Advertisement

Verifiable and Privacy-Preserving Association Rule Mining in Hybrid Cloud Environment

  • Hong RongEmail author
  • Huimei Wang
  • Jian Liu
  • Fengyi Tang
  • Ming Xian
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11204)

Abstract

Nowadays it is becoming a trend for data owners to outsource data storage together with their mining tasks to cloud service providers, which however brings about security concerns on the loss of data integrity and confidentiality. Existing solutions seldom protect data privacy whilst ensuring result integrity. To address these issues, this paper proposes a series of privacy-preserving building blocks. Then an efficient verifiable association rule mining protocol is designed under hybrid cloud environment, in which the public unreliable cloud and semi-honest cloud collaborate to mine frequent patterns over the encrypted database. Our scheme not only protects the privacy of datasets from frequency analysis attacks, but also verifies the correctness of mining results. Theoretical analysis demonstrates that the scheme is semantically secure under the threat model. Experimental evaluations show that our approach can effectively detect faulty servers while achieving good privacy protection.

Keywords

Association rule mining Privacy preservation Integrity verification Hybrid cloud 

References

  1. 1.
    Wong, W. K., Cheung, D.W., Hung, E., Kao, B., Mamoulis, N.: Security in outsourcing of association rule mining. In: Proceedings of the VLDB, pp. 111–122 (2007)Google Scholar
  2. 2.
  3. 3.
    Cloud Machine Learning Engine. https://cloud.google.com/ml-engine/
  4. 4.
  5. 5.
    Mehmood, A., Natgunanathan, I., Xiang, Y., Hua, G., Guo, S.: Protection of Big Data Privacy. IEEE Access 4, 1821–1834 (2016)CrossRefGoogle Scholar
  6. 6.
    Tai, C., Yu, P. S., Chen, M.: k-support anonymity based on pseudo taxonomy for outsourcing of frequent itemset mining. In: Proceedings of the 16th International Conference on Knowledge Discovery and Data Mining, pp. 473–482 (2010)Google Scholar
  7. 7.
    Giannotti, F., Lakshmanan, L.V.S., Monreale, A., Pedreschi, D., Wang, H.: Privacy-preserving mining of association rules from outsourced transaction databases. IEEE Syst. J. 7(3), 385–395 (2013)CrossRefGoogle Scholar
  8. 8.
    Yi, X., Rao, F., Bertino, E., Bouguettaya, A.: Privacy-preserving association rule mining in cloud computing. In: Proceedings of the ASIA CCS, pp. 439–450 (2015)Google Scholar
  9. 9.
    Liu, J., Li, J., Xu, S., Fung, B.C.M.: Secure outsourced frequent pattern mining by fully homomorphic encryption. In: Madria, S., Hara, T. (eds.) DaWaK 2015. LNCS, vol. 9263, pp. 70–81. Springer, Cham (2015).  https://doi.org/10.1007/978-3-319-22729-0_6CrossRefGoogle Scholar
  10. 10.
    Li, L., Lu, R., Choo, K.K.R., Datta, A., Shao, J.: Privacy-preserving-outsourced association rule mining on vertically partitioned databases. IEEE Trans. Inf. Forensics Secur. 11(8), 1847–1861 (2016)CrossRefGoogle Scholar
  11. 11.
    Gennaro, R., Jarecki, S., Krawczyk, H., Rabin, T.: Secure distributed key generation for discrete-log based cryptosystems. J. Cryptol. 20(1), 51–83 (2007)MathSciNetCrossRefGoogle Scholar
  12. 12.
    Gentry, C., Halevi, S.: Implementing gentry’s fully-homomorphic encryption scheme. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 129–148. Springer, Heidelberg (2011).  https://doi.org/10.1007/978-3-642-20465-4_9CrossRefGoogle Scholar
  13. 13.
    Wong, W.K., Cheung, D.W., Hung, E., Kao, B., Mamoulis, N.: An audit environment for outsourcing of frequent itemset mining. In: Proceedings of the VLDB, pp. 1162–1173 (2009)Google Scholar
  14. 14.
    Dong, B., Liu, R., Wang, W.H.: Integrity verification of outsourced frequent itemset mining with deterministic guarantee. In: ICDM, pp. 1025–1030 (2013)Google Scholar
  15. 15.
    Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)MathSciNetCrossRefGoogle Scholar
  16. 16.
    Emekci, F., Methwally, A., Agrawal, D., Abbadi, A.E.: Dividing secrects to secure data outsourcing. Inf. Sci. 263, 198–210 (2014)CrossRefGoogle Scholar
  17. 17.
    Goldreich, O.: The Foundations of Cryptography - Volume 2, Basic Applications. Cambridge University Press, Cambridge (2004)zbMATHGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Hong Rong
    • 1
    Email author
  • Huimei Wang
    • 1
  • Jian Liu
    • 1
  • Fengyi Tang
    • 1
  • Ming Xian
    • 1
  1. 1.School of Electronic ScienceNational University of Defense TechnologyChangshaChina

Personalised recommendations