Non-Interactive Privacy-Preserving Frequent Itemset Mining Over Encrypted Cloud Data

被引:0
|
作者
Zheng, Peijia [1 ]
Cheng, Ziyan [1 ]
Tian, Xianhao [2 ]
Liu, Hongmei [1 ]
Luo, Weiqi [1 ]
Huang, Jiwu [3 ,4 ,5 ]
机构
[1] Sun Yat Sen Univ, GuangDong Prov Key Lab Informat Secur Technol, Guangzhou 510006, Peoples R China
[2] Shenzhen Univ, Coll Informat Engn, Shenzhen 518060, Peoples R China
[3] Shenzhen Univ, Guangdong Key Lab Intelligent Informat Proc, Shenzhen 518060, Peoples R China
[4] Shenzhen Univ, Shenzhen Key Lab Media Secur, Shenzhen 518060, Peoples R China
[5] Shenzhen Inst Artificial Intelligence & Robot Soc, Shenzhen 518172, Peoples R China
关键词
Data mining; Itemsets; Protocols; Cryptography; Servers; Cloud computing; Security; frequent itemset mining; fully homomorphic encryption; non-interactive; privacy-preserving; ASSOCIATION RULES;
D O I
10.1109/TCC.2023.3291378
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Frequent itemset mining is a data mining technique widely used on massive datasets. In cloud computing, the dataset may be encrypted for privacy protection. Therefore, frequent itemset mining over encrypted data is a crucial application in secure cloud computing. In this paper, we propose an effective privacy-preserving framework where the cloud server can directly perform data mining on the encrypted database without interacting with other cloud servers. We first design three security primitives to implement subset determination, accumulation, and comparison in the encrypted domain for frequent itemset mining. Based on the proposed framework, we then propose two secure protocols that allow the cloud server to perform frequent itemset mining on encrypted cloud data with these security primitives. The first protocol leaks no information to the cloud and the second protocol has the advantage of more efficient mining performance. We then present two strategies with parallel algorithms and GPU computing to accelerate the running time. We also analyze the security of our protocols and the computational complexities. Experimental results show that our serial-based protocols achieve shorter running times and higher levels of privacy than previous solutions. Our multi-CPU (or GPU) based parallel protocol can further reduce the practical running time.
引用
收藏
页码:3452 / 3468
页数:17
相关论文
共 50 条
  • [1] Toward Practical Privacy-Preserving Frequent Itemset Mining on Encrypted Cloud Data
    Qiu, Shuo
    Wang, Boyang
    Li, Ming
    Liu, Jiqiang
    Shi, Yanfeng
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2020, 8 (01) : 312 - 323
  • [2] Privacy-Preserving Outsourced Collaborative Frequent Itemset Mining in the Cloud
    Samanthula, Bharath K.
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2017, : 4827 - 4829
  • [3] Efficient privacy-preserving frequent itemset query over semantically secure encrypted cloud database
    Wei Wu
    Ming Xian
    Udaya Parampalli
    Bin Lu
    [J]. World Wide Web, 2021, 24 : 607 - 629
  • [4] Efficient privacy-preserving frequent itemset query over semantically secure encrypted cloud database
    Wu, Wei
    Xian, Ming
    Parampalli, Udaya
    Lu, Bin
    [J]. WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2021, 24 (02): : 607 - 629
  • [5] Privacy-Preserving Frequent Itemset Mining for Sparse and Dense Data
    Laud, Peeter
    Pankova, Alisa
    [J]. SECURE IT SYSTEMS, NORDSEC 2017, 2017, 10674 : 139 - 155
  • [6] Privacy-Preserving Frequent Itemset Mining in Outsourced Transaction Databases
    Chandrasekharan, Iyer
    Baruah, P. K.
    Mukkamala, Ravi
    [J]. 2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2015, : 787 - 793
  • [7] Practical Privacy-Preserving Frequent Itemset Mining on Supermarket Transactions
    Ma, Chenyang
    Wang, Baocang
    Jooste, Kyle
    Zhang, Zhili
    Ping, Yuan
    [J]. IEEE SYSTEMS JOURNAL, 2020, 14 (02): : 1992 - 2002
  • [8] Privacy-Preserving and Regular Language Search Over Encrypted Cloud Data
    Liang, Kaitai
    Huang, Xinyi
    Guo, Fuchun
    Liu, Joseph K.
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (10) : 2365 - 2376
  • [9] An Efficient and Privacy-Preserving Range Query over Encrypted Cloud Data
    Wang, Wentao
    Jin, Yuxuan
    Cao, Bin
    [J]. 2022 19TH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY & TRUST (PST), 2022,
  • [10] Personalized Privacy-Preserving Frequent Itemset Mining Using Randomized Response
    Sun, Chongjing
    Fu, Yan
    Zhou, Junlin
    Gao, Hui
    [J]. SCIENTIFIC WORLD JOURNAL, 2014,