Skip to main content

Secure Outsourced Frequent Pattern Mining by Fully Homomorphic Encryption

  • Conference paper
  • First Online:
Big Data Analytics and Knowledge Discovery (DaWaK 2015)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 9263))

Included in the following conference series:

Abstract

With the advent of the big data era, outsourcing data storage together with data mining tasks to cloud service providers is becoming a trend, which however incurs security and privacy issues. To address the issues, this paper proposes two protocols for mining frequent patterns securely on the cloud by employing fully homomorphic encryption. One protocol requires little communication between the client and the cloud service provider, the other incurs less computation cost. Moreover, a new privacy notion, namely \(\alpha \)-pattern uncertainty, is proposed to reinforce the second protocol. Our scenario has two advantages: one is stronger privacy protection, and the other is that the outsourced data can be used in different mining tasks. Experimental evaluation demonstrates that the proposed protocols provide a feasible solution to the issues.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    http://miles.cnuce.cnr.it/~palmeri/datam/DCI/datasets.php/.

  2. 2.

    http://fimi.cs.helsinki.fi/data/.

  3. 3.

    https://gmplib.org/.

References

  1. Agarwal, R., Aggarwal, C., Prasad, V.V.V.: Depth first generation of long patterns. In: 6th SIGKDD, pp. 108–118 (2000)

    Google Scholar 

  2. Aggarwal, C.C., Yu, P.S.: Privacy-preserving Data Mining: Models and Algorithms. Springer-Verlag, Boston (2008)

    Book  Google Scholar 

  3. Agrawal, R., Imielinski, T., Swami, A.: Mining association rules between sets of items in large databases. In: 1993 SIGMOD, pp. 207–216 (1993)

    Google Scholar 

  4. Agrawal, R., Srikant, R.: Fast algorithms for mining association rules. In: Research Report RJ 9839. IBM Almaden Research Center, San Jose, CA (1994)

    Google Scholar 

  5. Atzori, M., Bonchi, F., Giannotti, F., Pedreschi, D.: Anonymity preserving pattern discovery. VLDB J. 17(4), 703–727 (2008)

    Article  Google Scholar 

  6. Chu, Y.-W., Tai, C.-H., Chen, M.-S., Yu, P.S.: Privacy-preserving simrank over distributed information network. In: 12th ICDM, pp. 840–845 (2012)

    Google Scholar 

  7. van Dijk, M., Gentry, C., Halevi, S., Vaikuntanathan, V.: Fully homomorphic encryption over the integers. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 24–43. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  8. Evfimievski, A., Gehrke, J., Srikant, R.: Limiting privacy breaches in privacy preserving data mining. In: 22nd PODS, pp. 211–222 (2003)

    Google Scholar 

  9. Gentry, C.: Fully Homomorphic encryption using ideal lattices. In: 41st ACM Symposium on Theory of Computing, pp. 169–178 (2009)

    Google Scholar 

  10. Gellman, R.: Privacy in the clouds: risks to privacy and confidentiality from cloud computing. In: World Privacy Forum, 23 February (2009)

    Google Scholar 

  11. Goethals, B.: Survey on frequent pattern mining. Technical report, University of Helsinki (2003)

    Google Scholar 

  12. Giannotti, F., Lakshmanan, L.V.S., Monreale, A., Pedreschi, D., Wang, H.: Privacy-preserving mining of association rules from outsourced transaction databases. IEEE Syst. J. 7(3), 385–395 (2012)

    Article  Google Scholar 

  13. Hu, H., Xu, J., Ren, C., Choi, B.: Processing private queries over untrusted data cloud through privacy homomorphism. In: 27th ICDE, pp. 601–612 (2011)

    Google Scholar 

  14. Mannila, H., Toivonen, H., Verkamo, A.I.: Efficient algorithms for discovering association rules. In: AAAI Workshop Knowledge Discovery in Databases, KDD 1994, pp. 181–192 (1994)

    Google Scholar 

  15. Qiu, L., Li, Y., Wu, X.: Protecting business intelligence and customer privacy while outsourcing data mining tasks. Knowl. Inf. Syst. 17(1), 99–120 (2008)

    Article  Google Scholar 

  16. Rivest, R.L., Adleman, L., Dertouzos, M.L.: On data banks and privacy homomorphisms. In: DeMillo, R.A., et al. (eds.) Foundations of Secure Computation, pp. 169–179. Academic Press, New York (1978)

    Google Scholar 

  17. Rizvi, S., Haritsa, J.R.: Maintaining data privacy in association rule mining. In: 28th VLDB, pp. 682–693 (2002)

    Google Scholar 

  18. Shenoy, P., Haritsa, J.R., Sudarshan, S., Bhalotia, G., Bawa, M., Shah, D.: Turbo-charging vertical mining of large databases. In: 2000 SIGMOD, pp. 22–33 (2000)

    Google Scholar 

  19. Tai, C. H., Yu, P.S., Chen, M.S.: \(k\)-support anonymity based on pseudo taxonomy for outsourcing of frequent itemset mining. In: 16th SIGKDD, pp. 473–482 (2010)

    Google Scholar 

  20. Verykios, V.S., Elmagarmid, A.K., Bertino, E., Saygin, Y., Dasseni, E.: Association rule hiding. IEEE Trans. Knowl. Data Eng. 16(4), 434–447 (2004)

    Article  Google Scholar 

  21. Wang, Y., Wu, X.: Approximate inverse frequent itemset mining: privacy, complexity, approximation. In: 5th ICDM, pp. 482–489 (2005)

    Google Scholar 

  22. Wong, W.K., Cheung, D.W., Hung, E., Kao, B., Mamoulis, N.: Security in outsourcing of association rule mining. In: 33rd VLDB, pp. 111–122 (2007)

    Google Scholar 

Download references

Acknowledgements

This work was supported in part by the National Natural Science Foundation of China (61272306), and the Zhejiang Provincial Natural Science Foundation of China (LY12F02024).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Junqiang Liu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Liu, J., Li, J., Xu, S., Fung, B.C. (2015). Secure Outsourced Frequent Pattern Mining by Fully Homomorphic Encryption. In: Madria, S., Hara, T. (eds) Big Data Analytics and Knowledge Discovery. DaWaK 2015. Lecture Notes in Computer Science(), vol 9263. Springer, Cham. https://doi.org/10.1007/978-3-319-22729-0_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-22729-0_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-22728-3

  • Online ISBN: 978-3-319-22729-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics