Skip to main content
Log in

Efficient privacy-preserving frequent itemset query over semantically secure encrypted cloud database

  • Published:
World Wide Web Aims and scope Submit manuscript

Abstract

In recent years, more users tend to use data mining as a service (DMaaS) provided by cloud service providers. However, while enjoying the convenient pay-per-use mode and powerful capacity of cloud computing, users are also threatened by the potential risk of privacy leakage. In this paper, we aim to efficiently perform privacy-preserving DMaaS, and focus on frequent itemset mining over encrypted database in outsourced cloud environment. Existing work apply different encryption methods to design various privacy-preserving mining solutions. Nevertheless, these approaches either cannot provide sufficient security requirements, or introduce heavy computation costs. Some of them also need users staying on-line to execute computations, which are not practical in real-world applications. In this paper, we propose a novel efficient privacy-preserving frequent itemset query (PPFIQ) scheme using two homomorphic encryptions and ciphertext packing technique. The proposed scheme protects transaction database with semantic security, preserves mining privacy and resists frequency analysis attacks. Meanwhile, efficiency is guaranteed by inherent parallel computations for packed plaintexts and users could stay off-line during the mining process. We provide formal security analysis and evaluate the performance of our scheme with extensive experiments. The experiment results demonstrate that the proposed scheme can be efficiently implemented on large databases.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

Notes

  1. http://fimi.ua.ac.be/data/

References

  1. Agrawal, R., Imieliński, T, Swami, A.: Mining association rules between sets of items in large databases. In: ACM Sigmod Record, ACM, vol 22, pp 207–216 (1993)

  2. Boneh, D., Goh, E.J., Nissim, K.: Evaluating 2-dnf formulas on ciphertexts. In: Theory of Cryptography Conference, Springer, pp 325–341 (2005)

  3. Bos, J.W., Lauter, K., Loftus, J., Naehrig, M.: Improved security for a ring-based fully homomorphic encryption scheme. In: IMA International Conference on Cryptography and Coding. Springer, pp 45–64 (2013)

  4. Bresson, E., Catalano, D., Pointcheval, D.: A simple public-key cryptosystem with a double trapdoor decryption mechanism and its applications. In: International Conference on the Theory and Application of Cryptology and Information Security. Springer, pp 37–54 (2003)

  5. Brin, S., Motwani, R., Ullman, J.D., Tsur, S.: Dynamic itemset counting and implication rules for market basket data. ACM Sigmod Rec. 26(2), 255–264 (1997)

    Article  Google Scholar 

  6. Brossette, S.E., Sprague, A.P., Michael. H.J., Waites, K.B., Jones, W.T., Moser, S.A.: Association rules and data mining in hospital infection control and public health surveillance. J. Am. Med. Inform. Assoc. 5(4), 373–381 (1998)

    Article  Google Scholar 

  7. Chen, H., Laine, K., Player, R.: Simple encrypted arithmetic library-seal v2.3.0–4 (2017)

  8. Creighton, C., Hanash, S.: Mining gene expression databases for association rules. Bioinformatics 19(1), 79–86 (2003)

    Article  Google Scholar 

  9. Dowlin, N., Gilad-Bachrach, R., Laine, K., Lauter, K., Naehrig, M., Wernsing, J: Cryptonets: Applying neural networks to encrypted data with high throughput and accuracy. In: International Conference on Machine Learning, pp 201–210 (2016)

  10. Du, J., Michalska, S., Subramani, S., et al.: Neural attention with character embeddings for hay fever detection from twitter. Health Inf Sci Syst 7, 21 (2019)

    Article  Google Scholar 

  11. Evfimievski, A., Srikant, R., Agrawal, R., Gehrke, J.: Privacy preserving mining of association rules. Inf. Syst. 29(4), 343–364 (2004)

    Article  Google Scholar 

  12. Gentry, C.: Fully homomorphic encryption using ideal lattices. Stoc 9(4), 169–178 (2009)

    MathSciNet  MATH  Google Scholar 

  13. Giannotti, F., Lakshmanan, L.V., Monreale, A., Pedreschi, D., Wang, H.: Privacy-preserving mining of association rules from outsourced transaction databases. IEEE Syst. J. 7(3), 385–395 (2013)

    Article  Google Scholar 

  14. Goldreich, O.: General cryptographic protocols. Found. Crypt. 2, 599–764 (2004)

    Article  Google Scholar 

  15. Goldreich, O.: Encryption schemes. Found. Crypt. 2, 373–470 (2004)

    Article  Google Scholar 

  16. Huang, J., Peng, M., Wang, H., Cao, J., Gao, W., Zhang, X.: A probabilistic method for emerging topic tracking in microblog stream. World Wide Web 20(2), 325–350 (2017)

    Article  Google Scholar 

  17. Imabayashi, H., Ishimaki, Y., Umayabara, A., Sato, H., Yamana, H.: Secure frequent pattern mining by fully homomorphic encryption with ciphertext packing. In: Data Privacy Management and Security Assurance. Springer, pp 181–195 (2016)

  18. Ji, Z., Li, H., Liu, X., Luo, Y., Chen, F., Wang, H., Chang, L.: On efficient and robust anonymization for privacy protection on massive streaming categorical information. IEEE Trans. Dependable Secure Comput. 14(5), 507–520 (2015)

    Google Scholar 

  19. Ji, Z., Tao, X., Wang, H.: Outlier detection from large distributed databases. World Wide Web 17(4), 539–568 (2014)

    Article  Google Scholar 

  20. Kantarcioglu, M., Clifton, C.: Privacy-preserving distributed mining of association rules on horizontally partitioned data. IEEE Trans. Knowl. Data Eng. 16 (9), 1026–1037 (2004)

    Article  Google Scholar 

  21. Lai, J., Li, Y., Deng, R.H., Weng, J., Guan, C., Yan, Q.: Towards semantically secure outsourcing of association rule mining on categorical data. Inform. Sci. 267, 267–286 (2014)

    Article  MathSciNet  Google Scholar 

  22. Li, S., Nankun, M.U., Le, J., Liao, X.: Privacy preserving frequent itemset mining: Maximizing data utility based on database reconstruction. Comput. Secur. 84, 17–34 (2019)

  23. Li, L., Rongxing, L.U., Choo, K.K.R., Datta, A., Shao, J.: Privacy-preserving-outsourced association rule mining on vertically partitioned databases. IEEE Trans. Inf. Forensic. Secur 11(8), 1847–1861 (2016)

    Article  Google Scholar 

  24. Li, M., Sun, X., Wang, H., Zhang, Y., Ji, Z.: Privacy-aware access control with trust management in web service. World Wide Web 14(4), 407–430 (2011)

    Article  Google Scholar 

  25. Li, H., Ye, W., Wang, H., Zhou, B.: Multi-window based ensemble learning for classification of imbalanced streaming data. World Wide Web 20, 1507–1525 (2017)

    Article  Google Scholar 

  26. Lin, J.L., Liu, J.Y.C.: Privacy preserving itemset mining through fake transactions. In: Proceedings of the 2007 ACM Symposium on Applied Computing. ACM, pp 375–379 (2007)

  27. Liu, L., Chen, R., Liu, X., Jinshu, S., Qiao, L.: Towards practical privacy-preserving decision tree training and evaluation in the cloud. IEEE Trans. Inf. Forensic. Secur. 15, 2914–2929 (2020)

    Article  Google Scholar 

  28. Liu, L., Jinshu, S., Chen, R., Liu, X., Wang, X., Chen, S., Leung, H.: Privacy-preserving mining of association rule on outsourced cloud data from multiple parties. In: Australasian Conference on Information Security and Privacy. Springer, pp 431–451 (2018)

  29. Ma, C., Wang, B., Jooste, K., Zhang, Z., Ping, Y.: Practical privacy-preserving frequent itemset mining on supermarket transactions. IEEE Syst. J. 14(2), 1992–2002 (2020)

    Article  Google Scholar 

  30. Mohaisen, A., Jho, N.S., Hong, D., Nyang, D.: Privacy preserving association rule mining revisited: Privacy enhancement and resources efficiency. IEICE Trans. Inf. Syst. 93(2), 315–325 (2010)

    Article  Google Scholar 

  31. Molloy, I., Li, N., Li, T.: On the (in) security and (im) practicality of outsourcing precise association rule mining. In: 2009 Ninth IEEE International Conference on Data Mining. IEEE, pp 872–877, p 2009 (2009)

  32. Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: International Conference on the Theory and Applications of Cryptographic Techniques. Springer, pp 223–238 (1999)

  33. Peng, M., Zeng, G., Sun, Z., Huang, J., Wang, H., Tian, G.: Personalized app recommendation based on app permissions. World Wide Web 21, 89–104 (2018)

    Article  Google Scholar 

  34. Qiu, S., Wang, B., Li, M., Liu, J., Shi, Y.: Toward practical privacy-preserving frequent itemset mining on encrypted cloud data. IEEE Trans. Cloud Comput. 8(1), 312–323 (2020)

    Article  Google Scholar 

  35. Rong, H., Wang, H., Liu, J., Xian, M.: Privacy-preserving k-nearest neighbor computation in multiple cloud environments. IEEE Access 4, 9589–9603 (2016)

    Article  Google Scholar 

  36. Smart, N.P., Vercauteren, F.: Fully homomorphic SIMD operations. Des. Codes Crypt. 71(1), 57–81 (2014)

    Article  Google Scholar 

  37. Tai, C.H., Yu, P.S., Chen, M.S.: k-support anonymity based on pseudo taxonomy for outsourcing of frequent itemset mining. In: Proceedings of the 16th ACM SIGKDD International Conference On Knowledge Discovery And Data Mining. ACM, pp 473–482 (2010)

  38. Vaidya, J., Clifton, C.: Privacy preserving association rule mining in vertically partitioned data. In: Proceedings of the Eighth ACM SIGKDD International Conference On Knowledge Discovery And Data Mining. ACM, pp 639–644 (2002)

  39. Vimalachandran, P., Liu, H., Lin, Y., et al.: Improving accessibility of the Australian My Health Records while preserving privacy and security of the system. Health Inf Sci Syst 8, 31 (2020)

    Article  Google Scholar 

  40. Wang, H., Cao, J., Zhang, Y.: A flexible payment scheme and its role-based access control. IEEE Trans. Knowl. Data Eng. 17(3), 425–436 (2005)

    Article  Google Scholar 

  41. Wang, H., Wang, Y., Taleb, T., Jiang, X.: Special issue on security and privacy in network computing. World Wide Web 23, 951–957 (2020)

    Article  Google Scholar 

  42. Wang, H., Yi, X., Bertino, E., Sun, L.: Protecting outsourced data in cloud computing through access management. Concurr. Comput. Pract. Experience 28(3), 600–615 (2016)

    Article  Google Scholar 

  43. Wang, B., Zhan, Y.U., Zhang, Z.: Cryptanalysis of a symmetric fully homomorphic encryption scheme. IEEE Trans Inf. Forensic Secur. 13(6), 1460–1467 (2018)

    Article  Google Scholar 

  44. Wang, H., Zhang, Y., Cao, J.: Effective collaboration with information sharing in virtual universities. IEEE Trans. Knowl. Data Eng. 21(6), 840–853 (2009)

    Article  Google Scholar 

  45. Wang, H., Zhang, Z., Taleb, T.: Special issue on security and privacy of iot. World Wide Web 21, 1–6 (2018)

    Article  Google Scholar 

  46. Wei, W., Liu, J., Rong, H., Wang, H., Xian, M.: Efficient k-nearest neighbor classification over semantically secure hybrid encrypted cloud database. IEEE Access 6, 41771–41784 (2018)

    Article  Google Scholar 

  47. Wei, W., Parampalli, U., Liu, J., Xian, M.: Privacy preserving k-nearest neighbor classification over encrypted database in outsourced cloud environments. World Wide Web 22(1), 101–123 (2019)

    Article  Google Scholar 

  48. Wong, W.K., Cheung, D.W., Hung, E., Kao, B., Mamoulis, N.: Security in outsourcing of association rule mining. In: Proceedings of the 33rd International Conference On Very Large Data Bases. VLDB Endowment, pp 111–122 (2007)

  49. Wu, W., Liu, J., Wang, H., Hao, J., Xian, M.: Secure and efficient outsourced k-means clustering using fully homomorphic encryption with ciphertext packing technique. IEEE Trans. Knowl. Data Eng. (2020)

  50. Wu, W., Liu, J., Wang, H., Tang, F., Xian, M.: Ppolynets: Achieving high prediction accuracy and efficiency with parametric polynomial activations. IEEE Access 6, 72814–72823 (2018)

    Article  Google Scholar 

  51. Yi, X., Rao, F.Y., Bertino, E., Bouguettaya, A.: Privacy-preserving association rule mining in cloud computing. In: Proceedings of the 10th ACM Symposium On Information, Computer And Communications Security. ACM, pp 439–450 (2015)

  52. Yücel, S., Vassilios, S.V., Ahmed, K.E.: Privacy preserving association rule mining. In: Proceedings Twelfth International Workshop on Research Issues in Data Engineering: Engineering E-Commerce/E-Business Systems RIDE-2EC 2002. IEEE, pp 151–158 (2002)

Download references

Acknowledgements

This work has been supported by a grant from the National Natural Science Foundation of China (Grant No. 61801489).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wei Wu.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wu, W., Xian, M., Parampalli, U. et al. Efficient privacy-preserving frequent itemset query over semantically secure encrypted cloud database. World Wide Web 24, 607–629 (2021). https://doi.org/10.1007/s11280-021-00863-w

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11280-021-00863-w

Keywords

Navigation