SecEDMO: Enabling Efficient Data Mining with Strong Privacy Protection in Cloud Computing

被引:14
|
作者
Wu, Jiahui [1 ,2 ]
Mu, Nankun [1 ,2 ]
Lei, Xinyu [3 ]
Le, Junqing [1 ,2 ]
Zhang, Di [1 ,2 ]
Liao, Xiaofeng [4 ]
机构
[1] Southwest Univ, Coll Elect & Informat Engn, Chongqing 400715, Peoples R China
[2] Chongqing Key Lab Nonlinear Circuits & Intelligen, Chongqing, Peoples R China
[3] Michigan State Univ, Dept Comp Sci & Engn, E Lansing, MI 48824 USA
[4] Chongqing Univ, Coll Comp, Chongqing 400044, Peoples R China
基金
中国国家自然科学基金;
关键词
Data mining; frequent itemsets mining; association rules mining; privacy protection; cloud computing; ASSOCIATION RULES; ALGORITHMS;
D O I
10.1109/TCC.2019.2932065
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Frequent itemsets mining and association rules mining are among the top used algorithms in the area of data mining. Secure outsourcing of data mining tasks to the third-party cloud is an effective option for data owners. However, due to the untrust cloud and the distrust between data owners, the traditional algorithms which only work over plaintext should be re-considered to take security and privacy concerns into account. For example, each data owner may not be willing to disclose their own private data to others during the cooperative data mining process. The previous solutions are either not sufficiently secure or not efficient. Therefore, we propose a Secure and Efficient Data Mining Outsourcing (SecEDMO) scheme for secure outsourcing of frequent itemsets mining and association rules mining over the joint database (i.e., database aggregated from multiple data owners) in the paradigm of cloud computing. Based on our customized lightweight symmetric homomorphic encryption algorithm and a secure comparison algorithm, SecEDMO can ensure strong privacy protection and low data mining latency simultaneously. Moreover, the well-designed virtual transaction insertion algorithm can hide the information of the original database while still preserving the cloud's ability to perform data mining over the obfuscated data. By evaluation of a numerical experiment and theoretical comparisons, the correctness, security, and efficiency of SecEDMO are confirmed.
引用
收藏
页码:691 / 705
页数:15
相关论文
共 50 条
  • [21] A full lifecycle privacy protection scheme for sensitive data in cloud computing
    Xiong, Jinbo
    Li, Fenghua
    Ma, Jianfeng
    Liu, Ximeng
    Yao, Zhiqiang
    Chen, Patrick S.
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2015, 8 (06) : 1025 - 1037
  • [22] Privacy Protection and Data Security in Cloud Computing: A Survey, Challenges, and Solutions
    Sun, Pan Jun
    IEEE ACCESS, 2019, 7 : 147420 - 147452
  • [23] A User-Centric Method for Data Privacy Protection in Cloud Computing
    Li, Xiaohui
    He, Jingsha
    2011 INTERNATIONAL CONFERENCE ON COMPUTER, ELECTRICAL, AND SYSTEMS SCIENCES, AND ENGINEERING (CESSE 2011), 2011, : 355 - +
  • [24] A Medical Data Privacy Protection Scheme Based on Blockchain and Cloud Computing
    Huang, Liang
    Lee, Hyung-Hyo
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2020, 2020
  • [25] Privacy and data protection in mobile cloud computing: A systematic mapping study
    Alnajrani, Hussain Mutlaq
    Norman, Azah Anir
    Ahmed, Babiker Hussien
    PLOS ONE, 2020, 15 (06):
  • [26] Privacy Protection in Data Mining
    Fu, Chunchang
    Zhang, Nan
    2010 INTERNATIONAL CONFERENCE ON MANAGEMENT SCIENCE AND ENGINEERING (MSE 2010), VOL 2, 2010, : 92 - 93
  • [27] Research on the Random Corresponding of Privacy Data Mining in the Association Rules of Cloud Computing
    Hui, Baofeng
    Jia, Guoqing
    Chen, Shanji
    2018 INTERNATIONAL SYMPOSIUM ON POWER ELECTRONICS AND CONTROL ENGINEERING (ISPECE 2018), 2019, 1187
  • [28] Efficient Privacy-Preserving Spatial Data Query in Cloud Computing
    Miao, Yinbin
    Yang, Yutao
    Li, Xinghua
    Wei, Linfeng
    Liu, Zhiquan
    Deng, Robert H.
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2024, 36 (01) : 122 - 136
  • [29] ROBUST AND PRIVACY PROTECTION AUTHENTICATION IN CLOUD COMPUTING
    Huang, Jheng-Jia
    Juang, Wen-Shenq
    Fan, Chun-I
    Liaw, Horng-Twu
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2013, 9 (11): : 4247 - 4261
  • [30] Wind power prediction method based on cloud computing and data privacy protection
    Zhang, Lei
    Zhu, Shaoming
    Su, Shen
    Chen, Xiaofeng
    Yang, Yan
    Zhou, Bing
    JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2024, 13 (01):