Verifiable Privacy-Preserving Outsourced Frequent Itemset Mining on Vertically Partitioned Databases

被引:0
|
作者
Zhao, Zhen [1 ,2 ]
Lan, Lei [1 ]
Wang, Baocang [1 ]
Lai, Jianchang [3 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
[2] Henan Key Lab Network Cryptog Technol, Zhengzhou 450001, Peoples R China
[3] Southeast Univ, Sch Cyber Sci & Engn, Nanjing 211189, Peoples R China
基金
中国国家自然科学基金;
关键词
frequent itemset mining; privacy-preserving; Paillier homomorphic encryption; vertically partitioned databases; ASSOCIATION RULES;
D O I
10.3390/electronics12081952
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the data era, to simultaneously relieve the heavy computational burden of mining data information from data owners and protecting data privacy, privacy-preserving frequent itemset mining (PPFIM) is presented and has attracted much attention. In PPFIM, data owners and miners outsource the complex task of data mining to the cloud server, which supports strong storage and computing power, and the cloud server cannot extract additional data privacy other than that which is shown by data owners or miners. However, most existing solutions assume that cloud servers will honestly perform the mining process and return the correct results, whereas cloud services are usually provided by a charging third party that may in practice return incorrect results due to computation errors, malicious or criminal activities, etc. To solve this problem, in this paper, we present a verifiable PPFIM protocol on vertically partitioned databases to support the verifiability of the integrity of the mining results, where data owners can authorize the cloud server to perform federated mining on vertically partitioned databases without leaking data information and detect dishonest behaviors in the cloud server from the returned results. We adopt a dual cloud setting to enable data owners to be offline after uploading their encrypted databases to the cloud server, which further relieves the burden on data owners. We implement our protocol and give a detailed analysis in terms of verification accuracy, which shows that the dishonest behaviors of the cloud server can be detected with a probability close to 1 and a sacrifice of only a 1% increase in database size.
引用
收藏
页数:17
相关论文
共 50 条
  • [21] Privacy-Preserving Transformation Used in Verifiable (Outsourced) Computation, Revisited
    Zhao, Liang
    Chen, Liqun
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (04) : 3671 - 3687
  • [22] A privacy-preserving aggregate query scheme on outsourced databases
    Jiang, Ya-Jun
    Yang, Bo
    Zhang, Ming-Wu
    Chen, Xu-Ri
    Zhongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Central South University (Science and Technology), 2011, 42 (03): : 721 - 725
  • [23] Privacy-Preserving Logistic Regression on Vertically Partitioned Data
    Song L.
    Ma C.
    Duan G.
    Yuan Q.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2019, 56 (10): : 2243 - 2249
  • [24] Privacy-preserving collaborative filtering on vertically partitioned data
    Polat, H
    Du, WL
    KNOWLEDGE DISCOVERY IN DATABASES: PKDD 2005, 2005, 3721 : 651 - 658
  • [25] Privacy-preserving SVM classification on vertically partitioned data
    Yu, Hwanjo
    Vaidya, Jaideep
    Jiang, Xiaoqian
    ADVANCES IN KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2006, 3918 : 647 - 656
  • [26] An accurate privacy-preserving data mining algorithm for frequent itemsets in distributed databases
    Hu Xiaodan
    Wang Yongchu
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE INFORMATION COMPUTING AND AUTOMATION, VOLS 1-3, 2008, : 1289 - 1291
  • [27] Non-Interactive Privacy-Preserving Frequent Itemset Mining Over Encrypted Cloud Data
    Zheng, Peijia
    Cheng, Ziyan
    Tian, Xianhao
    Liu, Hongmei
    Luo, Weiqi
    Huang, Jiwu
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023, 11 (04) : 3452 - 3468
  • [28] Privacy-Preserving Computation and Verification of Aggregate Queries on Outsourced Databases
    Thompson, Brian
    Haber, Stuart
    Horne, William G.
    Sander, Tomas
    Yao, Danfeng
    PRIVACY ENHANCING TECHNOLOGIES, PROCEEDINGS, 2009, 5672 : 185 - +
  • [29] Efficient Privacy-Preserving Query Processing on Outsourced Geographic Databases
    Zhao, Li
    Liu, Qin
    Huang, Hejiao
    Jia, Xiaohua
    2018 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2018,
  • [30] Privacy-preserving vertically partitioned linear program with nonnegativity constraints
    Haohao Li
    Zhiyi Tan
    Wei Li
    Optimization Letters, 2013, 7 : 1725 - 1731