Abstract
In this paper, we focus on the problem of result integrity verification for outsourcing of frequent item set mining. We design efficient cryptographic approaches that verify whether the returned frequent item set mining results are correct and complete with deterministic guarantee. The key of our solution is that the service provider constructs cryptographic proofs of the mining results. Both correctness and completeness of the mining results are measured against the proofs. We optimize the verification by minimizing the number of proofs. Our empirical study demonstrates the efficiency and effectiveness of the verification approaches.
Original language | English |
---|---|
Article number | 6729592 |
Pages (from-to) | 1025-1030 |
Number of pages | 6 |
Journal | Proceedings - IEEE International Conference on Data Mining, ICDM |
DOIs | |
State | Published - 2013 |
Event | 13th IEEE International Conference on Data Mining, ICDM 2013 - Dallas, TX, United States Duration: 7 Dec 2013 → 10 Dec 2013 |
Keywords
- Cloud computing
- Data-mining-as-a-service
- frequent itemset mining
- integrity verification