates the number of local support by bit operation and uses Paillier algorithm to compute the number of global support.The algorithm has some advantages,such as no need for communication between sites,high computational efficiency of support,fewer I/O operations and safe transport.Experimental results show that the algorithm can improve the computational efficiency of local support and reduce the number of I/O operations.

Key words: Association rules mining,Privacy-preserving,Homomorphic encryption,Bit operation

[1] LIU Y H,ZHANG T Y,JIN X L,et al.Personal Privacy Protection in the Era of Big Data[J].Journal of Computer Research and Development,2015,52(1):229-247.(in Chinese) 刘雅辉,张铁赢,靳小龙,等.大数据时代的个人隐私保护[J].计算机研究与发展,2015,52(1):229-247.
[2] KANTARCIOGLU M,CLIFTION C.Privacy-preserving dis-tributed mining of association rules on horizontally partitioned data[J].IEEE Trans.on Knowledge and Data Engineering,2004,6(9):1026-1037.
[3] LIU F,XUE A R,WANG W.Hybrid algorithm for privacy preserving association rules mining[J].Application Research of Computers,2012,29(3):1107-1110.(in Chinese) 刘峰,薛安荣,王伟.一种隐私保护关联规则挖掘的混合算法[J].计算机应用研究,2012,29(3):1107-1110.
[4] QIAN P,WU M.Survey of privacy preserving data mining me-thods based on homomorphic encryption[J].Application Research of Computers,2011,28(5):1614-1617.(in Chinese) 钱萍,吴蒙.同态加密隐私保护数据挖掘方法综述[J].计算机应用研究,2011,28(5):1614-1617.
[5] XUAN C N,LE H B,CAO T A.An Enhanced Scheme for Privacy-Preserving Association Rules Mining on Horizontally Distributed Databases[C]∥2012 IEEE RIVF International Confe-rence on Computing and Communication Technologies,Research,Innovation,and Vision for the Future (RIVF).IEEE,2012:1-4.
[6] CHEN Y C.Research on Privacy Preserving Algorithms for Association Rules Mining in Distributed Environment[D].Nanning:Guangxi University,2013.(in Chinese) 陈玉婵.面向关联规则挖掘的分布式隐私保护算法研究[D].南宁:广西大学,2013.
[7] RANA S,THILAGAM P S.Hierarchical Homomorphic En-cryption Based Privacy Preserving Distributed Association Rule Mining[C]∥International Conference on Information Technology.IEEE,2014:379-385.
[8] KAOSAR M G,PAULET R,YI X.Fully homomorphic encryption based two-party association rulemining[J].Data & Know-ledge Engineering,2012,76-78(2):1-15.
[9] RIVEST R.On databanks and privacy homomorphism[J].Foun- dations of Secure Computation,1978,4(11):169-179.
[10] FENG D G,ZHANG M,LI H.Big Data Security and PrivacyProtection[J].Chinese Journal of Computers,2014,37(1):246-258.(in Chinese) 冯登国,张敏,李昊.大数据安全与隐私保护[J].计算机学报,2014,37(1):246-258.
[11] HUANG L S,TIAN M M,HUANG H.Preserving Privacy in Big Data:A Survey from the Cryptographic Perspective[J].Journal of Software,2015,26(4):945-959.(in Chinese) 黄刘生,田苗苗,黄河.大数据隐私保护密码技术研究综述[J].软件学报,2015,26(4):945-959.
[12] ZHANG P,DONG Y H,TANG S H,et al.An Effective Me-thod for Privacy Preserving Association Rule Mining[J].Journal of Software,2006,7(8):1764-1774.(in Chinese) 张鹏,童云海,唐世渭,等.一种有效的隐私保护关联规则挖掘方法[J].软件学报,2006,17(8):1764-1774.
[13] FU S,ZHOU H J.The Research and Improvement of AprioriAlgoruthm for Mining Association Rules[J].Microelectronics &Computer,2013(9):110-114.(in Chinese) 付沙,周航军.关联规则挖掘Apriori算法的研究与改进[J].微电子学与计算机,2013(9):110-114.
[14] HSSEIN M,EL-SISI A,ISMAIL N.Fast Cryptographic Privacy Preserving Association Rules Mining on Distributed Homogenous Data Base[C]∥Proceedings of the 12th Internatio-nal Conference on Knowledge-Based Intelligent Information and Engineering Systems,Part II.Springer-Verlag,2008:607-616.
[15] ZHANG Y,WANG H G,SHAO Z Z,et al.Frequentitemsetsmining based on Apriori-bit[J].Application Research of Computers,2013,30(9):2610-2612.(in Chinese) 张岳,王洪国,邵增珍,等.基于先验位运算的频繁项集挖掘[J].计算机应用研究,2013,30(9):2610-2612.
[16] WAHAB A,OMAR,HACHAMI,et al.DARM:a privacy-preser-ving approach for distributed association rules mining on horizontally-partitioned data[C]∥International Database Enginee-ring & Applications Symposium.ACM,2014.
[17] YI X,RAO F Y,BERTINO E,et al.Privacy-Preserving Associa-tion Rule Mining in Cloud Computing[C]∥ Proceedings of the 10th ACM Symposium on Information,Computer and Communications Security.ACM,2015:439-450.

No related articles found!
Full text



[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75 .
[2] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[3] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[4] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[5] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99 .
[6] ZHOU Yan-ping and YE Qiao-lin. L1-norm Distance Based Least Squares Twin Support Vector Machine[J]. Computer Science, 2018, 45(4): 100 -105 .
[7] LIU Bo-yi, TANG Xiang-yan and CHENG Jie-ren. Recognition Method for Corn Borer Based on Templates Matching in Muliple Growth Periods[J]. Computer Science, 2018, 45(4): 106 -111 .
[8] GENG Hai-jun, SHI Xin-gang, WANG Zhi-liang, YIN Xia and YIN Shao-ping. Energy-efficient Intra-domain Routing Algorithm Based on Directed Acyclic Graph[J]. Computer Science, 2018, 45(4): 112 -116 .
[9] CUI Qiong, LI Jian-hua, WANG Hong and NAN Ming-li. Resilience Analysis Model of Networked Command Information System Based on Node Repairability[J]. Computer Science, 2018, 45(4): 117 -121 .
[10] WANG Zhen-chao, HOU Huan-huan and LIAN Rui. Path Optimization Scheme for Restraining Degree of Disorder in CMT[J]. Computer Science, 2018, 45(4): 122 -125 .