Mining association rules between sets of items in large databases
SIGMOD '93 Proceedings of the 1993 ACM SIGMOD international conference on Management of data
A database encryption system with subkeys
ACM Transactions on Database Systems (TODS)
Privacy-preserving data mining
SIGMOD '00 Proceedings of the 2000 ACM SIGMOD international conference on Management of data
Breaking substitution ciphers using a relaxation algorithm
Communications of the ACM
Fast Algorithms for Mining Association Rules in Large Databases
VLDB '94 Proceedings of the 20th International Conference on Very Large Data Bases
Privacy preserving mining of association rules
Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining
Cryptography and Relational Database Management Systems
IDEAS '01 Proceedings of the 2001 International Symposium on Database Engineering & Applications
Privacy-Preserving Distributed Mining of Association Rules on Horizontally Partitioned Data
IEEE Transactions on Knowledge and Data Engineering
Authentication and integrity in outsourced databases
ACM Transactions on Storage (TOS)
Anatomy: simple and effective privacy preservation
VLDB '06 Proceedings of the 32nd international conference on Very large data bases
Secure set intersection cardinality with application to association rule mining
Journal of Computer Security
Cryptanalysis of substitution ciphers using scatter search
IWINAC'05 Proceedings of the First international work-conference on the Interplay Between Natural and Artificial Computation conference on Artificial Intelligence and Knowledge Engineering Applications: a bioinspired approach - Volume Part II
Authenticated indexing for outsourced spatial databases
The VLDB Journal — The International Journal on Very Large Data Bases
An audit environment for outsourcing of frequent itemset mining
Proceedings of the VLDB Endowment
Continuous authentication on relational streams
The VLDB Journal — The International Journal on Very Large Data Bases
Privacy-preserving outsourcing support vector machines with random transformation
Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining
k-Support anonymity based on pseudo taxonomy for outsourcing of frequent itemset mining
Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining
Positive and negative association rule mining on XML data streams in database as a service concept
Expert Systems with Applications: An International Journal
AUDIO: an integrity auditing framework of outlier-mining-as-a-service systems
ECML PKDD'12 Proceedings of the 2012 European conference on Machine Learning and Knowledge Discovery in Databases - Volume Part II
Result integrity verification of outsourced frequent itemset mining
DBSec'13 Proceedings of the 27th international conference on Data and Applications Security and Privacy XXVII
Hi-index | 0.00 |
Outsourcing association rule mining to an outside service provider brings several important benefits to the data owner. These include (i) relief from the high mining cost, (ii) minimization of demands in resources, and (iii) effective centralized mining for multiple distributed owners. On the other hand, security is an issue; the service provider should be prevented from accessing the actual data since (i) the data may be associated with private information, (ii) the frequency analysis is meant to be used solely by the owner. This paper proposes substitution cipher techniques in the encryption of transactional data for outsourcing association rule mining. After identifying the non-trivial threats to a straightforward one-to-one item mapping substitution cipher, we propose a more secure encryption scheme based on a one-to-n item mapping that transforms transactions non-deterministically, yet guarantees correct decryption. We develop an effective and efficient encryption algorithm based on this method. Our algorithm performs a single pass over the database and thus is suitable for applications in which data owners send streams of transactions to the service provider. A comprehensive cryptanalysis study is carried out. The results show that our technique is highly secure with a low data transformation cost.