The PDF file you selected should load here if your Web browser has a PDF reader plug-in installed (for example, a recent version of Adobe Acrobat Reader).

If you would like more information about how to print, save, and work with PDFs, Highwire Press provides a helpful Frequently Asked Questions about PDFs.

Alternatively, you can download the PDF file directly to your computer, from where it can be opened using a PDF reader. To download the PDF, click the Download link above.

Fullscreen Fullscreen Off


In this paper, we present a privacy preserving association rule mining method in distributed environments. The proposed method uses FP-growth algorithm and combination of elliptic curve cryptography and digital signature. The proposed method is low in cost for both computation and communication. This method uses associative third party, which is the central authority, holding common cryptographic keys of all the sites and responsible for performing distributed ARM. This method maintains privacy regardless of any number of dishonest sites in the distributed environment.

Keywords

Association Rule Mining, ARM, Cryptography, Digital Signature, Elliptic Curve, FP-Growth, Privacy in ARM
User