Privacy-Preserving Frequent Itemset Mining in Outsourced Transaction Databases

被引:0
|
作者
Chandrasekharan, Iyer [1 ]
Baruah, P. K. [1 ]
Mukkamala, Ravi [2 ]
机构
[1] Sri Sathya Sai Inst Higher Learning, Dept Math & Comp Sci, Prashanti Nilayam, Andhra Pradesh, India
[2] Old Dominion Univ, Dept Comp Sci, Norfolk, VA 23529 USA
关键词
Data mining; Frequent itemsets; Outsourcing;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud computing has ushered a new interest in a paradigm called Datamining-as-a-service. This paradigm is aimed at organizations that lack the technical expertise or the computational resources enabling them to outsource their data mining tasks to a third party service provider. One of the main issues in this regard is the confidentiality of the valuable data at the server which the data owner considers as private. In this work, we study the problem of privacy preserving frequent itemset mining in outsourced transaction databases. We propose a novel hybrid method to achieve k-support anonymity based on statistical observations on the datasets. Our comprehensive experiments on real as well as synthetic datasets show that our techniques are effective and provide moderate privacy.
引用
下载
收藏
页码:787 / 793
页数:7
相关论文
共 50 条
  • [21] An incremental algorithm for mining privacy-preserving frequent itemsets
    Wang, Jin-Long
    Xu, Cong-Fu
    Pan, Yun-He
    PROCEEDINGS OF 2006 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2006, : 1132 - +
  • [22] Privacy-Preserving Mining of Association Rules on Distributed Databases
    Chang, Chin-Chen
    Yeh, Jieh-Shan
    Li, Yu-Chiang
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (11): : 259 - 266
  • [23] Result Integrity Verification of Outsourced Frequent Itemset Mining
    Dong, Boxiang
    Liu, Ruilin
    Wang, Hui
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXVII, 2013, 7964 : 258 - 265
  • [24] Mining itemset utilities from transaction databases
    Yao, Hong
    Hamilton, Howard J.
    DATA & KNOWLEDGE ENGINEERING, 2006, 59 (03) : 603 - 626
  • [25] A Privacy-Preserving Join on Outsourced Database
    Ma, Sha
    Yang, Bo
    Li, Kangshun
    Xia, Feng
    INFORMATION SECURITY, 2011, 7001 : 278 - 292
  • [26] Towards Efficient Privacy-Preserving Similar Sequence Queries on Outsourced Genomic Databases
    Schneider, Thomas
    Tkachenko, Oleksandr
    PROCEEDINGS OF THE 2018 WORKSHOP ON PRIVACY IN THE ELECTRONIC SOCIETY (WPES'18), 2018, : 71 - 75
  • [27] Privacy-Preserving Outsourced Media Search
    Weng, Li
    Amsaleg, Laurent
    Furon, Teddy
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2016, 28 (10) : 2738 - 2751
  • [28] Privacy-preserving inpainting for outsourced image
    Cao, Fang
    Sun, Jiayi
    Luo, Xiangyang
    Qin, Chuan
    Chang, Ching-Chun
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2021, 17 (11)
  • [29] Privacy-Preserving Outsourced Similarity Search
    Kozak, Stepan
    Novak, David
    Zezula, Pavel
    JOURNAL OF DATABASE MANAGEMENT, 2014, 25 (03) : 48 - 71
  • [30] EPISODE: Efficient Privacy-PreservIng Similar Sequence Queries on Outsourced Genomic DatabasEs
    Schneider, Thomas
    Tkachenko, Oleksandr
    PROCEEDINGS OF THE 2019 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS '19), 2019, : 315 - 327