Privacy-Preserving Mining of Association Rules From Outsourced Transaction Databases

被引:64
|
作者
Giannotti, Fosca [1 ]
Lakshmanan, Laks V. S. [2 ]
Monreale, Anna [3 ]
Pedreschi, Dino [3 ]
Wang, Hui [4 ]
机构
[1] CNR, Informat Sci & Technol Inst, I-56124 Pisa, Italy
[2] Univ British Columbia, Vancouver, BC V1V 1V7, Canada
[3] Univ Pisa, I-56126 Pisa, Italy
[4] Stevens Inst Technol, Hoboken, NJ 07030 USA
来源
IEEE SYSTEMS JOURNAL | 2013年 / 7卷 / 03期
关键词
Association rule mining; privacy-preserving outsourcing;
D O I
10.1109/JSYST.2012.2221854
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Spurred by developments such as cloud computing, there has been considerable recent interest in the paradigm of data mining-as-a-service. A company (data owner) lacking in expertise or computational resources can outsource its mining needs to a third party service provider (server). However, both the items and the association rules of the outsourced database are considered private property of the corporation (data owner). To protect corporate privacy, the data owner transforms its data and ships it to the server, sends mining queries to the server, and recovers the true patterns from the extracted patterns received from the server. In this paper, we study the problem of outsourcing the association rule mining task within a corporate privacy-preserving framework. We propose an attack model based on background knowledge and devise a scheme for privacy preserving outsourced mining. Our scheme ensures that each transformed item is indistinguishable with respect to the attacker's background knowledge, from at least k-1 other transformed items. Our comprehensive experiments on a very large and real transaction database demonstrate that our techniques are effective, scalable, and protect privacy.
引用
收藏
页码:385 / 395
页数:11
相关论文
共 50 条
  • [1] Privacy-Preserving Frequent Itemset Mining in Outsourced Transaction Databases
    Chandrasekharan, Iyer
    Baruah, P. K.
    Mukkamala, Ravi
    [J]. 2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2015, : 787 - 793
  • [2] Privacy-Preserving Mining of Association Rules on Distributed Databases
    Chang, Chin-Chen
    Yeh, Jieh-Shan
    Li, Yu-Chiang
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (11): : 259 - 266
  • [3] Privacy-Preserving Outsourced Mining of D-Eclat Association Rules on Vertically Partitioned Databases
    Thakur, Suvarna Kisan
    Bhagat, Babita
    Bhattacharjee, Srijita
    [J]. 2018 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION (ICCUBEA), 2018,
  • [4] A privacy-preserving mining algorithm of association rules in distributed databases
    Liu, Jie
    Piao, Xiufeng
    Huang, Shaobin
    [J]. FIRST INTERNATIONAL MULTI-SYMPOSIUMS ON COMPUTER AND COMPUTATIONAL SCIENCES (IMSCCS 2006), PROCEEDINGS, VOL 2, 2006, : 746 - +
  • [5] Privacy-Preserving Data Mining in Spatiotemporal Databases Based on Mining Negative Association Rules
    Ranjith, K. S.
    Mary, A. Geetha
    [J]. EMERGING RESEARCH IN DATA ENGINEERING SYSTEMS AND COMPUTER COMMUNICATIONS, CCODE 2019, 2020, 1054 : 329 - 339
  • [6] Verifiable Privacy-Preserving Outsourced Frequent Itemset Mining on Vertically Partitioned Databases
    Zhao, Zhen
    Lan, Lei
    Wang, Baocang
    Lai, Jianchang
    [J]. ELECTRONICS, 2023, 12 (08)
  • [7] A Privacy-Preserving Distributed Method for Mining Association Rules
    Gui Qiong
    Cheng Xiao-hui
    [J]. 2009 INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND COMPUTATIONAL INTELLIGENCE, VOL IV, PROCEEDINGS, 2009, : 294 - 297
  • [8] Quantitative association rules mining methods with privacy-preserving
    Chen, ZY
    Liu, GH
    [J]. PDCAT 2005: Sixth International Conference on Parallel and Distributed Computing, Applications and Technologies, Proceedings, 2005, : 910 - 912
  • [9] A NOVEL PRIVACY-PRESERVING ASSOCIATION RULES MINING METHOD
    Tian Hong
    Wang Xiukun
    [J]. INTERNATIONAL JOURNAL OF PATTERN RECOGNITION AND ARTIFICIAL INTELLIGENCE, 2010, 24 (06) : 995 - 1009
  • [10] Quantitative association rules mining methods with privacy-preserving
    Chen, ZY
    Ma, ZH
    Wa, Y
    Liu, GH
    [J]. COMPUTER APPLICATIONS IN INDUSTRY AND ENGINEERING, 2003, : 331 - 331