Open Access Open Access  Restricted Access Subscription Access

Privacy Preserving Association Rule Mining in Distributed Environments using Fp-Growth Algorithm and Elliptic Curve Cryptography


Affiliations
1 Department of Computer Science, Bharathiyar University, Coimbatore, Tamil Nadu, India
2 Computer Science Department, Rajah Serfoji Government College, Thanjavur, Tamil Nadu, India
 

In this paper, we present a privacy preserving association rule mining method in distributed environments. The proposed method uses FP-growth algorithm and combination of elliptic curve cryptography and digital signature. The proposed method is low in cost for both computation and communication. This method uses associative third party, which is the central authority, holding common cryptographic keys of all the sites and responsible for performing distributed ARM. This method maintains privacy regardless of any number of dishonest sites in the distributed environment.

Keywords

Association Rule Mining, ARM, Cryptography, Digital Signature, Elliptic Curve, FP-Growth, Privacy in ARM
User

Abstract Views: 186

PDF Views: 0




  • Privacy Preserving Association Rule Mining in Distributed Environments using Fp-Growth Algorithm and Elliptic Curve Cryptography

Abstract Views: 186  |  PDF Views: 0

Authors

T. Nusrat Jabeen
Department of Computer Science, Bharathiyar University, Coimbatore, Tamil Nadu, India
M. Chidambaram
Computer Science Department, Rajah Serfoji Government College, Thanjavur, Tamil Nadu, India

Abstract


In this paper, we present a privacy preserving association rule mining method in distributed environments. The proposed method uses FP-growth algorithm and combination of elliptic curve cryptography and digital signature. The proposed method is low in cost for both computation and communication. This method uses associative third party, which is the central authority, holding common cryptographic keys of all the sites and responsible for performing distributed ARM. This method maintains privacy regardless of any number of dishonest sites in the distributed environment.

Keywords


Association Rule Mining, ARM, Cryptography, Digital Signature, Elliptic Curve, FP-Growth, Privacy in ARM



DOI: https://doi.org/10.17485/ijst%2F2016%2Fv9i48%2F136191