Title :
Privacy Preserving Data Sharing With Anonymous ID Assignment
Author :
Dunning, L.A. ; Kresman, R.
Author_Institution :
Dept. of Comput. Sci., Bowling Green State Univ., Bowling Green, OH, USA
Abstract :
An algorithm for anonymous sharing of private data among N parties is developed. This technique is used iteratively to assign these nodes ID numbers ranging from 1 to N. This assignment is anonymous in that the identities received are unknown to the other members of the group. Resistance to collusion among other members is verified in an information theoretic sense when private communication channels are used. This assignment of serial numbers allows more complex data to be shared and has applications to other problems in privacy preserving data mining, collision avoidance in communications and distributed database access. The required computations are distributed without using a trusted central authority. Existing and new algorithms for assigning anonymous IDs are examined with respect to trade-offs between communication and computational requirements. The new algorithms are built on top of a secure sum data mining operation using Newton´s identities and Sturm´s theorem. An algorithm for distributed solution of certain polynomials over finite fields enhances the scalability of the algorithms. Markov chain representations are used to find statistics on the number of iterations required, and computer algebra gives closed form results for the completion rates.
Keywords :
Markov processes; data mining; data privacy; process algebra; symbol manipulation; ID numbers; Markov chain representations; Newton identity; Sturm theorem; anonymous ID assignment; collusion resistance; communication collision avoidance; computer algebra; distributed database access; finite fields; information theoretic sense; privacy preserving data mining; privacy preserving data sharing; private communication channels; statistics; sum data mining operation security; Communication channels; Computational modeling; Data privacy; Distributed databases; Polynomials; Protocols; Security; Anonymization and deanonymization; cloud and distributed computing systems; multiparty computation; privacy preserving data mining; privacy protection; security and trust in cooperative communications;
Journal_Title :
Information Forensics and Security, IEEE Transactions on
DOI :
10.1109/TIFS.2012.2235831