File Download
Supplementary
-
Citations:
- Appears in Collections:
Conference Paper: Security in Outsourcing of Association Rule Mining
Title | Security in Outsourcing of Association Rule Mining |
---|---|
Authors | |
Issue Date | 2007 |
Publisher | Association for Computing Machinery |
Citation | The 33rd International Conference on Very Large Data Bases, Vienna, Austria, 23-28 September 2007, p. 111-122 How to Cite? |
Abstract | Outsourcing association rule mining to an outside service provider brings several important benefits to the data owner. These include (i) relief from the high mining cost, (ii) minimization of demands in resources, and (iii) effective centralized mining for multiple distributed owners. On the other hand, security is an issue; the service provider should be prevented from accessing the actual data since (i) the data may be associated with private information, (ii) the frequency analysis is meant to be used solely by the owner. This paper proposes substitution cipher techniques in the encryption of transactional data for outsourcing association rule mining. After identifying the non-trivial threats to a straightforward one-to-one item mapping substitution cipher, we propose a more secure encryption scheme based on a one-to-n item mapping that transforms transactions non-deterministically, yet guarantees correct decryption. We develop an effective and efficient encryption algorithm based on this method. Our algorithm performs a single pass over the database and thus is suitable for applications in which data owners send streams of transactions to the service provider. A comprehensive cryptanalysis study is carried out. The results show that our technique is highly secure with a low data transformation cost. |
Persistent Identifier | http://hdl.handle.net/10722/93304 |
ISBN |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Wong, WK | en_HK |
dc.contributor.author | Cheung, DWL | en_HK |
dc.contributor.author | Hung, E | en_HK |
dc.contributor.author | Kao, CM | en_HK |
dc.contributor.author | Mamoulis, N | en_HK |
dc.date.accessioned | 2010-09-25T14:57:03Z | - |
dc.date.available | 2010-09-25T14:57:03Z | - |
dc.date.issued | 2007 | en_HK |
dc.identifier.citation | The 33rd International Conference on Very Large Data Bases, Vienna, Austria, 23-28 September 2007, p. 111-122 | - |
dc.identifier.isbn | 978-1-59593-649-3 | - |
dc.identifier.uri | http://hdl.handle.net/10722/93304 | - |
dc.description.abstract | Outsourcing association rule mining to an outside service provider brings several important benefits to the data owner. These include (i) relief from the high mining cost, (ii) minimization of demands in resources, and (iii) effective centralized mining for multiple distributed owners. On the other hand, security is an issue; the service provider should be prevented from accessing the actual data since (i) the data may be associated with private information, (ii) the frequency analysis is meant to be used solely by the owner. This paper proposes substitution cipher techniques in the encryption of transactional data for outsourcing association rule mining. After identifying the non-trivial threats to a straightforward one-to-one item mapping substitution cipher, we propose a more secure encryption scheme based on a one-to-n item mapping that transforms transactions non-deterministically, yet guarantees correct decryption. We develop an effective and efficient encryption algorithm based on this method. Our algorithm performs a single pass over the database and thus is suitable for applications in which data owners send streams of transactions to the service provider. A comprehensive cryptanalysis study is carried out. The results show that our technique is highly secure with a low data transformation cost. | - |
dc.language | eng | en_HK |
dc.publisher | Association for Computing Machinery | - |
dc.relation.ispartof | VLDB '07 Proceedings of the 33rd international conference on Very large data bases | en_HK |
dc.title | Security in Outsourcing of Association Rule Mining | en_HK |
dc.type | Conference_Paper | en_HK |
dc.identifier.email | Cheung, DWL: dcheung@cs.hku.hk | en_HK |
dc.identifier.email | Kao, CM: kao@cs.hku.hk | en_HK |
dc.identifier.email | Mamoulis, N: nikos@cs.hku.hk | en_HK |
dc.identifier.authority | Cheung, DWL=rp00101 | en_HK |
dc.identifier.authority | Kao, CM=rp00123 | en_HK |
dc.identifier.authority | Mamoulis, N=rp00155 | en_HK |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.hkuros | 129373 | en_HK |