Open Access Open Access  Restricted Access Subscription or Fee Access

A Survey on Secured Frequent Pattern Discovery Schemes under the Cloud Environment

K. Banupriya, S. Kiruthika

Abstract


The cloud computing environment supports resources for the data storage and computational tasks. The data privacy models are applied to protect the sensitive attributes in the public data values. The data values are partitioned and maintained under different sources. The data sources are partitioned in two ways vertical and horizontal partitions. The data values are collected in the centralized environment for the pattern discovery process. The partitioned data values are shared and mined using the cloud sources. Horizontal and vertical partition based rule mining operations are carried out with cloud resources.  The data collection and integration operations are performed under the cloud server. The cloud server also handles the frequent pattern discovery operations. The data and task analysis operations are carried out with cloud support. The frequent pattern discovery model controls the data leakages in data transmission and mining operations. The K-Anonymity method is adapted for the data privacy and the RSA algorithm is applied for the data transmission security operations.


Keywords


Frequent Pattern Discovery, Privacy and Security, Partitioned Databases, Outsourced Rule Mining and Homomorphism Encryption.

Full Text:

PDF

References


C.H. Tai, P.S. Yu, M.S. Chen, k-support anonymity based on pseudo taxonomy for outsourcing of frequent itemset mining, in: KDD, pp. 473–482, 2010.

M. Kantarcioglu, C. Clifton, Privacy-preserving distributed mining of association rules on horizontally partitioned data, in: DMKD, 2012.

Junzuo Lai a,b,, Yingjiu Li a, Robert H. Deng a, Jian Wenga,b, Chaowen Guan a, Qiang Yan, “Towards semantically secure outsourcing of association rule mining on categorical data”, Information Sciences 267 (2014) 267–286

A.C.C. Yao, How to generate and exchange secrets, in: FOCS, pp. 162–167, 2012.

W.K. Wong, D.W. Cheung, E. Hung, B. Kao, N. Mamoulis, Security in outsourcing of association rule mining, in: VLDB, pp. 111–122, 2015.

Z. Zhu, W. Du, K-anonymous association rule hiding, in: ASIACCS, pp. 305–309. 2014.

V.S. Verykios, A. Gkoulalas-Divanis, A survey of association rule hiding methods for privacy, in: Privacy-Preserving Data Mining, 2008, pp. 267–289.

A. Mohaisen, N.S. Jho, D. Hong, D. Nyang, Privacy preserving association rule mining revisited: privacy enhancement and resources efficiency, IEICE Trans. 93-D (2010) 315–325.

A.V. Evfimievski, R. Srikant, R. Agrawal, J. Gehrke, Privacy preserving mining of association rules, in: KDD, pp. 217–228, 2014.

B.C.M. Fung, K. Wang, R. Chen, P.S. Yu, Privacy-preserving data publishing: a survey of recent developments, ACM Comput. Surv. 42 (2010).

J. Gehrke, D. Kifer, A. Machanavajjhala, Privacy in Data Publishing, in: ICDE, p. 1213, 2012.

F. Giannotti, L. V. S. Lakshmanan, A. Monreale, D. Pedreschi, and H. Wang, “Privacy-preserving mining of association rules from outsourced transaction databases,” IEEE Syst. J., vol. 7, no. 3, pp. 385–395, Sep. 2013.

Lichun Li, Rongxing Lu, Kim-Kwang Raymond Choo, Anwitaman Datta and Jun Shao, “Privacy-Preserving-Outsourced Association Rule Mining on Vertically Partitioned Databases”, IEEE Transactions On Information Forensics And Security, Vol. 11, No. 8, August 2016.

Prajakta S. Vispute and Dr. Shirish S. Sane,” Association Rule Mining Approaches”, cPGCON-15, ComputerEngineering- 4th PG Conference (University of Pune), Organized by Department of Computer Engineering, METs Institute of Engineering, Nashik, 2015.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.