Secure Privacy-Preserving Association Rule Mining With Single Cloud Server

被引:1
作者
Hong, Zhiyong [1 ,2 ]
Zhang, Zhili [3 ]
Duan, Pu [4 ]
Zhang, Benyu [4 ]
Wang, Baocang [5 ]
Gao, Wen [6 ]
Zhao, Zhen [5 ,7 ]
机构
[1] Wuyi Univ, Facil Intelligence Manufacture, Jiangmen 529020, Peoples R China
[2] Wuyi Univ, Yue Gang Ao Ind Big Data Collaborat Innovat Ctr, Jiangmen 529020, Peoples R China
[3] Xuchang Univ, Sch Informat Engn, Xuchang 461000, Peoples R China
[4] Ant Grp, Hangzhou 310000, Peoples R China
[5] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
[6] Xian Univ Posts & Telecommun, Sch Cyberspace Secur, Xian 710121, Peoples R China
[7] Guangxi Key Lab Cryptog & Informat Secur, Guilin 541004, Peoples R China
基金
中国国家自然科学基金;
关键词
Protocols; Servers; Privacy; Security; Data privacy; Itemsets; Perturbation methods; Privacy-preserving association rule mining; single cloud server; garbled circuit; homomorphic encryption;
D O I
10.1109/ACCESS.2021.3128526
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To preserve the privacy of data uploaded on the cloud, it is widely accepted to encrypt the data before uploading it. This leads to the challenge of data analysis, especially association rule mining while protecting data privacy. As one of the solutions, homomorphic encryption is presented allowing encrypted data processing without decryption. In particular, the twin-cloud structure is frequently applied in the privacy-preserving association rule mining schemes based on asymmetric homomorphic encryption, which contradicts the reality that most of the practical applications applied the single cloud server. However, the existing related single cloud server schemes suffer from privacy leakage problems. To fill this gap in the literature, in this paper, we first present a universal secure multiplication protocol with the single cloud server using the garbled circuit and additive homomorphic encryption. Based on this multiplication protocol, we construct the inner product protocol, comparison protocol, frequent itemset protocol, and the final association rule mining protocol that is secure against privacy leakage. Finally, we give the theoretical security analysis of the proposed protocols and show its performance analysis.
引用
收藏
页码:165090 / 165102
页数:13
相关论文
共 34 条
[31]  
Wong W.K., 2007, Proceedings of the 33rd international conference on Very large data bases, VLDB '07, P111
[32]   SecEDMO: Enabling Efficient Data Mining with Strong Privacy Protection in Cloud Computing [J].
Wu, Jiahui ;
Mu, Nankun ;
Lei, Xinyu ;
Le, Junqing ;
Zhang, Di ;
Liao, Xiaofeng .
IEEE TRANSACTIONS ON CLOUD COMPUTING, 2022, 10 (01) :691-705
[33]  
Yao A. C., 1986, 27th Annual Symposium on Foundations of Computer Science (Cat. No.86CH2354-9), P162, DOI 10.1109/SFCS.1986.25
[34]  
Yi Xun., 2015, P 10 ACM S INF COMP, P439