Abstract
Nowadays it is becoming a trend for data owners to outsource data storage together with their mining tasks to cloud service providers, which however brings about security concerns on the loss of data integrity and confidentiality. Existing solutions seldom protect data privacy whilst ensuring result integrity. To address these issues, this paper proposes a series of privacy-preserving building blocks. Then an efficient verifiable association rule mining protocol is designed under hybrid cloud environment, in which the public unreliable cloud and semi-honest cloud collaborate to mine frequent patterns over the encrypted database. Our scheme not only protects the privacy of datasets from frequency analysis attacks, but also verifies the correctness of mining results. Theoretical analysis demonstrates that the scheme is semantically secure under the threat model. Experimental evaluations show that our approach can effectively detect faulty servers while achieving good privacy protection.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
References
Wong, W. K., Cheung, D.W., Hung, E., Kao, B., Mamoulis, N.: Security in outsourcing of association rule mining. In: Proceedings of the VLDB, pp. 111–122 (2007)
Amazon Machine Learning. https://aws.amazon.com/machine-learning/
Cloud Machine Learning Engine. https://cloud.google.com/ml-engine/
Azure Machine Learning. https://azure.microsoft.com/en-us/services/machine-learning-services/
Mehmood, A., Natgunanathan, I., Xiang, Y., Hua, G., Guo, S.: Protection of Big Data Privacy. IEEE Access 4, 1821–1834 (2016)
Tai, C., Yu, P. S., Chen, M.: k-support anonymity based on pseudo taxonomy for outsourcing of frequent itemset mining. In: Proceedings of the 16th International Conference on Knowledge Discovery and Data Mining, pp. 473–482 (2010)
Giannotti, F., Lakshmanan, L.V.S., Monreale, A., Pedreschi, D., Wang, H.: Privacy-preserving mining of association rules from outsourced transaction databases. IEEE Syst. J. 7(3), 385–395 (2013)
Yi, X., Rao, F., Bertino, E., Bouguettaya, A.: Privacy-preserving association rule mining in cloud computing. In: Proceedings of the ASIA CCS, pp. 439–450 (2015)
Liu, J., Li, J., Xu, S., Fung, B.C.M.: Secure outsourced frequent pattern mining by fully homomorphic encryption. In: Madria, S., Hara, T. (eds.) DaWaK 2015. LNCS, vol. 9263, pp. 70–81. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-22729-0_6
Li, L., Lu, R., Choo, K.K.R., Datta, A., Shao, J.: Privacy-preserving-outsourced association rule mining on vertically partitioned databases. IEEE Trans. Inf. Forensics Secur. 11(8), 1847–1861 (2016)
Gennaro, R., Jarecki, S., Krawczyk, H., Rabin, T.: Secure distributed key generation for discrete-log based cryptosystems. J. Cryptol. 20(1), 51–83 (2007)
Gentry, C., Halevi, S.: Implementing gentry’s fully-homomorphic encryption scheme. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 129–148. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-20465-4_9
Wong, W.K., Cheung, D.W., Hung, E., Kao, B., Mamoulis, N.: An audit environment for outsourcing of frequent itemset mining. In: Proceedings of the VLDB, pp. 1162–1173 (2009)
Dong, B., Liu, R., Wang, W.H.: Integrity verification of outsourced frequent itemset mining with deterministic guarantee. In: ICDM, pp. 1025–1030 (2013)
Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)
Emekci, F., Methwally, A., Agrawal, D., Abbadi, A.E.: Dividing secrects to secure data outsourcing. Inf. Sci. 263, 198–210 (2014)
Goldreich, O.: The Foundations of Cryptography - Volume 2, Basic Applications. Cambridge University Press, Cambridge (2004)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Rong, H., Wang, H., Liu, J., Tang, F., Xian, M. (2019). Verifiable and Privacy-Preserving Association Rule Mining in Hybrid Cloud Environment. In: Li, S. (eds) Green, Pervasive, and Cloud Computing. GPC 2018. Lecture Notes in Computer Science(), vol 11204. Springer, Cham. https://doi.org/10.1007/978-3-030-15093-8_3
Download citation
DOI: https://doi.org/10.1007/978-3-030-15093-8_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-15092-1
Online ISBN: 978-3-030-15093-8
eBook Packages: Computer ScienceComputer Science (R0)