Privacy preserving association rule mining in ubiquitous computing environment
Kaosar, M.G. and Yi, X. (2009) Privacy preserving association rule mining in ubiquitous computing environment. Ubiquitous Computing and Communication Journal, 6 (3). pp. 925-933.
Abstract
Resource Constrained Devices (RCD) in general construct the pervasive computing environment which are equipped with too limited resources to deploy privacy preserving data mining applications. This paper proposes a communication efficient and perturbation based privacy preserving association rule mining (ARM) algorithm for this ubiquitous computing environment. Existing cryptography based privacy preserving solutions are too heavy for RCDs. Communicational and computational optimization is another crucial issue for these kind of solutions too. The proposed algorithm is an integration of two major contributions (1) communication efficient ARM algorithm with enhanced large itemset computation technique and (2) perturbation and semi-trusted server based privacy preserving communication algorithm.
Item Type: | Journal Article |
---|---|
Publisher: | UBICC |
Publisher's Website: | http://www.ubicc.org/files/pdf/ubicc_kaosar_ID_500... |
URI: | http://researchrepository.murdoch.edu.au/id/eprint/62456 |
![]() |
Item Control Page |