Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

Verifiable privacy-preserving association rule mining using distributed decryption mechanism on the cloud

Published: 01 September 2022 Publication History

Abstract

As one of the important ways in data mining, the association rule mining is to analyze the correlation of transactions based on massive data and mine the hidden valuable information. However, excessive data collection and analysis might lead to the privacy leakage of user data and the damage of data integrity. Meanwhile, in the existing privacy-preserving schemes, the cloud servers such as the evaluator have strong decryption capabilities, which causes active attacks easily, or data reliability in mining and analysis is not considered. In response to these problems, this paper proposes a verifiable privacy-preserving association rule mining scheme (VPPARM) using distributed decryption mechanism on the cloud. First, the scheme adopts distributed decryption to complete the data mining tasks through the dual-cloud servers, which weakens the decryption ability of the cloud servers and prevents the server from active attacks. Secondly, to protect the privacy of the association rule mining process, our scheme adopts adding virtual transactions, permutations, and random number masking collaboratively to hide the data in the whole mining process. In addition, to eliminate the hidden danger of illegal users, our scheme adopts a verifiable short digital signature scheme to verify data integrity and ensure data reliability, avoiding the poisoning attack. Finally, through the performance evaluation, the results demonstrate that our scheme realizes correctness, security, reliability with lower communication and computation costs and improves efficiency to a certain extent.

Highlights

This paper proposes a verifiable privacy-preserving ARM scheme.
This scheme stores two weak private keys realizing jointly decryption ciphertext.
The BLS signature scheme verifies data integrity and legitimacy.
The CSP uses adding virtual transactions, permutation, and random number methods.

References

[1]
Agrawal R., Imieliński T., Swami A., Mining association rules between sets of items in large databases, in: Proceedings of the 1993 ACM SIGMOD international conference on management of data, Washington, ACM Press, 1993, pp. 207–216,.
[2]
Altay E.V., Alatas B., Differential evolution and sine cosine algorithm based novel hybrid multi-objective approaches for numerical association rule mining, Information Science 554 (2021) 198–221,.
[3]
Boneh D., Lynn B., Shacham H., Short signatures from the weil pairing, in: Proceedings of the 7th international conference on the theory and application of cryptology and information security, 2248, Springer, 2001, pp. 514–532,.
[4]
Bost R., Popa R.A., Tu S., Goldwasser S., Machine learning classification over encrypted data, in: Proceedings of the security symposium on network and distributed system, The Internet Society, 2015, pp. 1–34,.
[5]
Bresson E., Catalano D., Pointcheval D., A simple public-key cryptosystem with a double trapdoor decryption mechanism and its applications, in: Proceedings of the international conference on advances in cryptology-asiacrypt, Springer, 2003, pp. 37–54,.
[6]
Chahar H., Keshavamurthy B.N., Modi C., Privacy-preserving distributed mining of association rules using elliptic-curve cryptosystem and Shamir’s secret sharing scheme, Sádhaná 42 (2017) 1997–2007,.
[7]
Chen X., Li J., Weng J., Ma J., Lou W., Verifiable computation over large database with incremental updates, IEEE Transactions on Computers 65 (10) (2016) 3184–3195,.
[8]
Damgård I., Ishai Y., Krøigaard M., Nielsen J.B., Smith A., Scalable multiparty computation with nearly optimal work and resilience, in: Proceedings of the 28th annual conference on cryptology, Springer, 2008, pp. 241–261,.
[9]
Dan B., Goh E.J., Nissim K., Evaluating 2-DNF formulas on ciphertexts, in: Proceedings of the international conference on theory of cryptography, Springer, 2005, pp. 325–341,.
[10]
Dong C., Chen L., Wen Z., When private set intersection meets big data: an efficient and scalable protocol, in: Proceedings of the 2013 ACM SIGSAC conference on computer and communications security, ACM, 2013, pp. 789–800,.
[11]
Du M., Wang K., Xia Z., Zhang Y., Differential privacy preserving of training model in wireless big data with edge computing, IEEE Transactions on Big Data 6 (2) (2020) 283–295,.
[12]
El Gamal T., A public key cryptosystem and a signature scheme based on discrete logarithms, Proceedings of CRYPTO ’84, Advances in Cryptology, Springer, 1984, pp. 10–18,.
[13]
Gkoulalas-Divanis A., Verykios V.S., Association rule hiding for data mining, Advances in database systems, vol. 41, Kluwer, 2010,. URL https://doi.org/10.1007/978-1-4419-6569-1.
[14]
Hammami H., Brahmi H., Brahmi I., Yahia S.B., Using homomorphic encryption to compute privacy preserving data mining in a cloud computing environment, in: Proceedings of the European, mediterranean, and middle eastern conference on information systems, Springer, 2017, pp. 397–413,.
[15]
Hussien A., Hamza N., Hefny H., Attacks on anonymization-based privacy-preserving: A survey for data mining and data publishing, Journal of Information Security 4 (2) (2013) 101–112,.
[16]
Kalai Y.T., Paneth O., Yang L., How to delegate computations publicly, in: Proceedings of the 51st annual ACM SIGACT symposium on theory of computing, ACM, 2019, pp. 1115–1124,.
[17]
Kantarcioglu M., Clifton C., Privacy-preserving distributed mining of association rules on horizontally partitioned data, IEEE Transactions on Knowledge and Data Engineering 16 (9) (2004) 1026–1037,.
[18]
Lai J., Li Y., Deng R.H., Weng J., Guan C., Yan Q., Towards semantically secure outsourcing of association rule mining on categorical data, Information Sciences 267 (2014) 267–286,.
[19]
Li L., Lu R., Choo K.K.R., Datta A., Shao J., Privacy-preserving-outsourced association rule mining on vertically partitioned databases, IEEE Transactions on Information Forensics and Security 11 (8) (2016) 1847–1861,.
[20]
Liao G., Chen X., Huang J., Prospect theoretic analysis of privacy-preserving mechanism, IEEE ACM Transactions on Networking 28 (1) (2019) 71–83,.
[21]
Liu L., Su J., Chen R., Liu X., Wang X., Chen S., Leung H., Privacy-preserving mining of association rule on outsourced cloud data from multiple parties, in: Proceedings of Australasian conference on information security and privacy, Springer, 2018, pp. 431–451,.
[22]
Ma Z., Ma J., Miao Y., Choo K.-K.R., Liu X., Wang X., Yang T., PMKT: Privacy-preserving multi-party knowledge transfer for financial market forecasting, Future Generation Computer Systems 106 (2020) 545–558,.
[23]
Ma C., Wang B., Jooste K., Zhang Z., & Ping Y., Practical privacy-preserving frequent itemset mining on supermarket transactions, IEEE Systems Journal 14 (2) (2020) 1992–2002,.
[24]
Modi C.N., Patil A.R., Privacy preserving association rule mining in horizontally partitioned databases without involving trusted third party (TTP), in: Proceedings of 3rd international conference on advanced computing, networking and informatics, ACM, 2016, pp. 549–555.
[25]
Nasr M., Hamdy M., Hegazy D., Bahnasy K., An efficient algorithm for unique class association rule mining, Expert System Application 164 (2021),.
[26]
Paillier P., Public-key cryptosystems based on composite degree residuosity classes, in: Proceedings of international conference on the theory and application of cryptographic techniques, 1592, Springer, 1999, pp. 223–238,.
[27]
Pang H., Wang B., Privacy-preserving association rule mining using homomorphic encryption in a multikey environment, IEEE Systems Journal 15 (2) (2021) 3131–3141,.
[28]
Peter A., Tews E., Katzenbeisser S., Efficiently outsourcing multiparty computation under multiple keys, IEEE Transactions on Information Forensics and Security 8 (12) (2013) 2046–2058,.
[29]
Qiu S., Wang B., Li M., Liu J., Shi Y., Toward practical privacy-preserving frequent itemset mining on encrypted cloud data, IEEE Transactions on Cloud Computing 8 (1) (2020) 312–323,.
[30]
Rivest R.L., Adleman L., Dertouzos M.L., On databanks and privacy homomorphism, Foundations of Secure Computation 4 (11) (1978) 169–180.
[31]
Rizvi S.J., Haritsa.J.R., Maintaining data privacy in association rule mining, in: Proceedings of the 28th international conference on very large databases, Morgan Kaufmann, 2002, pp. 682–693,.
[32]
Rong H., Liu J., Wu W., Hao J., Wang H., Xian M., Toward fault-tolerant and secure frequent itemset mining outsourcing in hybrid cloud environment, Computers & Security 98 (2020),.
[33]
Rong H., Wang H., Liu J., Tang F., Xian M., Verifiable and privacy-preserving association rule mining in hybrid cloud environment, in: Proceedings of the international conference on green, pervasive, and cloud computing, Springer, 2018, pp. 33–48,.
[34]
Ruan M., Ahmad M., Wang Y., Secure and privacy-preserving consensus, IEEE Transactions on Automatic Control 64 (10) (2019) 4035–4049,.
[35]
Telikani A., Gandomi A.H., Shahbahrami A., Dehkordi M.N., Privacy-preserving in association rule mining using an improved discrete binary artificial bee colony, Expert Systems with Applications 144 (2020),.
[36]
Telikani A., Shahbahrami A., Gandomi A.H., High-performance implementation of evolutionary privacy-preserving algorithm for big data using GPU platform, Information Sciences 579 (2021) 251–265,.
[37]
Vaidya J., Clifton C., Privacy preserving association rule mining in vertically partitioned data, in: Proceedings of the eighth ACM SIGKDD international conference on knowledge discovery and data mining, ACM, 2002, pp. 639–644,.
[38]
Yang H., Su Y., Qin J., Wang H., Privacy-preserving outsourced inner product computation on encrypted database, IEEE Transactions on Dependable and Secure Computing 99 (2020) 1,.
[39]
Yi X., Rao F., Bertino E., Bouguettaya A., Privacy-preserving association rule mining in cloud computing, in: Proceedings of the 10th ACM symposium on information, computer and communications security, ACM, 2015, pp. 439–450,.
[40]
Zhang X., Jiang T., Li K., Castiglione A., Chen X., New publicly verifiable computation for batch matrix multiplication, Information Sciences 479 (2019) 664–678,.
[41]
Zhang L., Wang W., Zhang Y., Privacy preserving association rule mining: Taxonomy, techniques, and metrics, IEEE Access 7 (2019) 45032–45047,.

Cited By

View all

Index Terms

  1. Verifiable privacy-preserving association rule mining using distributed decryption mechanism on the cloud
            Index terms have been assigned to the content through auto-classification.

            Recommendations

            Comments

            Please enable JavaScript to view thecomments powered by Disqus.

            Information & Contributors

            Information

            Published In

            cover image Expert Systems with Applications: An International Journal
            Expert Systems with Applications: An International Journal  Volume 201, Issue C
            Sep 2022
            1333 pages

            Publisher

            Pergamon Press, Inc.

            United States

            Publication History

            Published: 01 September 2022

            Author Tags

            1. Verifiable
            2. Association rule mining
            3. Privacy-preserving
            4. Active attack
            5. Poisoning attack

            Qualifiers

            • Research-article

            Contributors

            Other Metrics

            Bibliometrics & Citations

            Bibliometrics

            Article Metrics

            • 0
              Total Citations
            • 0
              Total Downloads
            • Downloads (Last 12 months)0
            • Downloads (Last 6 weeks)0
            Reflects downloads up to 14 Dec 2024

            Other Metrics

            Citations

            Cited By

            View all

            View Options

            View options

            Media

            Figures

            Other

            Tables

            Share

            Share

            Share this Publication link

            Share on social media