Verifiable privacy-preserving association rule mining using distributed decryption mechanism on the cloud

As one of the important ways in data mining, the association rule mining is to analyze the correlation of transactions based on massive data and mine the hidden valuable information. However, excessive data collection and analysis might lead to the privacy leakage of user data and the damage of data...

Full description

Saved in:
Bibliographic Details
Published in:Expert systems with applications Vol. 201; p. 117086
Main Authors: Chen, Yange, Zhao, Qingqing, Duan, Pu, Zhang, Benyu, Hong, Zhiyong, Wang, Baocang
Format: Journal Article
Language:English
Published: New York Elsevier Ltd 01.09.2022
Elsevier BV
Subjects:
ISSN:0957-4174, 1873-6793
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:As one of the important ways in data mining, the association rule mining is to analyze the correlation of transactions based on massive data and mine the hidden valuable information. However, excessive data collection and analysis might lead to the privacy leakage of user data and the damage of data integrity. Meanwhile, in the existing privacy-preserving schemes, the cloud servers such as the evaluator have strong decryption capabilities, which causes active attacks easily, or data reliability in mining and analysis is not considered. In response to these problems, this paper proposes a verifiable privacy-preserving association rule mining scheme (VPPARM) using distributed decryption mechanism on the cloud. First, the scheme adopts distributed decryption to complete the data mining tasks through the dual-cloud servers, which weakens the decryption ability of the cloud servers and prevents the server from active attacks. Secondly, to protect the privacy of the association rule mining process, our scheme adopts adding virtual transactions, permutations, and random number masking collaboratively to hide the data in the whole mining process. In addition, to eliminate the hidden danger of illegal users, our scheme adopts a verifiable short digital signature scheme to verify data integrity and ensure data reliability, avoiding the poisoning attack. Finally, through the performance evaluation, the results demonstrate that our scheme realizes correctness, security, reliability with lower communication and computation costs and improves efficiency to a certain extent. •This paper proposes a verifiable privacy-preserving ARM scheme.•This scheme stores two weak private keys realizing jointly decryption ciphertext.•The BLS signature scheme verifies data integrity and legitimacy.•The CSP uses adding virtual transactions, permutation, and random number methods.
Bibliography:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ISSN:0957-4174
1873-6793
DOI:10.1016/j.eswa.2022.117086