SecEDMO: Enabling Efficient Data Mining with Strong Privacy Protection in Cloud Computing

被引:14
|
作者
Wu, Jiahui [1 ,2 ]
Mu, Nankun [1 ,2 ]
Lei, Xinyu [3 ]
Le, Junqing [1 ,2 ]
Zhang, Di [1 ,2 ]
Liao, Xiaofeng [4 ]
机构
[1] Southwest Univ, Coll Elect & Informat Engn, Chongqing 400715, Peoples R China
[2] Chongqing Key Lab Nonlinear Circuits & Intelligen, Chongqing, Peoples R China
[3] Michigan State Univ, Dept Comp Sci & Engn, E Lansing, MI 48824 USA
[4] Chongqing Univ, Coll Comp, Chongqing 400044, Peoples R China
基金
中国国家自然科学基金;
关键词
Data mining; frequent itemsets mining; association rules mining; privacy protection; cloud computing; ASSOCIATION RULES; ALGORITHMS;
D O I
10.1109/TCC.2019.2932065
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Frequent itemsets mining and association rules mining are among the top used algorithms in the area of data mining. Secure outsourcing of data mining tasks to the third-party cloud is an effective option for data owners. However, due to the untrust cloud and the distrust between data owners, the traditional algorithms which only work over plaintext should be re-considered to take security and privacy concerns into account. For example, each data owner may not be willing to disclose their own private data to others during the cooperative data mining process. The previous solutions are either not sufficiently secure or not efficient. Therefore, we propose a Secure and Efficient Data Mining Outsourcing (SecEDMO) scheme for secure outsourcing of frequent itemsets mining and association rules mining over the joint database (i.e., database aggregated from multiple data owners) in the paradigm of cloud computing. Based on our customized lightweight symmetric homomorphic encryption algorithm and a secure comparison algorithm, SecEDMO can ensure strong privacy protection and low data mining latency simultaneously. Moreover, the well-designed virtual transaction insertion algorithm can hide the information of the original database while still preserving the cloud's ability to perform data mining over the obfuscated data. By evaluation of a numerical experiment and theoretical comparisons, the correctness, security, and efficiency of SecEDMO are confirmed.
引用
收藏
页码:691 / 705
页数:15
相关论文
共 50 条
  • [41] Using Homomorphic Encryption to Compute Privacy Preserving Data Mining in a Cloud Computing Environment
    Hammami, Hamza
    Brahmi, Hanen
    Brahmi, Imen
    Ben Yahia, Sadok
    INFORMATION SYSTEMS, EMCIS 2017, 2017, 299 : 397 - 413
  • [42] Efficient privacy-preserved data query over ciphertext in cloud computing
    Song, Wei
    Peng, Zhiyong
    Wang, Qian
    Cheng, Fangquan
    Wu, Xiaoxin
    Cui, Yihui
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (06) : 1049 - 1065
  • [43] An Energy Efficient Data Privacy Scheme for IoT Devices in Mobile Cloud Computing
    Bahrami, Mehdi
    Khan, Arshia
    Singhal, Mukesh
    2016 5TH IEEE INTERNATIONAL CONFERENCE ON MOBILE SERVICES (MS 2016), 2016, : 190 - 195
  • [44] Dynamic searchable encryption with privacy protection for cloud computing
    Ocansey, Selasi Kwame
    Ametepe, Wolali
    Li, Xiao Wei
    Wang, Changda
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2018, 31 (01)
  • [45] Privacy Protection Smartcard Authentication Scheme in Cloud Computing
    FAN Kai
    DENG Hai
    LI Hui
    YANG Yintang
    ChineseJournalofElectronics, 2018, 27 (01) : 41 - 45
  • [46] A Scheme of Memory Privacy Protection in Cloud Computing Environment
    LIU Kehao
    CAO Ming
    FU Nan
    MA Jing
    Wuhan University Journal of Natural Sciences, 2015, 20 (04) : 307 - 312
  • [47] Security and privacy protection in cloud computing: Discussions and challenges
    Sun, PanJun
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2020, 160
  • [48] Research on Privacy Protection Approach for Cloud Computing Environments
    Li, Xiaohui
    Liang, Hongxing
    Jia, Dan
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (03): : 113 - 119
  • [49] Development of a Security Education Model System for Cloud Computing and Data Security and Privacy Protection
    Jia, Rui
    Ni, Xiaoli
    Shao, Xiaoyi
    Zhang, Ting
    Qi, Qunkun
    WIRELESS PERSONAL COMMUNICATIONS, 2023,
  • [50] Attacks classification and data privacy protection in cloud-edge collaborative computing systems
    Devarajan, Mohanarangan Veerappermal
    Yallamelli, Akhil Raj Gaius
    Yalla, Rama Krishna Mani Kanta
    Mamidala, Vijaykumar
    Ganesan, Thirusubramanian
    Sambas, Aceng
    INTERNATIONAL JOURNAL OF PARALLEL EMERGENT AND DISTRIBUTED SYSTEMS, 2024,