Skip to main content

2019 | OriginalPaper | Buchkapitel

Verifiable and Privacy-Preserving Association Rule Mining in Hybrid Cloud Environment

verfasst von : Hong Rong, Huimei Wang, Jian Liu, Fengyi Tang, Ming Xian

Erschienen in: Green, Pervasive, and Cloud Computing

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Nowadays it is becoming a trend for data owners to outsource data storage together with their mining tasks to cloud service providers, which however brings about security concerns on the loss of data integrity and confidentiality. Existing solutions seldom protect data privacy whilst ensuring result integrity. To address these issues, this paper proposes a series of privacy-preserving building blocks. Then an efficient verifiable association rule mining protocol is designed under hybrid cloud environment, in which the public unreliable cloud and semi-honest cloud collaborate to mine frequent patterns over the encrypted database. Our scheme not only protects the privacy of datasets from frequency analysis attacks, but also verifies the correctness of mining results. Theoretical analysis demonstrates that the scheme is semantically secure under the threat model. Experimental evaluations show that our approach can effectively detect faulty servers while achieving good privacy protection.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Wong, W. K., Cheung, D.W., Hung, E., Kao, B., Mamoulis, N.: Security in outsourcing of association rule mining. In: Proceedings of the VLDB, pp. 111–122 (2007) Wong, W. K., Cheung, D.W., Hung, E., Kao, B., Mamoulis, N.: Security in outsourcing of association rule mining. In: Proceedings of the VLDB, pp. 111–122 (2007)
5.
Zurück zum Zitat Mehmood, A., Natgunanathan, I., Xiang, Y., Hua, G., Guo, S.: Protection of Big Data Privacy. IEEE Access 4, 1821–1834 (2016)CrossRef Mehmood, A., Natgunanathan, I., Xiang, Y., Hua, G., Guo, S.: Protection of Big Data Privacy. IEEE Access 4, 1821–1834 (2016)CrossRef
6.
Zurück zum Zitat Tai, C., Yu, P. S., Chen, M.: k-support anonymity based on pseudo taxonomy for outsourcing of frequent itemset mining. In: Proceedings of the 16th International Conference on Knowledge Discovery and Data Mining, pp. 473–482 (2010) Tai, C., Yu, P. S., Chen, M.: k-support anonymity based on pseudo taxonomy for outsourcing of frequent itemset mining. In: Proceedings of the 16th International Conference on Knowledge Discovery and Data Mining, pp. 473–482 (2010)
7.
Zurück zum Zitat Giannotti, F., Lakshmanan, L.V.S., Monreale, A., Pedreschi, D., Wang, H.: Privacy-preserving mining of association rules from outsourced transaction databases. IEEE Syst. J. 7(3), 385–395 (2013)CrossRef Giannotti, F., Lakshmanan, L.V.S., Monreale, A., Pedreschi, D., Wang, H.: Privacy-preserving mining of association rules from outsourced transaction databases. IEEE Syst. J. 7(3), 385–395 (2013)CrossRef
8.
Zurück zum Zitat Yi, X., Rao, F., Bertino, E., Bouguettaya, A.: Privacy-preserving association rule mining in cloud computing. In: Proceedings of the ASIA CCS, pp. 439–450 (2015) Yi, X., Rao, F., Bertino, E., Bouguettaya, A.: Privacy-preserving association rule mining in cloud computing. In: Proceedings of the ASIA CCS, pp. 439–450 (2015)
10.
Zurück zum Zitat Li, L., Lu, R., Choo, K.K.R., Datta, A., Shao, J.: Privacy-preserving-outsourced association rule mining on vertically partitioned databases. IEEE Trans. Inf. Forensics Secur. 11(8), 1847–1861 (2016)CrossRef Li, L., Lu, R., Choo, K.K.R., Datta, A., Shao, J.: Privacy-preserving-outsourced association rule mining on vertically partitioned databases. IEEE Trans. Inf. Forensics Secur. 11(8), 1847–1861 (2016)CrossRef
11.
Zurück zum Zitat Gennaro, R., Jarecki, S., Krawczyk, H., Rabin, T.: Secure distributed key generation for discrete-log based cryptosystems. J. Cryptol. 20(1), 51–83 (2007)MathSciNetCrossRef Gennaro, R., Jarecki, S., Krawczyk, H., Rabin, T.: Secure distributed key generation for discrete-log based cryptosystems. J. Cryptol. 20(1), 51–83 (2007)MathSciNetCrossRef
13.
Zurück zum Zitat Wong, W.K., Cheung, D.W., Hung, E., Kao, B., Mamoulis, N.: An audit environment for outsourcing of frequent itemset mining. In: Proceedings of the VLDB, pp. 1162–1173 (2009) Wong, W.K., Cheung, D.W., Hung, E., Kao, B., Mamoulis, N.: An audit environment for outsourcing of frequent itemset mining. In: Proceedings of the VLDB, pp. 1162–1173 (2009)
14.
Zurück zum Zitat Dong, B., Liu, R., Wang, W.H.: Integrity verification of outsourced frequent itemset mining with deterministic guarantee. In: ICDM, pp. 1025–1030 (2013) Dong, B., Liu, R., Wang, W.H.: Integrity verification of outsourced frequent itemset mining with deterministic guarantee. In: ICDM, pp. 1025–1030 (2013)
16.
Zurück zum Zitat Emekci, F., Methwally, A., Agrawal, D., Abbadi, A.E.: Dividing secrects to secure data outsourcing. Inf. Sci. 263, 198–210 (2014)CrossRef Emekci, F., Methwally, A., Agrawal, D., Abbadi, A.E.: Dividing secrects to secure data outsourcing. Inf. Sci. 263, 198–210 (2014)CrossRef
17.
Zurück zum Zitat Goldreich, O.: The Foundations of Cryptography - Volume 2, Basic Applications. Cambridge University Press, Cambridge (2004)MATH Goldreich, O.: The Foundations of Cryptography - Volume 2, Basic Applications. Cambridge University Press, Cambridge (2004)MATH
Metadaten
Titel
Verifiable and Privacy-Preserving Association Rule Mining in Hybrid Cloud Environment
verfasst von
Hong Rong
Huimei Wang
Jian Liu
Fengyi Tang
Ming Xian
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-030-15093-8_3