Anonymous ID Assignment and Opt-Out

  • Chapter
  • First Online:
Electronic Engineering and Computing Technology

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 60))

Abstract

The networked society places great demand on the dissemination and sharing of private data. As privacy concerns grow, anonymity of communications becomes important. This paper addresses the issue of anonymous ID assignment to nodes in a distributed network and how it can be integrated with secure mining algorithms to allow nodes, that have privacy concerns, a capability to opt out of the mining computation. We propose two algorithms for ID assignment and evaluate their performance. We use them in the design of a protocol that allows a node to opt out of data mining, and investigate the collusion resistance capability of the resulting protocol.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Agrawal, R., Evfimievski, A., Srikant, R.: Information sharing across private databases. In: SIGMODIC: ACM SIGMOD Interantional Conference on Management of Data (2003)

    Google Scholar 

  2. Bottcher, S., Obermeier, S.: Secure set union and bag union computation for guaranteeing anonymity of distrustful participants. JSW 3(1), 9–17 (2008)

    Article  Google Scholar 

  3. Brickell, J., Shmatikov, V.: Efficient anonymity-preserving data collection. In: KDD ’06: Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 76–85. ACM, New York (2006)

    Google Scholar 

  4. Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24(2), 84–88 (1981)

    Article  Google Scholar 

  5. Chaum, D.: The dining cryptographers problem: Unconditional sender and recipient untraceability. J. Cryptology 1(1), 65–75 (1988)

    Article  MATH  MathSciNet  Google Scholar 

  6. Clifton, C., Kantarcioglu, M., Vaidya, J.: Defining privacy for data mining. In: Kargupta, H., Joshi, A., Sivakumar, K. (eds.) National Science Foundation Workshop on Next Generation Data Mining, pp. 126–133, Baltimore, MD (2002a)

    Google Scholar 

  7. Clifton, C., Kantarcioglu, M., Vaidya, J., Lin, X., Zhu, M.Y.: Tools for privacy preserving distributed data mining. SIGKDD Explor. Newsl. 4(2), 28–34 (2002b)

    Article  Google Scholar 

  8. Dong, R., Kresman, R.: Indirect disclosures in data mining. In: The 4th International Conference on Frontier of Computer Science and Technology, Shanghai, China (2009)

    Google Scholar 

  9. Ishiyama, M., Kunishi, M., Kohno, M., Teraoka, F.: Secured anonymous ID assignment support for LIN6. In: Lecture Notes in Computer Science, vol. 3090, pp. 297–306. Springer, Germany (2004)

    Google Scholar 

  10. Kantarcioglu, M.: Privacy-preserving distributed mining of association rules on horizontally partitioned data. IEEE Trans. Knowl. Data Eng. 16(9), 1026–1037 (2004), Senior Member-Chris Clifton

    Article  Google Scholar 

  11. Karr, A., Lin, X., Sanil, A., Reiter, J.: Secure regression on distributed databases. Technical Report 141, National Institute of Statistical Science, Research Triangle Park, NC(2004)

    Google Scholar 

  12. Neumann, Peter G.: Security criteria for electronic voting. In: 16th National Computer Security Conference, Baltimore, MD (1993)

    Google Scholar 

  13. Shepard, Samuel S.: Anonymous opt-out and secure computation in data mining. Master’s thesis, Bowling Green State University (2007) / OhioLINK

    Google Scholar 

  14. Shepard, Samuel S., Kresman, R., Dunning, L.: Data mining and collusion resistance. In: Ao, S.I., Gelman, L., Hukins, David W.L., Hunter, A., Korsunsky, A.M. (eds.) Proceedings of the World Congress on Engineering 2009, vol. I, pp. 283–288, WCE’09, 1–3 July 2009, London, UK (2009)

    Google Scholar 

  15. Urabe, S., Wang, J., Kodama, E., Takata, T.: A high collusion-resistant approach to distributed privacy-preserving data mining. In: Burkhart, H. (ed.) Parallel and Distributed Computing and Networks, vol. 551–803, pp. 326–331. ACTA Press, Innsbruck, Austria (2007)

    Google Scholar 

  16. Urabe, S., Wang, J., Takata, T.: A collusion-resistant approach to distributed privacy-preserving data mining. In: Gonzalez, T. (ed.) Parallel and Distributed Computing and Systems, vol. 436-088, pp. 626–631. ACTA Press, MIT Cambridge, USA (2004)

    Google Scholar 

  17. von Ahn, L., Bortz, A., Hopper, N.J.: k-anonymous message transmission. In: SIGSAC: 10th ACM Conference on Computer and Communications Security. ACM SIGSAC (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Samuel S. Shepard .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer Science+Business Media B.V.

About this chapter

Cite this chapter

Shepard, S.S., Dong, R., Kresman, R., Dunning, L. (2010). Anonymous ID Assignment and Opt-Out. In: Ao, SI., Gelman, L. (eds) Electronic Engineering and Computing Technology. Lecture Notes in Electrical Engineering, vol 60. Springer, Dordrecht. https://doi.org/10.1007/978-90-481-8776-8_36

Download citation

  • DOI: https://doi.org/10.1007/978-90-481-8776-8_36

  • Published:

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-90-481-8775-1

  • Online ISBN: 978-90-481-8776-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics

Navigation