Towards Strong Privacy Protection for Association Rule Mining and Query in the Cloud

被引:2
|
作者
Liu, Lin [1 ]
Su, Jinshu [1 ]
Liu, Ximeng [2 ]
Chen, Rongmao [1 ]
Huang, Xinyi [3 ]
Kou, Guang [4 ]
Fu, Shaojing [1 ]
机构
[1] Natl Univ Def Technol, Coll Comp, Changsha 410073, Hunan, Peoples R China
[2] Fuzhou Univ, Coll Math & Comp Sci, Fuzhou 350108, Fujian, Peoples R China
[3] Hong Kong Univ Sci & Technol Guangzhou, Thrust Artificial Intelligence, Informat Hub, Guangzhou 510230, Guangdong Provi, Peoples R China
[4] Natl Innovat Inst Def Technol, Artificial Intelligence Res Ctr, Beijing 100072, Peoples R China
关键词
Secure outsourcing computation; association rule mining; frequent itemset mining; cloud data security and privacy; two-cloud model; SECURE; DATABASE;
D O I
10.1109/TCC.2023.3269510
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Efficiently mining frequent itemsets and association rules on the encrypted outsourced data remains a great challenge for the time-consuming ciphertext computations. Nowadays, it has been not well addressed for privacy-preserving frequent itemsets and association rule mining schemes with mining efficiency, dataset, and query confidentiality simultaneously. In this paper, we investigate the study of privacy issues on frequent itemset mining and association rule mining on outsourced data in a two-cloud model, where the data are encrypted and outsourced by multiple owners holding different public keys. We develop several secure computation protocols based on additively homomorphic cryptosystem and additive secret sharing, which enable the clouds could securely mine the frequent itemsets and association rules. Furthermore, we also design two kinds of frequent itemset and association rule query service, i.e., service customers query the cloud-mined results, and service customers query with their own decided threshold. The proposed scheme not only supports the mining process on the data encrypted by multiple public keys without compromising the security of the datasets, query data and query results, but also offline users. In addition, the experimental results show that our query scheme is much more efficient than the state-of-the-art work.
引用
收藏
页码:3211 / 3225
页数:15
相关论文
共 50 条
  • [1] Fast Range Query Processing with Strong Privacy Protection for Cloud Computing
    Rui Li
    Liu, Alex X.
    Wang, Ann L.
    Bruhadeshwar, Bezawada
    PROCEEDINGS OF THE VLDB ENDOWMENT, 2014, 7 (14): : 1953 - 1964
  • [2] Towards privacy preserving distributed association rule mining
    Ashrafi, MZ
    Taniar, D
    Smith, K
    DISTRIBUTED COMPUTING: IWDC 2003, 2003, 2918 : 279 - 289
  • [3] Fast and Scalable Range Query Processing With Strong Privacy Protection for Cloud Computing
    Li, Rui
    Liu, Alex X.
    Wang, Ann L.
    Bruhadeshwar, Bezawada
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2016, 24 (04) : 2305 - 2318
  • [4] A Privacy-Preserving Framework for Collaborative Association Rule Mining in Cloud
    Samanthula, Bharath K.
    Albehairi, Salha
    Dong, Boxiang
    2019 3RD IEEE INTERNATIONAL CONFERENCE ON CLOUD AND FOG COMPUTING TECHNOLOGIES AND APPLICATIONS (IEEE CLOUD SUMMIT 2019), 2019, : 116 - 121
  • [5] SecEDMO: Enabling Efficient Data Mining with Strong Privacy Protection in Cloud Computing
    Wu, Jiahui
    Mu, Nankun
    Lei, Xinyu
    Le, Junqing
    Zhang, Di
    Liao, Xiaofeng
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2022, 10 (01) : 691 - 705
  • [6] EFPA: Efficient and Flexible Privacy-Preserving Mining of Association Rule in Cloud
    Huang, Cheng
    Lu, Rongxing
    2015 IEEE/CIC INTERNATIONAL CONFERENCE ON COMMUNICATIONS IN CHINA (ICCC), 2015,
  • [7] Secure Privacy-Preserving Association Rule Mining With Single Cloud Server
    Hong, Zhiyong
    Zhang, Zhili
    Duan, Pu
    Zhang, Benyu
    Wang, Baocang
    Gao, Wen
    Zhao, Zhen
    IEEE ACCESS, 2021, 9 : 165090 - 165102
  • [8] Privacy preserving association rule mining
    Saygin, Y
    Verykios, VS
    Elmagarmid, AK
    TWELFTH INTERNATIONAL WORKSHOP ON RESEARCH ISSUES IN DATA ENGINEERING: ENGINEERING E-COMMERCE/E-BUSINESS SYSTEMS, 2002, : 151 - 158
  • [9] Association Rule Mining with Differential Privacy
    Zhen, Hao
    Chiou, Bo-Cheng
    Tsou, Yao-Tung
    Kuo, Sy-Yen
    Wang, Pang-Chieh
    50TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS WORKSHOPS (DSN-W 2020), 2020, : 47 - 54
  • [10] Towards provenance cloud security auditing based on association rule mining
    Tu S.
    Huang X.
    International Journal for Engineering Modelling, 2019, 32 (01) : 1 - 16