{"created":"2025-01-18T22:50:26.222034+00:00","updated":"2025-01-22T23:20:27.326505+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00017434","sets":["934:1022:1029:1032"]},"path":["1032"],"owner":"1","recid":"17434","title":["A High Collusion-Resistant Approach to Distributed Privacy-preserving Data Mining"],"pubdate":{"attribute_name":"公開日","attribute_value":"2007-06-15"},"_buckets":{"deposit":"c90ef58d-c828-41c8-b41e-f05e82ce7244"},"_deposit":{"id":"17434","pid":{"type":"depid","value":"17434","revision_id":0},"owners":[1],"status":"published","created_by":1},"item_title":"A High Collusion-Resistant Approach to Distributed Privacy-preserving Data Mining","author_link":["0","0"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"A High Collusion-Resistant Approach to Distributed Privacy-preserving Data Mining"},{"subitem_title":"A High Collusion-Resistant Approach to Distributed Privacy-preserving Data Mining","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"研究論文","subitem_subject_scheme":"Other"}]},"item_type_id":"3","publish_date":"2007-06-15","item_3_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"Faculty of Software and Information Science  Iwate Prefectural University   Presently with Hitachi East Japan Solutions"},{"subitem_text_value":"Faculty of Software and Information Science  Iwate Prefectural University"},{"subitem_text_value":"Faculty of Software and Information Science  Iwate Prefectural University"},{"subitem_text_value":"Faculty of Software and Information Science  Iwate Prefectural University"}]},"item_3_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Faculty of Software and Information Science, Iwate Prefectural University , Presently with Hitachi East Japan Solutions","subitem_text_language":"en"},{"subitem_text_value":"Faculty of Software and Information Science, Iwate Prefectural University","subitem_text_language":"en"},{"subitem_text_value":"Faculty of Software and Information Science, Iwate Prefectural University","subitem_text_language":"en"},{"subitem_text_value":"Faculty of Software and Information Science, Iwate Prefectural University","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/17434/files/IPSJ-TOD4811012.pdf"},"date":[{"dateType":"Available","dateValue":"2009-06-15"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-TOD4811012.pdf","filesize":[{"value":"1.1 MB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"13"},{"tax":["include_tax"],"price":"0","billingrole":"39"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"e7167ecb-8420-4b47-88fa-2cc06647e338","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2007 by the Information Processing Society of Japan"}]},"item_3_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Shintaro, Urabe"},{"creatorName":"Jiahong, Wang"},{"creatorName":"Eiichiro, Kodama"},{"creatorName":"Toyoo, Takata"}],"nameIdentifiers":[{}]}]},"item_3_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Shintaro, Urabe","creatorNameLang":"en"},{"creatorName":"Jiahong, Wang","creatorNameLang":"en"},{"creatorName":"Eiichiro, Kodama","creatorNameLang":"en"},{"creatorName":"Toyoo, Takata","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_3_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA11464847","subitem_source_identifier_type":"NCID"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_6501","resourcetype":"journal article"}]},"item_3_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"1882-7799","subitem_source_identifier_type":"ISSN"}]},"item_3_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"Data mining across different companies  organizations  online shops  or the likes  called sites  is necessary so as to discover valuable shared patterns  associations  trends  or dependencies in their shared data. Privacy  however  is a concern. In many situations it is required that data mining should be conducted without any privacy being violated. In response to this requirement  this paper proposes an effective distributed privacy-preserving data mining approach called CRDM (Collusion-Resistant Data Mining). CRDM is characterized by its ability to resist the collusion. Unless all sites but the victim collude  privacy of a site cannot be violated. Considering that for such applications that need not so high a level of security  excess security assurance would incur extra costs in communication  an extension scheme is also presented so that communication cost can be restrained while still maintaining a user-specified level of security. Results of both analytical and experimental performance study demonstrate the effectiveness of CRDM.","subitem_description_type":"Other"}]},"item_3_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"Data mining across different companies, organizations, online shops, or the likes, called sites, is necessary so as to discover valuable shared patterns, associations, trends, or dependencies in their shared data. Privacy, however, is a concern. In many situations it is required that data mining should be conducted without any privacy being violated. In response to this requirement, this paper proposes an effective distributed privacy-preserving data mining approach called CRDM (Collusion-Resistant Data Mining). CRDM is characterized by its ability to resist the collusion. Unless all sites but the victim collude, privacy of a site cannot be violated. Considering that for such applications that need not so high a level of security, excess security assurance would incur extra costs in communication, an extension scheme is also presented so that communication cost can be restrained while still maintaining a user-specified level of security. Results of both analytical and experimental performance study demonstrate the effectiveness of CRDM.","subitem_description_type":"Other"}]},"item_3_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"117","bibliographic_titles":[{"bibliographic_title":"情報処理学会論文誌データベース(TOD)"}],"bibliographicPageStart":"104","bibliographicIssueDates":{"bibliographicIssueDate":"2007-06-15","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"SIG11(TOD34)","bibliographicVolumeNumber":"48"}]},"relation_version_is_last":true,"weko_creator_id":"1"},"id":17434,"links":{}}