SecEDMO: Enabling Efficient Data Mining with Strong Privacy Protection in Cloud Computing

被引:14
|
作者
Wu, Jiahui [1 ,2 ]
Mu, Nankun [1 ,2 ]
Lei, Xinyu [3 ]
Le, Junqing [1 ,2 ]
Zhang, Di [1 ,2 ]
Liao, Xiaofeng [4 ]
机构
[1] Southwest Univ, Coll Elect & Informat Engn, Chongqing 400715, Peoples R China
[2] Chongqing Key Lab Nonlinear Circuits & Intelligen, Chongqing, Peoples R China
[3] Michigan State Univ, Dept Comp Sci & Engn, E Lansing, MI 48824 USA
[4] Chongqing Univ, Coll Comp, Chongqing 400044, Peoples R China
基金
中国国家自然科学基金;
关键词
Data mining; frequent itemsets mining; association rules mining; privacy protection; cloud computing; ASSOCIATION RULES; ALGORITHMS;
D O I
10.1109/TCC.2019.2932065
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Frequent itemsets mining and association rules mining are among the top used algorithms in the area of data mining. Secure outsourcing of data mining tasks to the third-party cloud is an effective option for data owners. However, due to the untrust cloud and the distrust between data owners, the traditional algorithms which only work over plaintext should be re-considered to take security and privacy concerns into account. For example, each data owner may not be willing to disclose their own private data to others during the cooperative data mining process. The previous solutions are either not sufficiently secure or not efficient. Therefore, we propose a Secure and Efficient Data Mining Outsourcing (SecEDMO) scheme for secure outsourcing of frequent itemsets mining and association rules mining over the joint database (i.e., database aggregated from multiple data owners) in the paradigm of cloud computing. Based on our customized lightweight symmetric homomorphic encryption algorithm and a secure comparison algorithm, SecEDMO can ensure strong privacy protection and low data mining latency simultaneously. Moreover, the well-designed virtual transaction insertion algorithm can hide the information of the original database while still preserving the cloud's ability to perform data mining over the obfuscated data. By evaluation of a numerical experiment and theoretical comparisons, the correctness, security, and efficiency of SecEDMO are confirmed.
引用
收藏
页码:691 / 705
页数:15
相关论文
共 50 条
  • [1] Enabling Efficient Decentralized and Privacy Preserving Data Sharing in Mobile Cloud Computing
    Zhang, Jiawei
    Lu, Ning
    Li, Teng
    Ma, Jianfeng
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
  • [2] Data Security and Privacy Protection of Cloud Computing
    Dai Xuebing
    Wang Zhaojing
    Zhang Yan
    ADVANCES IN MECHATRONICS, AUTOMATION AND APPLIED INFORMATION TECHNOLOGIES, PTS 1 AND 2, 2014, 846-847 : 1570 - +
  • [3] Research on the Strategies of Data Privacy Protection in Cloud Computing
    Li, Yi
    Zhang, Bo
    2016 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SECURITY (CSIS 2016), 2016, : 475 - 481
  • [4] A Survey of Data Security and Privacy Protection in Cloud Computing
    Yuan, Zhongbing
    Liu, Xiaojun
    PROCEEDINGS OF THE 2016 6TH INTERNATIONAL CONFERENCE ON MANAGEMENT, EDUCATION, INFORMATION AND CONTROL (MEICI 2016), 2016, 135 : 647 - 651
  • [5] Survey of Privacy Data Protection Technology in Cloud Computing
    Wang, Yang
    2016 3RD INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY FOR EDUCATION (ICTE 2016), 2016, : 143 - 145
  • [6] Enabling efficient and secure data sharing in cloud computing
    Li, Jingwei
    Li, Jin
    Liu, Zheli
    Jia, Chunfu
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2014, 26 (05): : 1052 - 1066
  • [7] Enabling Efficient and Protected Sharing of Data in Cloud Computing
    Aarthi, D.
    Indira, N.
    2016 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2016,
  • [8] DATA PROTECTION AND PRIVACY PROTECTION OF ADVERTISING BASED ON CLOUD COMPUTING PLATFORM
    Chen, Zhishe
    SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2024, 25 (05): : 3484 - 3488
  • [9] Towards Strong Privacy Protection for Association Rule Mining and Query in the Cloud
    Liu, Lin
    Su, Jinshu
    Liu, Ximeng
    Chen, Rongmao
    Huang, Xinyi
    Kou, Guang
    Fu, Shaojing
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023, 11 (03) : 3211 - 3225
  • [10] Fast Range Query Processing with Strong Privacy Protection for Cloud Computing
    Rui Li
    Liu, Alex X.
    Wang, Ann L.
    Bruhadeshwar, Bezawada
    PROCEEDINGS OF THE VLDB ENDOWMENT, 2014, 7 (14): : 1953 - 1964