Encrypted Association Rule Mining for Outsourced Data Mining

被引:4
作者
Liu, Fang [1 ]
Ng, Wee Keong [1 ]
Zhang, Wei [1 ]
机构
[1] Nanyang Technol Univ, Sch Comp Engn, Singapore 639798, Singapore
来源
2015 IEEE 29TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (IEEE AINA 2015) | 2015年
关键词
ssociation rule; secure data mining; cloud computing; privacy; outsourced datassociation rule; outsourced dataa; PRIVACY;
D O I
10.1109/AINA.2015.235
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Rule mining, for discovering valuable relations between items in large databases, has been a popular and well researched method for years. However, such old but important technique faces huge challenges and difficulties in the era of cloud computing although which affords both storage and computing scalability: 1) data are outsourced to a cloud due to data explosion and high storage and management cost; 2) moreover, data are usually encrypted first before being outsourced for privacy's sake. Existing privacy-preserving rule mining methods only assume a distributed model where every data owner holds the self data without encryption and together follow a secure protocol to perform rule mining. To address this limitation, we propose a novel Protocol for Outsourced Rule Mining (PORM) in this paper. PORM performs rule mining in a cloud environment where data are both encrypted and outsourced. We formally proved that PORM is both correct and secure, and we also extended PORM to the multiple-user scenario.
引用
收藏
页码:550 / 557
页数:8
相关论文
共 25 条
[1]  
Agrawal R., 1993, SIGMOD Record, V22, P207, DOI 10.1145/170036.170072
[2]  
Agrawal R., 1994, P 20 INT C VER LARG, P487, DOI DOI 10.5555/645920.672836
[3]   Privacy in Social Networks: How Risky is Your Social Graph? [J].
Akcora, Cuneyt Gurcan ;
Carminati, Barbara ;
Ferrari, Elena .
2012 IEEE 28TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE), 2012, :9-19
[4]  
Bertino E, 2005, PROC INT CONF DATA, P521
[5]   Secure knowledge management: Confidentiality, trust, and privacy [J].
Bertino, Elisa ;
Khan, Latifur R. ;
Sandhu, Ravi ;
Thuraisingham, Bhavani .
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART A-SYSTEMS AND HUMANS, 2006, 36 (03) :429-438
[6]  
Bhagat Smriti., 2010, P 19 INT C WORLD WID, P1059
[7]   Social Cloud Computing: A Vision for Socially Motivated Resource Sharing [J].
Chard, Kyle ;
Bubendorfer, Kris ;
Caton, Simon ;
Rana, Omer F. .
IEEE TRANSACTIONS ON SERVICES COMPUTING, 2012, 5 (04) :551-563
[8]   Privacy preserving mining of association rules [J].
Evfimievski, A ;
Srikant, R ;
Agrawal, R ;
Gehrke, J .
INFORMATION SYSTEMS, 2004, 29 (04) :343-364
[9]   Privacy-Preserving Mining of Association Rules From Outsourced Transaction Databases [J].
Giannotti, Fosca ;
Lakshmanan, Laks V. S. ;
Monreale, Anna ;
Pedreschi, Dino ;
Wang, Hui .
IEEE SYSTEMS JOURNAL, 2013, 7 (03) :385-395
[10]   Privacy-Preserving Gradient-Descent Methods [J].
Han, Shuguo ;
Ng, Wee Keong ;
Wan, Li ;
Lee, Vincent C. S. .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2010, 22 (06) :884-899