Research Repository

Privacy Preserving Association Rule Mining in Ubiquitous Computing Environment

Kaosar, Md. Golam and Yi, Xun (2009) Privacy Preserving Association Rule Mining in Ubiquitous Computing Environment. Ubiquitous Computing and Communication Journal, 6 (3). pp. 925-933. ISSN 1994-4608 (print) 1992-8424 (online)

Full text for this resource is not available from the Research Repository.


Resource Constrained Devices (RCD) in general construct the pervasive computing environment which are equipped with too limited resources to deploy privacy preserving data mining applications. This paper proposes a communication efficient and perturbation based privacy preserving association rule mining (ARM) algorithm for this ubiquitous computing environment. Existing cryptography based privacy preserving solutions are too heavy for RCDs. Communicational and computational optimization is another crucial issue for these kind of solutions too. The proposed algorithm is an integration of two major contributions (1) communication efficient ARM algorithm with enhanced large itemset computation technique and (2) perturbation and semi-trusted server based privacy preserving communication algorithm.

Item Type: Article
Uncontrolled Keywords: ResPubID19575, ResPubID22461, semi-trusted servers, association rule, algorithms
Subjects: FOR Classification > 0804 Data Format
FOR Classification > 0805 Distributed Computing
FOR Classification > 0807 Library and Information Studies
Faculty/School/Research Centre/Department > School of Engineering and Science
Depositing User: VUIR
Date Deposited: 12 Jun 2012 02:12
Last Modified: 01 Feb 2014 22:24
ePrint Statistics: View download statistics for this item

Repository staff only

View Item View Item

Search Google Scholar