Title :
Efficient Privacy-Preserving Association Rule Mining: P4P Style
Author :
Duan, Yitao ; Canny, John ; Zhan, Justin
Author_Institution :
Comput. Sci. Div., California Univ., Berkeley, CA
fDate :
March 1 2007-April 5 2007
Abstract :
In this paper we introduce a new practical framework, called P4P (peers for privacy), for privacy-preserving data mining. P4P features a hybrid architecture combining P2P and client-server paradigms and provides practical private protocols for user data validation and general computation. The architecture is guided by the natural incentives of the participants and allows the computation to be based on verifiable secret sharing (VSS) where arithmetic operations are done over small fields (e.g. 32 or 64 bits), so that private arithmetic operations have the same cost as normal arithmetic. Verification of user data, which uses large-field public-key arithmetic (1024 bits or more) and homomorphic computation, only requires a small number (constant or logarithmic in the size of user data) of large integer operations. The solution is extremely efficient: In experiments with our implementation, verification of a million-element vector takes a few seconds of server or client time on commodity PCs (in contrast, using standard techniques takes hours). This verification can be used in many privacy-preserving data mining tasks to detect cheating users who attempt to bias the computation by submitting exaggerated values as their inputs. As an example, we demonstrate how association rule mining can be done in the P4P model with near-optimal efficiency and provable privacy
Keywords :
client-server systems; data mining; data privacy; peer-to-peer computing; P2P systems; client-server paradigms; large-field public-key arithmetic; million-element vector; peers-for-privacy; privacy-preserving association rule mining; privacy-preserving data mining; private arithmetic operations; user data validation; verifiable secret sharing; Arithmetic; Association rules; Computer architecture; Costs; Cryptography; Data mining; Data privacy; Protocols; Public key; Variable structure systems;
Conference_Titel :
Computational Intelligence and Data Mining, 2007. CIDM 2007. IEEE Symposium on
Conference_Location :
Honolulu, HI
Print_ISBN :
1-4244-0705-2
DOI :
10.1109/CIDM.2007.368938