Privacy Preserving Association Rule Mining in Ubiquitous Computing Environment

Full text for this resource is not available from the Research Repository.

Kaosar, Md. Golam and Yi, Xun (2009) Privacy Preserving Association Rule Mining in Ubiquitous Computing Environment. Ubiquitous Computing and Communication Journal, 6 (3). pp. 925-933. ISSN 1994-4608 (print) 1992-8424 (online)

Abstract

Resource Constrained Devices (RCD) in general construct the pervasive computing environment which are equipped with too limited resources to deploy privacy preserving data mining applications. This paper proposes a communication efficient and perturbation based privacy preserving association rule mining (ARM) algorithm for this ubiquitous computing environment. Existing cryptography based privacy preserving solutions are too heavy for RCDs. Communicational and computational optimization is another crucial issue for these kind of solutions too. The proposed algorithm is an integration of two major contributions (1) communication efficient ARM algorithm with enhanced large itemset computation technique and (2) perturbation and semi-trusted server based privacy preserving communication algorithm.

Item type Article
URI https://vuir.vu.edu.au/id/eprint/8542
Official URL http://www.ubicc.org/files/pdf/ubicc_kaosar_ID_500...
Subjects Historical > FOR Classification > 0804 Data Format
Historical > FOR Classification > 0805 Distributed Computing
Historical > FOR Classification > 0807 Library and Information Studies
Historical > Faculty/School/Research Centre/Department > School of Engineering and Science
Keywords ResPubID19575, ResPubID22461, semi-trusted servers, association rule, algorithms
Download/View statistics View download statistics for this item

Search Google Scholar

Repository staff login