SecEDMO: Enabling Efficient Data Mining with Strong Privacy Protection in Cloud Computing

被引:14
|
作者
Wu, Jiahui [1 ,2 ]
Mu, Nankun [1 ,2 ]
Lei, Xinyu [3 ]
Le, Junqing [1 ,2 ]
Zhang, Di [1 ,2 ]
Liao, Xiaofeng [4 ]
机构
[1] Southwest Univ, Coll Elect & Informat Engn, Chongqing 400715, Peoples R China
[2] Chongqing Key Lab Nonlinear Circuits & Intelligen, Chongqing, Peoples R China
[3] Michigan State Univ, Dept Comp Sci & Engn, E Lansing, MI 48824 USA
[4] Chongqing Univ, Coll Comp, Chongqing 400044, Peoples R China
基金
中国国家自然科学基金;
关键词
Data mining; frequent itemsets mining; association rules mining; privacy protection; cloud computing; ASSOCIATION RULES; ALGORITHMS;
D O I
10.1109/TCC.2019.2932065
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Frequent itemsets mining and association rules mining are among the top used algorithms in the area of data mining. Secure outsourcing of data mining tasks to the third-party cloud is an effective option for data owners. However, due to the untrust cloud and the distrust between data owners, the traditional algorithms which only work over plaintext should be re-considered to take security and privacy concerns into account. For example, each data owner may not be willing to disclose their own private data to others during the cooperative data mining process. The previous solutions are either not sufficiently secure or not efficient. Therefore, we propose a Secure and Efficient Data Mining Outsourcing (SecEDMO) scheme for secure outsourcing of frequent itemsets mining and association rules mining over the joint database (i.e., database aggregated from multiple data owners) in the paradigm of cloud computing. Based on our customized lightweight symmetric homomorphic encryption algorithm and a secure comparison algorithm, SecEDMO can ensure strong privacy protection and low data mining latency simultaneously. Moreover, the well-designed virtual transaction insertion algorithm can hide the information of the original database while still preserving the cloud's ability to perform data mining over the obfuscated data. By evaluation of a numerical experiment and theoretical comparisons, the correctness, security, and efficiency of SecEDMO are confirmed.
引用
收藏
页码:691 / 705
页数:15
相关论文
共 50 条
  • [31] Data Privacy and Trust in Cloud Computing
    Cheng, Kai
    ASLIB JOURNAL OF INFORMATION MANAGEMENT, 2022, 74 (04) : 745 - 746
  • [32] Data Security and Privacy in Cloud Computing
    Sun, Yunchuan
    Zhang, Junsheng
    Xiong, Yongping
    Zhu, Guangyu
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2014,
  • [33] Cloud computing and data protection
    Miralles, Ramon
    IDP-INTERNET LAW AND POLITICS, 2010, (11):
  • [34] Protection or privacy? Data mining and personal data
    Hand, DJ
    ADVANCES IN KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2006, 3918 : 1 - 10
  • [35] Protection of Privacy Data in a Cloud Environment
    Chen, Jeang-Kuo
    Chang, Fang-Sheng
    INTELLIGENT SYSTEMS AND APPLICATIONS (ICS 2014), 2015, 274 : 964 - 971
  • [36] Data Privacy Protection Mechanisms in Cloud
    Singh N.
    Singh A.K.
    Data Science and Engineering, 2018, 3 (1) : 24 - 39
  • [37] Privacy and data protection in cloud scenarios
    Samarati, Pirengila
    PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS, 2012, : 8 - 8
  • [38] Privacy data protection in the public cloud
    Zhan, Xueqiu
    Energy Education Science and Technology Part A: Energy Science and Research, 2012, 30 (SUPPL.2): : 195 - 200
  • [39] Random Response Privacy Data Mining Based on Cloud Computing Resource Association Rules
    Hui Baofeng
    Jia Guoqing
    Chen Shanji
    2018 4TH INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT AND INFORMATION TECHNOLOGY (ICEMIT 2018), 2018, : 1381 - 1384
  • [40] Privacy-preserving Association Rule Mining Algorithm for Encrypted Data in Cloud Computing
    Kim, Hyeong-Jin
    Shin, Jae-Hwan
    Song, Young-ho
    Chang, Jae-Woo
    2019 IEEE 12TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (IEEE CLOUD 2019), 2019, : 487 - 489