Data Mining of Privacy Preserving Based on Secret Sharing Technology

2020 
Based on Shamir secret sharing technology, this paper designs a vertical distributed association rule data mining algorithm with privacy-preserving level, and analyses the correctness, complexity and security of the algorithm. At the same time, it points out that under the hypothesis of quasi-honesty attack, the algorithm is not only safe, but also can effectively prevent collusion between participants. This algorithm is suitable for privacy-preserving data mining in relatively small distributed databases.
    • Correction
    • Source
    • Cite
    • Save
    • Machine Reading By IdeaReader
    10
    References
    0
    Citations
    NaN
    KQI
    []