Privacy-Preserving in Outsourced Transaction Databases from Association Rules Mining

نویسنده

  • M. M. Waghmare
چکیده

Data mining-as-a-service has been selected as considerable research issue by researchers. An organization (data owner) can outsource its mining needs like resources or expertise to a third party service provider (server). However, both the association rules and the items of the outsourced transaction database are private property of data owner. The data owner encrypts its data, send data and mining queries to the server, and accepts the true patterns from the encrypted patterns received from the server to protect the privacy. The problem of outsourcing transaction database within a corporate privacy framework is studied in this paper. We propose an attack model based on previous knowledge and devise a scheme for privacy preserving outsourced data mining. Our scheme ensures that each transformed data is different with respect to the attacker’s previous information. The experimental results on real transaction database prove that our techniques are scalable, efficient and protect privacy. Index Terms — Privacy-preserving outsourcing, Association rule mining

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Privacy-preserving Mining of Association Rules from Outsourced Transaction Databases

Spurred by developments such as cloud computing, there has been considerable recent interest in the paradigm of datamining-as-service. A company (data owner) lacking in expertise or computational resources can outsource its mining needs to a third party service provider (server). However, both the items and the association rules of the outsourced database are considered private property of the ...

متن کامل

Privacy Preserving Mining of Association Rules from the Outsourced Transaction Databases

Spurred by developments including cloud processing, there has become considerable recent fascination with the paradigm connected with data mining-as-a-service. A corporation (data owner) short of expertise or even computational methods can outsource their mining must a 3rd party service (server). Even so, both the things and the particular association rules on the outsourced database are though...

متن کامل

Introducing an algorithm for use to hide sensitive association rules through perturb technique

Due to the rapid growth of data mining technology, obtaining private data on users through this technology becomes easier. Association Rules Mining is one of the data mining techniques to extract useful patterns in the form of association rules. One of the main problems in applying this technique on databases is the disclosure of sensitive data by endangering security and privacy. Hiding the as...

متن کامل

An Enhance Encryption Scheme For Privacy-Preserving Mining Association Rules In Outsourced Database

Data mining techniques are used to discover hidden information from large databases. Among many data mining techniques, association rule mining is receiving more attention to the researchers to find correlations between items or items sets efficiently. In distributed database environment, the way the data is distributed plays an important role in the problem definition. The data may be distribu...

متن کامل

Privacy-Preserving Mining of Association Rules on Distributed Databases

Data mining techniques can extract hidden but useful information from large databases. Most efficient approaches for mining distributed databases suppose that all of the data at each site can be shared. However, source transaction databases usually include very sensitive information. In order to obtain an accurate mining result on distributed databases and to preserve the private data that is a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014