2022
DOI: 10.1109/tcc.2019.2932065
|View full text |Cite
|
Sign up to set email alerts
|

SecEDMO: Enabling Efficient Data Mining with Strong Privacy Protection in Cloud Computing

Abstract: Frequent itemsets mining and association rules mining are among the top used algorithms in the area of data mining. Secure outsourcing of data mining tasks to the third-party cloud is an effective option for data owners. However, due to the untrust cloud and the distrust between data owners, the traditional algorithms which only work over plaintext should be re-considered to take security and privacy concerns into account. For example, each data owner may not be willing to disclose their own private data to ot… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
8
1

Relationship

1
8

Authors

Journals

citations
Cited by 17 publications
(8 citation statements)
references
References 28 publications
(54 reference statements)
0
6
0
Order By: Relevance
“…For continuous datasets with uniform distribution and small sample size, the soft statistical method based on Gaussian kernel is used to calculate the local density. The formula for calculating local density based on truncated kernel is shown in (1), where χ(d) means that when the variable value d is greater than 0, χ(d) takes 0, otherwise takes 1, and the formula is shown in (2). The formula for calculating local density based on Gaussian kernel is shown in (3).…”
Section: A Dpc Algorithmmentioning
confidence: 99%
See 1 more Smart Citation
“…For continuous datasets with uniform distribution and small sample size, the soft statistical method based on Gaussian kernel is used to calculate the local density. The formula for calculating local density based on truncated kernel is shown in (1), where χ(d) means that when the variable value d is greater than 0, χ(d) takes 0, otherwise takes 1, and the formula is shown in (2). The formula for calculating local density based on Gaussian kernel is shown in (3).…”
Section: A Dpc Algorithmmentioning
confidence: 99%
“…It is very important to mine valuable information and models from massive data. In the era of big data, the data sharing mode based on data release [1] and data mining [2] has gradually taken shape. When various kinds of information are digitized, privacy leakage is becoming more and more serious, and privacy security is also getting more and more attention.…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, directly employing MPC in our setting would require users to interact with each other whenever a coarse aggregate statistic needs to be computed. Such an interaction model may not be desirable in practical settings, especially in a client-server computation model as often seen in cloud computing applications [12], [13]. 3) Homomorphic encryption: Fully homomorphic cryptosystems can support general computation on ciphertexts but less efficient which result in a solution that is impractical [14].…”
Section: Privacy-preserving Techniques and Systemsmentioning
confidence: 99%
“…Therefore, how to design an efficient outsourcing scheme that enables the client to securely and correctly find the set of all solutions is an interesting problem. Moreover, for some strong threat model including outside adversary [44], our scheme may suffer from unauthorized attack. It is meaningful to improve our scheme to resist this attack.…”
Section: Conclusion and Future Directionmentioning
confidence: 99%