2017
DOI: 10.1109/tsc.2015.2484318
|View full text |Cite
|
Sign up to set email alerts
|

Target-Based, Privacy Preserving, and Incremental Association Rule Mining

Abstract: We consider a special case in association rule mining where mining is conducted by a third party over data located at a central location that is updated from several source locations. The data at the central location is at rest while that flowing in through source locations is in motion. We impose some limitations on the source locations, so that the central target location tracks and privatizes changes and a third party mines the data incrementally. Our results show high efficiency, privacy and accuracy of ru… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(4 citation statements)
references
References 37 publications
(52 reference statements)
0
4
0
Order By: Relevance
“…Various countermeasures (including secret-key dividing, ciphertext characterizing and mining share) are adopted to resist different kinds of attacks from the data owners, the cloud, and the outside adversary. Schemes [8], [11], [12] Schemes [6]- [9] Classic Solutions…”
Section: Main Contributionsmentioning
confidence: 99%
“…Various countermeasures (including secret-key dividing, ciphertext characterizing and mining share) are adopted to resist different kinds of attacks from the data owners, the cloud, and the outside adversary. Schemes [8], [11], [12] Schemes [6]- [9] Classic Solutions…”
Section: Main Contributionsmentioning
confidence: 99%
“…The mining of strong fuzzy association rules can be divided into two steps: (i) generate frequent sets from fuzzy databases according to the D Min−supp ; (ii) generate candidate rule sets from frequent sets, calculate the D conf of each rule set, and obtain a strong fuzzy association rule set according to D Min−conf [14]. This process requires the entire database to be analysed whenever the D conf of a candidate rule is calculated, which results in several database scanning operations.…”
Section: Fuzzy Association Rule Miningmentioning
confidence: 99%
“…Li et al (2016) developed an efficient homomorphic encryption scheme that rendered the protection to the data of the cloud owner, but there was no outsourced comparison method. Ahluwalia et al (2017) utilized the target-based privatized incremental rule update algorithm that provided a greater degree of efficiency and privacy. On the other hand, the accuracy of the rules was better for a minute and moderate update in the huge volumes of data.…”
Section: Literature Surveymentioning
confidence: 99%