Welcome to Francis Academic Press

Academic Journal of Computing & Information Science, 2024, 7(5); doi: 10.25236/AJCIS.2024.070527.

A Review on Technologies of Secure Outsourced Association Rule Mining in Cloud Computing Environment

Author(s)

Wei Wu1, Jialu Hao2,3, Lifang Bai1

Corresponding Author:
Wei Wu
Affiliation(s)

1Information Engineering University, Zhengzhou, 450001, China

2Xi'an Satellite Control Center, Xi'an, 710043, China 

3Henan Key Laboratory of Network Cryptography Technology, Zhengzhou, 450001, China

Abstract

With the rapid development of cloud computing technology, more users are now paying attention to secure and efficient outsourced data mining in cloud computing environment. In this paper, focusing on one of the important data mining tasks, we review existing researches on outsourced association rule mining. We mainly consider three aspects, i.e., privacy protection, result verification and access control of outsourced association rule mining, summarizing the corresponding solutions and analyze their deficiencies. Besides, we propose three future research suggestions. In summary, this paper provides theoretical and technical supports to design secure and efficient outsourced association rule mining solutions.

Keywords

Cloud-based Secure Outsourcing; Association Rule Mining; Privacy Protection; Result Verification; Access Control

Cite This Paper

Wei Wu, Jialu Hao, Lifang Bai. A Review on Technologies of Secure Outsourced Association Rule Mining in Cloud Computing Environment. Academic Journal of Computing & Information Science (2024), Vol. 7, Issue 5: 207-214. https://doi.org/10.25236/AJCIS.2024.070527.

References

[1] Wong W K, Cheung D W, Hung E, et al. Security in outsourcing of association rule mining [C]. In Proceedings of the 33rd international conference on Very large databases. 2007: 111-122.

[2] Tai C-H, Yu P S, Chen M-S. k-Support anonymity based on pseudo taxonomy for outsourcing of frequent itemset mining [C]. In Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining. 2010: 473–482.

[3] Giannotti F, Lakshmanan L V, Monreale A, et al. Privacy-preserving mining of association rules from outsourced transaction databases [J]. IEEE Systems Journal. 2013,7 (3): 385–395.

[4] Li L, Lu R, Choo K-K R, et al. Privacy-preserving outsourced association rule mining on vertically partitioned databases [J]. IEEE Transactions on Information Forensics and Security. 2016, 11 (8): 1847–1861.

[5] Molloy I, Li N, Li T. On the (in) security and (im) practicality of outsourcing precise association rule mining [C]. In 2009 Ninth IEEE International Conference on Data Mining. 2009: 872–877.

[6] Wang B, Zhan Y, Zhang Z. Cryptanalysis of a symmetric fully homomorphic encryption scheme [J]. IEEE Transactions on Information Forensics and Security. 2018,13 (6): 1460–1467.

[7] Lai J, Li Y, Deng R H, et al. Towards semantically secure outsourcing of association rule mining on categorical data [J]. Information Sciences. 2014, 267: 267–286.

[8] Lewko A, Okamoto T, Sahai A, et al. Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption [C]. In Annual International Conference on the Theory and Applications of Cryptographic Techniques.2010: 62–91.

[9] Waters B. Dual system encryption: Realizing fully secure IBE and HIBE under simple assumptions [C]. In Annual International Cryptology Conference. 2009:619–636.

[10] Yi X, Rao F-Y, Bertino E, et al. Privacy-preserving association rule mining in cloud computing [C]. In Proceedings of the 10th ACM symposium on information, computer and communications security. 2015: 439–450.

[11] Gennaro R, Jarecki S, Krawczyk H, et al. Secure distributed key generation for discrete-log based cryptosystems [J]. Journal of Cryptology. 2007, 20 (1): 51–83.

[12] Jakobsson M, Juels A. Mix and match: Secure function evaluation via ciphertexts[C]. In International Conference on the Theory and Application of Cryptology and Information Security. 2000: 162–177.

[13] Van Dijk M, Gentry C, Halevi S, et al. Fully homomorphic encryption over the integers [C]. In Annual International Conference on the Theory and Applications of Cryptographic Techniques. 2010: 24–43.

[14] Liu J, Li J, Xu S, et al. Secure outsourced frequent pattern mining by fully homomorphic encryption [C]. In International Conference on Big Data Analytics and Knowledge Discovery. 2015: 70–81.

[15] Imabayashi H, Ishimaki Y, Umayabara A, et al. Secure frequent pattern mining by fully homomorphic encryption with ciphertext packing[M]//Data Privacy Management and Security Assurance. Springer, Cham, 2016: 181-195.

[16] Brakerski Z, Gentry C, Vaikuntanathan V. (Leveled) fully homomorphic encryption without bootstrapping [J]. ACM Transactions on Computation Theory (TOCT).2014, 6 (3): 13.

[17] Smart N P, Vercauteren F. Fully homomorphic SIMD operations [J]. Designs, codes and cryptography. 2014, 71 (1): 57–81.

[18] Qiu S, Wang B, Li M, et al. Toward practical privacy-preserving frequent itemset mining on encrypted cloud data [J]. IEEE Transactions on Cloud Computing. 2017.

[19] Paillier P, et al. Public-key cryptosystems based on composite degree residuosity classes [C]. In Eurocrypt. 1999: 223–238.

[20] Boneh D, Goh E-J, Nissim K. Evaluating 2-DNF formulas on ciphertexts [C].In Theory of Cryptography Conference. 2005: 325–341.

[21] Liu L, Su J, Chen R, et al. Privacy-Preserving Mining of Association Rule on Outsourced Cloud Data from Multiple Parties [C]. In Australasian Conference on Information Security and Privacy. 2018: 431–451.

[22] Bresson E, Catalano D, Pointcheval D. A simple public-key cryptosystem with a double trapdoor decryption mechanism and its applications [C]. In International Conference on the Theory and Application of Cryptology and Information Security. 2003:37–54.

[23] Wei Wu, Ming Xian, Udaya Parampalli, and Bin Lu. Efficient privacy-preserving frequent itemset query over semantically secure encrypted cloud database  [J]. World Wide Web, 24(2):607–629, 2021.

[24] Bos, J.W., Lauter, K., Loftus, J., Naehrig, M.: Improved security for a ring-based fully homomorphic encryption scheme  [C]. In: IMA International Conference on Cryptography and Coding. Springer, pp 45–64, 2013.

[25] Wong W K, Cheung D W, Hung E, et al. An audit environment for outsourcing of frequent itemset mining [C]. In Proceedings of the VLDB Endowment. 2009: 1162–1173.

[26] Dong B, Liu R, Wang H. Result Integrity Verification of Outsourced Frequent Itemset Mining [C]. In IFIP Annual Conference on Data and Applications Security and Privacy. 2013: 258–265.

[27] Liu R, Wang H. Result integrity verification of outsourced privacy-preserving frequent itemset mining[C]//Proceedings of the 2015 SIAM International Conference on Data Mining. Society for Industrial and Applied Mathematics, 2015: 244-252.

[28] Dong B, Liu R, Wang W H. Integrity Verification of Outsourced Frequent Itemset Mining with Deterministic Guarantee [C]. In IEEE International Conference on Data Mining. 2013: 1025–1030.

[29] Dong B, Liu R, Wang H W. Trust-but-verify: Verifying result correctness of outsourced frequent itemset mining in data-mining-as-a-service paradigm[J]. IEEE Transactions on Services Computing, 2015, 9(1): 18-32.

[30] Rong H, Wang H, Liu J, et al. Verifiable and privacy-preserving association rule mining in hybrid cloud environment[C]//Green, Pervasive, and Cloud Computing: 13th International Conference, GPC 2018, Hangzhou, China, May 11-13, 2018, Revised Selected Papers 13. Springer International Publishing, 2019: 33-48.

[31] Rong H, Liu J, Wu W, et al. Toward fault-tolerant and secure frequent itemset mining outsourcing in hybrid cloud environment[J]. Computers & Security, 2020, 98: 101969.

[32] Zhang J, Xie X, Zhang Z. How reliable is your outsourcing service for data mining? A metamorphic method for verifying the result integrity[C]//International Conference on Software Analysis, Testing, and Evolution. Cham: Springer International Publishing, 2018: 120-136.

[33] Hong T P, Chiu C C, Su J H, et al. Applicable Metamorphic Testing for Erasable-Itemset Mining[J]. IEEE Access, 2022, 10: 38545-38554.

[34] Zhao Z, Lan L, Wang B, et al. Verifiable Privacy-Preserving Outsourced Frequent Itemset Mining on Vertically Partitioned Databases[J]. Electronics, 2023, 12(8): 1952.

[35] Chen Y, Zhao Q, Duan P, et al. Verifiable privacy-preserving association rule mining using distributed decryption mechanism on the cloud[J]. Expert Systems with Applications, 2022, 201: 117086.

[36] Boneh D, Lynn B, Shacham H. Short signatures from the Weil pairing[C]//International conference on the theory and application of cryptology and information security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2001: 514-532.

[37] Döttling N, Garg S. Identity-based encryption from the Diffie-Hellman assumption[C]//Annual International Cryptology Conference. Springer, Cham, 2017: 537-569.

[38] Deng H, Qin Z, Wu Q, et al. Identity-based encryption transformation for flexible sharing of encrypted data in public cloud[J]. IEEE Transactions on Information Forensics and Security, 2020, 15: 3168-3180.

[39] Li J, Yu Q, Zhang Y. Hierarchical attribute based encryption with continuous leakage-resilience[J]. Information Sciences, 2019, 484: 113-134.

[40] Li J, Yu Q, Zhang Y, et al. Key-policy attribute-based encryption against continual auxiliary input leakage[J]. Information Sciences, 2019, 470: 175-188.

[41] Xue L, Yu Y, Li Y, et al. Efficient attribute-based encryption with attribute revocation for assured data deletion[J]. Information Sciences, 2019, 479: 640-650.

[42] Koppula V, Waters B. Realizing chosen ciphertext security generically in attribute-based encryption and predicate encryption[C]//Annual International Cryptology Conference. Springer, Cham, 2019: 671-700.

[43] Li J, Zhang Y, Ning J, et al. Attribute based encryption with privacy protection and accountability for CloudIoT[J]. IEEE Transactions on Cloud Computing, 2020.

[44] Xue L, Yu Y, Li Y, et al. Efficient attribute-based encryption with attribute revocation for assured data deletion[J]. Information Sciences, 2019, 479: 640-650.

[45] Lai J, Deng R H, Guan C, et al. Attribute-based encryption with verifiable outsourced decryption[J]. IEEE Transactions on information forensics and security, 2013, 8(8): 1343-1354.

[46] Feng C, Yu K, Aloqaily M, et al. Attribute-based encryption with parallel outsourced decryption for edge intelligent IoV[J]. IEEE Transactions on Vehicular Technology, 2020, 69(11): 13784-13795.

[47] Premkamal P K, Pasupuleti S K, Alphonse P J A. A new verifiable outsourced ciphertext-policy attribute based encryption for big data privacy and access control in cloud[J]. Journal of Ambient Intelligence and Humanized Computing, 2019, 10(7): 2693-2707.

[48] Zheng H, Shao J, Wei G. Attribute-based encryption with outsourced decryption in blockchain[J]. Peer-to-Peer Networking and Applications, 2020, 13: 1643-1655.