“…Unfortunately, this body of theory is impractical [19], and thus it is difficult to adopt these general-purpose cryptographic verification techniques to data mining problems for practical verification. Recently several result integrity verification methods have been designed for specific data mining problems, including frequent itemset mining [20,7,8], outlier mining [17], clustering [15]. Among these work, only [20,7,8] focus on integrity verification methods for frequent itemset mining.…”