Data Mining of Privacy Preserving Based on Secret Sharing Technology
2020
Based on Shamir secret sharing technology, this paper designs a vertical distributed association rule data mining algorithm with privacy-preserving level, and analyses the correctness, complexity and security of the algorithm. At the same time, it points out that under the hypothesis of quasi-honesty attack, the algorithm is not only safe, but also can effectively prevent collusion between participants. This algorithm is suitable for privacy-preserving data mining in relatively small distributed databases.
Keywords:
- Correction
- Source
- Cite
- Save
- Machine Reading By IdeaReader
10
References
0
Citations
NaN
KQI