Privacy-preserving association rule mining in large-scale distributed systems

Assaf Schuster, Ran Wolff, Bobi Gilburd

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Data privacy is a major concern that threatens the widespread deployment of Data Grids in domains such as health-care and finance. We propose a unique approach for obtaining knowledge - by way of a data mining model - from a Data Grid, while ensuring that the data is cryptographically safe. This is made possible by an innovative, yet natural generalization for the accepted trusted third party model and a new privacy-preserving data mining algorithm that is suitable for Grid-scale systems. The algorithm is asynchronous, involves no global communication patterns, and dynamically adjusts to changes in the data or to the failure and recovery of resources. To the best of our knowledge, this is the first privacy-preserving mining algorithm to possess these features. Simulations of thousands of resources prove that our algorithm quickly converges to the correct result while using reasonable communication. The simulations also prove that the effect of the privacy parameter on both the convergence time and the number of messages, is logarithmic.

Original languageEnglish
Title of host publication2004 IEEE International Symposium on Cluster Computing and the Grid, CCGrid 2004
Pages411-418
Number of pages8
StatePublished - 2004
Externally publishedYes
Event2004 IEEE International Symposium on Cluster Computing and the Grid, CCGrid 2004 - Chicago, IL, United States
Duration: 19 Apr 200422 Apr 2004

Publication series

Name2004 IEEE International Symposium on Cluster Computing and the Grid, CCGrid 2004

Conference

Conference2004 IEEE International Symposium on Cluster Computing and the Grid, CCGrid 2004
Country/TerritoryUnited States
CityChicago, IL
Period19/04/0422/04/04

ASJC Scopus subject areas

  • General Engineering

Fingerprint

Dive into the research topics of 'Privacy-preserving association rule mining in large-scale distributed systems'. Together they form a unique fingerprint.

Cite this