JOURNAL ARTICLE

Verifiable Privacy-Preserving Outsourced Frequent Itemset Mining on Vertically Partitioned Databases

Zhen ZhaoLei LanBaocang WangJianchang Lai

Year: 2023 Journal:   Electronics Vol: 12 (8)Pages: 1952-1952   Publisher: Multidisciplinary Digital Publishing Institute

Abstract

In the data era, to simultaneously relieve the heavy computational burden of mining data information from data owners and protecting data privacy, privacy-preserving frequent itemset mining (PPFIM) is presented and has attracted much attention. In PPFIM, data owners and miners outsource the complex task of data mining to the cloud server, which supports strong storage and computing power, and the cloud server cannot extract additional data privacy other than that which is shown by data owners or miners. However, most existing solutions assume that cloud servers will honestly perform the mining process and return the correct results, whereas cloud services are usually provided by a charging third party that may in practice return incorrect results due to computation errors, malicious or criminal activities, etc. To solve this problem, in this paper, we present a verifiable PPFIM protocol on vertically partitioned databases to support the verifiability of the integrity of the mining results, where data owners can authorize the cloud server to perform federated mining on vertically partitioned databases without leaking data information and detect dishonest behaviors in the cloud server from the returned results. We adopt a dual cloud setting to enable data owners to be offline after uploading their encrypted databases to the cloud server, which further relieves the burden on data owners. We implement our protocol and give a detailed analysis in terms of verification accuracy, which shows that the dishonest behaviors of the cloud server can be detected with a probability close to 1 and a sacrifice of only a 1% increase in database size.

Keywords:
Cloud computing Computer science Database Upload Outsourcing Server Encryption Computer security Cloud server Information privacy Protocol (science) Verifiable secret sharing Task (project management) Computer network World Wide Web Business Engineering

Metrics

2
Cited By
0.51
FWCI (Field Weighted Citation Impact)
27
Refs
0.64
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Privacy-Preserving Technologies in Data
Physical Sciences →  Computer Science →  Artificial Intelligence
Data Mining Algorithms and Applications
Physical Sciences →  Computer Science →  Information Systems
Imbalanced Data Classification Techniques
Physical Sciences →  Computer Science →  Artificial Intelligence

Related Documents

JOURNAL ARTICLE

Privacy-Preserving-Outsourced Association Rule Mining on Vertically Partitioned Databases

Lichun LiRongxing LuKim‐Kwang Raymond ChooAnwitaman DattaJun Shao

Journal:   IEEE Transactions on Information Forensics and Security Year: 2016 Vol: 11 (8)Pages: 1847-1861
JOURNAL ARTICLE

Privacy-Preserving Outsourced Association Rule Mining on Vertically Partitioned Databases

K. GeethaK Gurunadha GupthaSts Prasad

Journal:   International Journal of Scientific Research in Computer Science, Engineering and Information Technology Year: 2017 Vol: 2 (4)Pages: 280-286
BOOK-CHAPTER

Collaborative Privacy Preserving Frequent Item Set Mining in Vertically Partitioned Databases

Ehud GudesB.A. Rozenberg

IFIP International Federation for Information Processing/IFIP Year: 2004 Pages: 91-104
© 2026 ScienceGate Book Chapters — All rights reserved.