Skip to main content

Verifiable and Privacy-Preserving Association Rule Mining in Hybrid Cloud Environment

  • Conference paper
  • First Online:
Green, Pervasive, and Cloud Computing (GPC 2018)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 11204))

Included in the following conference series:

Abstract

Nowadays it is becoming a trend for data owners to outsource data storage together with their mining tasks to cloud service providers, which however brings about security concerns on the loss of data integrity and confidentiality. Existing solutions seldom protect data privacy whilst ensuring result integrity. To address these issues, this paper proposes a series of privacy-preserving building blocks. Then an efficient verifiable association rule mining protocol is designed under hybrid cloud environment, in which the public unreliable cloud and semi-honest cloud collaborate to mine frequent patterns over the encrypted database. Our scheme not only protects the privacy of datasets from frequency analysis attacks, but also verifies the correctness of mining results. Theoretical analysis demonstrates that the scheme is semantically secure under the threat model. Experimental evaluations show that our approach can effectively detect faulty servers while achieving good privacy protection.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    http://fimi.ua.ac.be/data/.

References

  1. Wong, W. K., Cheung, D.W., Hung, E., Kao, B., Mamoulis, N.: Security in outsourcing of association rule mining. In: Proceedings of the VLDB, pp. 111–122 (2007)

    Google Scholar 

  2. Amazon Machine Learning. https://aws.amazon.com/machine-learning/

  3. Cloud Machine Learning Engine. https://cloud.google.com/ml-engine/

  4. Azure Machine Learning. https://azure.microsoft.com/en-us/services/machine-learning-services/

  5. Mehmood, A., Natgunanathan, I., Xiang, Y., Hua, G., Guo, S.: Protection of Big Data Privacy. IEEE Access 4, 1821–1834 (2016)

    Article  Google Scholar 

  6. Tai, C., Yu, P. S., Chen, M.: k-support anonymity based on pseudo taxonomy for outsourcing of frequent itemset mining. In: Proceedings of the 16th International Conference on Knowledge Discovery and Data Mining, pp. 473–482 (2010)

    Google Scholar 

  7. Giannotti, F., Lakshmanan, L.V.S., Monreale, A., Pedreschi, D., Wang, H.: Privacy-preserving mining of association rules from outsourced transaction databases. IEEE Syst. J. 7(3), 385–395 (2013)

    Article  Google Scholar 

  8. Yi, X., Rao, F., Bertino, E., Bouguettaya, A.: Privacy-preserving association rule mining in cloud computing. In: Proceedings of the ASIA CCS, pp. 439–450 (2015)

    Google Scholar 

  9. Liu, J., Li, J., Xu, S., Fung, B.C.M.: Secure outsourced frequent pattern mining by fully homomorphic encryption. In: Madria, S., Hara, T. (eds.) DaWaK 2015. LNCS, vol. 9263, pp. 70–81. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-22729-0_6

    Chapter  Google Scholar 

  10. Li, L., Lu, R., Choo, K.K.R., Datta, A., Shao, J.: Privacy-preserving-outsourced association rule mining on vertically partitioned databases. IEEE Trans. Inf. Forensics Secur. 11(8), 1847–1861 (2016)

    Article  Google Scholar 

  11. Gennaro, R., Jarecki, S., Krawczyk, H., Rabin, T.: Secure distributed key generation for discrete-log based cryptosystems. J. Cryptol. 20(1), 51–83 (2007)

    Article  MathSciNet  Google Scholar 

  12. Gentry, C., Halevi, S.: Implementing gentry’s fully-homomorphic encryption scheme. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 129–148. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-20465-4_9

    Chapter  Google Scholar 

  13. Wong, W.K., Cheung, D.W., Hung, E., Kao, B., Mamoulis, N.: An audit environment for outsourcing of frequent itemset mining. In: Proceedings of the VLDB, pp. 1162–1173 (2009)

    Google Scholar 

  14. Dong, B., Liu, R., Wang, W.H.: Integrity verification of outsourced frequent itemset mining with deterministic guarantee. In: ICDM, pp. 1025–1030 (2013)

    Google Scholar 

  15. Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)

    Article  MathSciNet  Google Scholar 

  16. Emekci, F., Methwally, A., Agrawal, D., Abbadi, A.E.: Dividing secrects to secure data outsourcing. Inf. Sci. 263, 198–210 (2014)

    Article  Google Scholar 

  17. Goldreich, O.: The Foundations of Cryptography - Volume 2, Basic Applications. Cambridge University Press, Cambridge (2004)

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hong Rong .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Rong, H., Wang, H., Liu, J., Tang, F., Xian, M. (2019). Verifiable and Privacy-Preserving Association Rule Mining in Hybrid Cloud Environment. In: Li, S. (eds) Green, Pervasive, and Cloud Computing. GPC 2018. Lecture Notes in Computer Science(), vol 11204. Springer, Cham. https://doi.org/10.1007/978-3-030-15093-8_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-15093-8_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-15092-1

  • Online ISBN: 978-3-030-15093-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics