网络与信息安全学报 ›› 2016, Vol. 2 ›› Issue (1): 53-59.doi: 10.11959/j.issn.2096-109x.2016.00014

• 学术论文 • 上一篇    下一篇

基于paillier的隐私保护下关联规则挖掘方法

邢欢,张琳   

  1. 南京邮电大学计算机学院,江苏 南京 210003
  • 修回日期:2015-12-30 出版日期:2016-01-01 发布日期:2016-02-16
  • 作者简介:邢欢(1991-),男,江苏启东人,南京邮电大学硕士生,主要研究方向为分布式计算、数据挖掘、隐私保护等。|张琳(1980-),女,江苏丰县人,博士后,南京邮电大学副教授、硕士生导师,主要研究方向为分布式计算、网络安全、隐私保护等。
  • 基金资助:
    国家自然科学基金资助项目(61402241);江苏省自然科学基金资助项目(BK2012436);省属高校自然科学研究重大基金资助项目(12KJA520002);省属高校自然科学研究重大基金资助项目(14KJA520002);江苏省高校自然科学基金资助项目(13KJB520017)

Privacy-preserving mining of association rules based on paillier encryption algorithm

Huan XING,Lin ZHANG   

  1. College of Computer, Nanjing University of Posts and Telecommunications, Nanjing 210003, China
  • Revised:2015-12-30 Online:2016-01-01 Published:2016-02-16
  • Supported by:
    The National Natural Science Foundation of China(61402241);The Natural Science Foundation of Jiangsu Province(BK2012436);Natural Science Key Fund for Colleges and Universities of Jiangsu Province(12KJA520002);Natural Science Key Fund for Colleges and Universities of Jiangsu Province(14KJA520002);The Natural Science Fund for Colleges and Universities of Jiangsu Province(13KJB520017)

摘要:

摘要:在基于隐私保护的数据挖掘中,挖掘的精度和安全性一直是一对矛盾,针对该矛盾提出了一种在分布式的环境下基于paillier同态加密的关联规则挖掘方法,该方法将计算方和解密方分离保证了数据挖掘的安全性,同时基于同态加密并不会影响挖掘的精度,并通过蒙哥马利算法降低了paillier算法的开销,经过实验发现在增加加解密过程后算法开销还是在能接受的范畴内。

关键词: 隐私保护, 关联规则, 同态加密

Abstract:

In privacy preserving association rule mining, the precision and security of mining are always a pair of contradictions. A method of privacy-preserving mining of association rules based on paillier encryption algorithm over distributed databases was proposed. The method separated calculation and decryption so it can solve the prob-lem of accuracy and security from mining of association rules perfectly. The method can reduce the time cost by Montgomery reduction. The experiment shows that the time cost on the basis of adding the process of encryption and decryption is acceptable.

Key words: privacy preserving, association rules, homomorphic encryption

中图分类号: 

No Suggested Reading articles found!