Abstract
The networked society places great demand on the dissemination and sharing of private data. As privacy concerns grow, anonymity of communications becomes important. This paper addresses the issue of anonymous ID assignment to nodes in a distributed network and how it can be integrated with secure mining algorithms to allow nodes, that have privacy concerns, a capability to opt out of the mining computation. We propose two algorithms for ID assignment and evaluate their performance. We use them in the design of a protocol that allows a node to opt out of data mining, and investigate the collusion resistance capability of the resulting protocol.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Agrawal, R., Evfimievski, A., Srikant, R.: Information sharing across private databases. In: SIGMODIC: ACM SIGMOD Interantional Conference on Management of Data (2003)
Bottcher, S., Obermeier, S.: Secure set union and bag union computation for guaranteeing anonymity of distrustful participants. JSW 3(1), 9–17 (2008)
Brickell, J., Shmatikov, V.: Efficient anonymity-preserving data collection. In: KDD ’06: Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 76–85. ACM, New York (2006)
Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24(2), 84–88 (1981)
Chaum, D.: The dining cryptographers problem: Unconditional sender and recipient untraceability. J. Cryptology 1(1), 65–75 (1988)
Clifton, C., Kantarcioglu, M., Vaidya, J.: Defining privacy for data mining. In: Kargupta, H., Joshi, A., Sivakumar, K. (eds.) National Science Foundation Workshop on Next Generation Data Mining, pp. 126–133, Baltimore, MD (2002a)
Clifton, C., Kantarcioglu, M., Vaidya, J., Lin, X., Zhu, M.Y.: Tools for privacy preserving distributed data mining. SIGKDD Explor. Newsl. 4(2), 28–34 (2002b)
Dong, R., Kresman, R.: Indirect disclosures in data mining. In: The 4th International Conference on Frontier of Computer Science and Technology, Shanghai, China (2009)
Ishiyama, M., Kunishi, M., Kohno, M., Teraoka, F.: Secured anonymous ID assignment support for LIN6. In: Lecture Notes in Computer Science, vol. 3090, pp. 297–306. Springer, Germany (2004)
Kantarcioglu, M.: Privacy-preserving distributed mining of association rules on horizontally partitioned data. IEEE Trans. Knowl. Data Eng. 16(9), 1026–1037 (2004), Senior Member-Chris Clifton
Karr, A., Lin, X., Sanil, A., Reiter, J.: Secure regression on distributed databases. Technical Report 141, National Institute of Statistical Science, Research Triangle Park, NC(2004)
Neumann, Peter G.: Security criteria for electronic voting. In: 16th National Computer Security Conference, Baltimore, MD (1993)
Shepard, Samuel S.: Anonymous opt-out and secure computation in data mining. Master’s thesis, Bowling Green State University (2007) / OhioLINK
Shepard, Samuel S., Kresman, R., Dunning, L.: Data mining and collusion resistance. In: Ao, S.I., Gelman, L., Hukins, David W.L., Hunter, A., Korsunsky, A.M. (eds.) Proceedings of the World Congress on Engineering 2009, vol. I, pp. 283–288, WCE’09, 1–3 July 2009, London, UK (2009)
Urabe, S., Wang, J., Kodama, E., Takata, T.: A high collusion-resistant approach to distributed privacy-preserving data mining. In: Burkhart, H. (ed.) Parallel and Distributed Computing and Networks, vol. 551–803, pp. 326–331. ACTA Press, Innsbruck, Austria (2007)
Urabe, S., Wang, J., Takata, T.: A collusion-resistant approach to distributed privacy-preserving data mining. In: Gonzalez, T. (ed.) Parallel and Distributed Computing and Systems, vol. 436-088, pp. 626–631. ACTA Press, MIT Cambridge, USA (2004)
von Ahn, L., Bortz, A., Hopper, N.J.: k-anonymous message transmission. In: SIGSAC: 10th ACM Conference on Computer and Communications Security. ACM SIGSAC (2003)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer Science+Business Media B.V.
About this chapter
Cite this chapter
Shepard, S.S., Dong, R., Kresman, R., Dunning, L. (2010). Anonymous ID Assignment and Opt-Out. In: Ao, SI., Gelman, L. (eds) Electronic Engineering and Computing Technology. Lecture Notes in Electrical Engineering, vol 60. Springer, Dordrecht. https://doi.org/10.1007/978-90-481-8776-8_36
Download citation
DOI: https://doi.org/10.1007/978-90-481-8776-8_36
Published:
Publisher Name: Springer, Dordrecht
Print ISBN: 978-90-481-8775-1
Online ISBN: 978-90-481-8776-8
eBook Packages: EngineeringEngineering (R0)