Abstract
With the advent of the big data era, outsourcing data storage together with data mining tasks to cloud service providers is becoming a trend, which however incurs security and privacy issues. To address the issues, this paper proposes two protocols for mining frequent patterns securely on the cloud by employing fully homomorphic encryption. One protocol requires little communication between the client and the cloud service provider, the other incurs less computation cost. Moreover, a new privacy notion, namely \(\alpha \)-pattern uncertainty, is proposed to reinforce the second protocol. Our scenario has two advantages: one is stronger privacy protection, and the other is that the outsourced data can be used in different mining tasks. Experimental evaluation demonstrates that the proposed protocols provide a feasible solution to the issues.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Agarwal, R., Aggarwal, C., Prasad, V.V.V.: Depth first generation of long patterns. In: 6th SIGKDD, pp. 108–118 (2000)
Aggarwal, C.C., Yu, P.S.: Privacy-preserving Data Mining: Models and Algorithms. Springer-Verlag, Boston (2008)
Agrawal, R., Imielinski, T., Swami, A.: Mining association rules between sets of items in large databases. In: 1993 SIGMOD, pp. 207–216 (1993)
Agrawal, R., Srikant, R.: Fast algorithms for mining association rules. In: Research Report RJ 9839. IBM Almaden Research Center, San Jose, CA (1994)
Atzori, M., Bonchi, F., Giannotti, F., Pedreschi, D.: Anonymity preserving pattern discovery. VLDB J. 17(4), 703–727 (2008)
Chu, Y.-W., Tai, C.-H., Chen, M.-S., Yu, P.S.: Privacy-preserving simrank over distributed information network. In: 12th ICDM, pp. 840–845 (2012)
van Dijk, M., Gentry, C., Halevi, S., Vaikuntanathan, V.: Fully homomorphic encryption over the integers. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 24–43. Springer, Heidelberg (2010)
Evfimievski, A., Gehrke, J., Srikant, R.: Limiting privacy breaches in privacy preserving data mining. In: 22nd PODS, pp. 211–222 (2003)
Gentry, C.: Fully Homomorphic encryption using ideal lattices. In: 41st ACM Symposium on Theory of Computing, pp. 169–178 (2009)
Gellman, R.: Privacy in the clouds: risks to privacy and confidentiality from cloud computing. In: World Privacy Forum, 23 February (2009)
Goethals, B.: Survey on frequent pattern mining. Technical report, University of Helsinki (2003)
Giannotti, F., Lakshmanan, L.V.S., Monreale, A., Pedreschi, D., Wang, H.: Privacy-preserving mining of association rules from outsourced transaction databases. IEEE Syst. J. 7(3), 385–395 (2012)
Hu, H., Xu, J., Ren, C., Choi, B.: Processing private queries over untrusted data cloud through privacy homomorphism. In: 27th ICDE, pp. 601–612 (2011)
Mannila, H., Toivonen, H., Verkamo, A.I.: Efficient algorithms for discovering association rules. In: AAAI Workshop Knowledge Discovery in Databases, KDD 1994, pp. 181–192 (1994)
Qiu, L., Li, Y., Wu, X.: Protecting business intelligence and customer privacy while outsourcing data mining tasks. Knowl. Inf. Syst. 17(1), 99–120 (2008)
Rivest, R.L., Adleman, L., Dertouzos, M.L.: On data banks and privacy homomorphisms. In: DeMillo, R.A., et al. (eds.) Foundations of Secure Computation, pp. 169–179. Academic Press, New York (1978)
Rizvi, S., Haritsa, J.R.: Maintaining data privacy in association rule mining. In: 28th VLDB, pp. 682–693 (2002)
Shenoy, P., Haritsa, J.R., Sudarshan, S., Bhalotia, G., Bawa, M., Shah, D.: Turbo-charging vertical mining of large databases. In: 2000 SIGMOD, pp. 22–33 (2000)
Tai, C. H., Yu, P.S., Chen, M.S.: \(k\)-support anonymity based on pseudo taxonomy for outsourcing of frequent itemset mining. In: 16th SIGKDD, pp. 473–482 (2010)
Verykios, V.S., Elmagarmid, A.K., Bertino, E., Saygin, Y., Dasseni, E.: Association rule hiding. IEEE Trans. Knowl. Data Eng. 16(4), 434–447 (2004)
Wang, Y., Wu, X.: Approximate inverse frequent itemset mining: privacy, complexity, approximation. In: 5th ICDM, pp. 482–489 (2005)
Wong, W.K., Cheung, D.W., Hung, E., Kao, B., Mamoulis, N.: Security in outsourcing of association rule mining. In: 33rd VLDB, pp. 111–122 (2007)
Acknowledgements
This work was supported in part by the National Natural Science Foundation of China (61272306), and the Zhejiang Provincial Natural Science Foundation of China (LY12F02024).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Liu, J., Li, J., Xu, S., Fung, B.C. (2015). Secure Outsourced Frequent Pattern Mining by Fully Homomorphic Encryption. In: Madria, S., Hara, T. (eds) Big Data Analytics and Knowledge Discovery. DaWaK 2015. Lecture Notes in Computer Science(), vol 9263. Springer, Cham. https://doi.org/10.1007/978-3-319-22729-0_6
Download citation
DOI: https://doi.org/10.1007/978-3-319-22729-0_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-22728-3
Online ISBN: 978-3-319-22729-0
eBook Packages: Computer ScienceComputer Science (R0)