Secure Outsourced Association Rule Mining using Homomorphic Encryption

Several techniques are used in data analysis, where frequent itemset mining and association rule mining are very popular among them. The motivation for 'Data Mining as a Service' (DMaaS) paradigm is that when the data owners are not capable of doing mining tasks internally they have to outsource the mining work to a trusted third party. Multiple data owners can also collaboratively mine by combining their databases. In such cases the privacy of outsourced data is a major issue. Here the context includes necessity of 'corporate privacy' which means other than the data, the result of mining should also preserve privacy requirements. The system proposed uses Advanced Encryption Standard (AES) to encrypt the data items before outsourcing in order to prevent the vulnerability of 'Known Plaintext' attack in the existing system. Fictitious transactions are inserted to the databases using k-anonymity method to counter the frequency analysis attack. A symmetric homomorphic encryption scheme is applied in the databases for performing the mining securely. Based on the experiments and findings, though the running time of proposed solution is slightly greater than the existing system, it provides better security to the data items. Since the computations tasks are performed by the third party server, consumption of resources at the data owners' side is very less.

[1]  M. B. Malik,et al.  Privacy Preserving Data Mining Techniques: Current Scenario and Future Prospects , 2012, 2012 Third International Conference on Computer and Communication Technology.

[2]  Graham J. Williams,et al.  Data Mining , 2000, Communications in Computer and Information Science.

[3]  Kim-Kwang Raymond Choo,et al.  Privacy-Preserving-Outsourced Association Rule Mining on Vertically Partitioned Databases , 2016, IEEE Transactions on Information Forensics and Security.

[4]  Petra Perner,et al.  Data Mining - Concepts and Techniques , 2002, Künstliche Intell..

[5]  Chris Clifton,et al.  Secure set intersection cardinality with application to association rule mining , 2005, J. Comput. Secur..

[6]  Mohammed J. Zaki Scalable Algorithms for Association Mining , 2000, IEEE Trans. Knowl. Data Eng..

[7]  Laks V. S. Lakshmanan,et al.  Privacy-Preserving Mining of Association Rules From Outsourced Transaction Databases , 2013, IEEE Systems Journal.

[8]  Jaideep Vaidya,et al.  Privacy preserving association rule mining in vertically partitioned data , 2002, KDD.

[9]  Rakesh Agarwal,et al.  Fast Algorithms for Mining Association Rules , 1994, VLDB 1994.

[10]  Sheng Zhong,et al.  Privacy-preserving algorithms for distributed mining of frequent itemsets , 2007, Inf. Sci..

[11]  Geert Wets,et al.  Using association rules for product assortment decisions: a case study , 1999, KDD '99.

[12]  Tomasz Imielinski,et al.  Mining association rules between sets of items in large databases , 1993, SIGMOD Conference.

[13]  Ehud Gudes,et al.  Association rules mining in vertically partitioned databases , 2006, Data Knowl. Eng..