Integrity verification of outsourced frequent itemset mining with deterministic guarantee

Boxiang Dong, Ruilin Liu, Wendy Hui Wang

Research output: Contribution to journalConference articleResearchpeer-review

7 Citations (Scopus)

Abstract

In this paper, we focus on the problem of result integrity verification for outsourcing of frequent item set mining. We design efficient cryptographic approaches that verify whether the returned frequent item set mining results are correct and complete with deterministic guarantee. The key of our solution is that the service provider constructs cryptographic proofs of the mining results. Both correctness and completeness of the mining results are measured against the proofs. We optimize the verification by minimizing the number of proofs. Our empirical study demonstrates the efficiency and effectiveness of the verification approaches.

Original languageEnglish
Article number6729592
Pages (from-to)1025-1030
Number of pages6
JournalProceedings - IEEE International Conference on Data Mining, ICDM
DOIs
StatePublished - 1 Dec 2013
Event13th IEEE International Conference on Data Mining, ICDM 2013 - Dallas, TX, United States
Duration: 7 Dec 201310 Dec 2013

Fingerprint

Outsourcing

Keywords

  • Cloud computing
  • Data-mining-as-a-service
  • frequent itemset mining
  • integrity verification

Cite this

@article{291c801294794e568473162291cca888,
title = "Integrity verification of outsourced frequent itemset mining with deterministic guarantee",
abstract = "In this paper, we focus on the problem of result integrity verification for outsourcing of frequent item set mining. We design efficient cryptographic approaches that verify whether the returned frequent item set mining results are correct and complete with deterministic guarantee. The key of our solution is that the service provider constructs cryptographic proofs of the mining results. Both correctness and completeness of the mining results are measured against the proofs. We optimize the verification by minimizing the number of proofs. Our empirical study demonstrates the efficiency and effectiveness of the verification approaches.",
keywords = "Cloud computing, Data-mining-as-a-service, frequent itemset mining, integrity verification",
author = "Boxiang Dong and Ruilin Liu and Wang, {Wendy Hui}",
year = "2013",
month = "12",
day = "1",
doi = "10.1109/ICDM.2013.81",
language = "English",
pages = "1025--1030",
journal = "Proceedings - IEEE International Conference on Data Mining, ICDM",
issn = "1550-4786",

}

Integrity verification of outsourced frequent itemset mining with deterministic guarantee. / Dong, Boxiang; Liu, Ruilin; Wang, Wendy Hui.

In: Proceedings - IEEE International Conference on Data Mining, ICDM, 01.12.2013, p. 1025-1030.

Research output: Contribution to journalConference articleResearchpeer-review

TY - JOUR

T1 - Integrity verification of outsourced frequent itemset mining with deterministic guarantee

AU - Dong, Boxiang

AU - Liu, Ruilin

AU - Wang, Wendy Hui

PY - 2013/12/1

Y1 - 2013/12/1

N2 - In this paper, we focus on the problem of result integrity verification for outsourcing of frequent item set mining. We design efficient cryptographic approaches that verify whether the returned frequent item set mining results are correct and complete with deterministic guarantee. The key of our solution is that the service provider constructs cryptographic proofs of the mining results. Both correctness and completeness of the mining results are measured against the proofs. We optimize the verification by minimizing the number of proofs. Our empirical study demonstrates the efficiency and effectiveness of the verification approaches.

AB - In this paper, we focus on the problem of result integrity verification for outsourcing of frequent item set mining. We design efficient cryptographic approaches that verify whether the returned frequent item set mining results are correct and complete with deterministic guarantee. The key of our solution is that the service provider constructs cryptographic proofs of the mining results. Both correctness and completeness of the mining results are measured against the proofs. We optimize the verification by minimizing the number of proofs. Our empirical study demonstrates the efficiency and effectiveness of the verification approaches.

KW - Cloud computing

KW - Data-mining-as-a-service

KW - frequent itemset mining

KW - integrity verification

UR - http://www.scopus.com/inward/record.url?scp=84894683855&partnerID=8YFLogxK

U2 - 10.1109/ICDM.2013.81

DO - 10.1109/ICDM.2013.81

M3 - Conference article

SP - 1025

EP - 1030

JO - Proceedings - IEEE International Conference on Data Mining, ICDM

JF - Proceedings - IEEE International Conference on Data Mining, ICDM

SN - 1550-4786

M1 - 6729592

ER -