Result integrity verification of outsourced frequent itemset mining

Boxiang Dong, Ruilin Liu, Hui Wang

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

4 Citations (Scopus)

Abstract

The data-mining-as-a-service (DMaS) paradigm enables the data owner (client) that lacks expertise or computational resources to outsource its mining tasks to a third-party service provider (server). Outsourcing, however, raises a serious security issue: how can the client of weak computational power verify that the server returned correct mining result? In this paper, we focus on the problem of frequent itemset mining, and propose efficient and practical probabilistic verification approaches to check whether the server has returned correct and complete frequent itemsets.

Original languageEnglish
Title of host publicationData and Applications Security and Privacy XXVII - 27th Annual IFIP WG 11.3 Conference, DBSec 2013, Proceedings
Pages258-265
Number of pages8
DOIs
StatePublished - 12 Aug 2013
Event27th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy, DBSec 2013 - Newark, NJ, United States
Duration: 15 Jul 201317 Jul 2013

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume7964 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other27th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy, DBSec 2013
CountryUnited States
CityNewark, NJ
Period15/07/1317/07/13

Fingerprint

Frequent Itemsets
Outsourcing
Integrity
Data mining
Mining
Expertise
Data Mining
Paradigm
Verify
Resources

Keywords

  • Cloud computing
  • data mining as a service
  • integrity verification

Cite this

Dong, B., Liu, R., & Wang, H. (2013). Result integrity verification of outsourced frequent itemset mining. In Data and Applications Security and Privacy XXVII - 27th Annual IFIP WG 11.3 Conference, DBSec 2013, Proceedings (pp. 258-265). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 7964 LNCS). https://doi.org/10.1007/978-3-642-39256-6_17
Dong, Boxiang ; Liu, Ruilin ; Wang, Hui. / Result integrity verification of outsourced frequent itemset mining. Data and Applications Security and Privacy XXVII - 27th Annual IFIP WG 11.3 Conference, DBSec 2013, Proceedings. 2013. pp. 258-265 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{668d6e909ddf43fa899c82953068da3b,
title = "Result integrity verification of outsourced frequent itemset mining",
abstract = "The data-mining-as-a-service (DMaS) paradigm enables the data owner (client) that lacks expertise or computational resources to outsource its mining tasks to a third-party service provider (server). Outsourcing, however, raises a serious security issue: how can the client of weak computational power verify that the server returned correct mining result? In this paper, we focus on the problem of frequent itemset mining, and propose efficient and practical probabilistic verification approaches to check whether the server has returned correct and complete frequent itemsets.",
keywords = "Cloud computing, data mining as a service, integrity verification",
author = "Boxiang Dong and Ruilin Liu and Hui Wang",
year = "2013",
month = "8",
day = "12",
doi = "10.1007/978-3-642-39256-6_17",
language = "English",
isbn = "9783642392559",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
pages = "258--265",
booktitle = "Data and Applications Security and Privacy XXVII - 27th Annual IFIP WG 11.3 Conference, DBSec 2013, Proceedings",

}

Dong, B, Liu, R & Wang, H 2013, Result integrity verification of outsourced frequent itemset mining. in Data and Applications Security and Privacy XXVII - 27th Annual IFIP WG 11.3 Conference, DBSec 2013, Proceedings. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 7964 LNCS, pp. 258-265, 27th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy, DBSec 2013, Newark, NJ, United States, 15/07/13. https://doi.org/10.1007/978-3-642-39256-6_17

Result integrity verification of outsourced frequent itemset mining. / Dong, Boxiang; Liu, Ruilin; Wang, Hui.

Data and Applications Security and Privacy XXVII - 27th Annual IFIP WG 11.3 Conference, DBSec 2013, Proceedings. 2013. p. 258-265 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 7964 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

TY - GEN

T1 - Result integrity verification of outsourced frequent itemset mining

AU - Dong, Boxiang

AU - Liu, Ruilin

AU - Wang, Hui

PY - 2013/8/12

Y1 - 2013/8/12

N2 - The data-mining-as-a-service (DMaS) paradigm enables the data owner (client) that lacks expertise or computational resources to outsource its mining tasks to a third-party service provider (server). Outsourcing, however, raises a serious security issue: how can the client of weak computational power verify that the server returned correct mining result? In this paper, we focus on the problem of frequent itemset mining, and propose efficient and practical probabilistic verification approaches to check whether the server has returned correct and complete frequent itemsets.

AB - The data-mining-as-a-service (DMaS) paradigm enables the data owner (client) that lacks expertise or computational resources to outsource its mining tasks to a third-party service provider (server). Outsourcing, however, raises a serious security issue: how can the client of weak computational power verify that the server returned correct mining result? In this paper, we focus on the problem of frequent itemset mining, and propose efficient and practical probabilistic verification approaches to check whether the server has returned correct and complete frequent itemsets.

KW - Cloud computing

KW - data mining as a service

KW - integrity verification

UR - http://www.scopus.com/inward/record.url?scp=84881149074&partnerID=8YFLogxK

U2 - 10.1007/978-3-642-39256-6_17

DO - 10.1007/978-3-642-39256-6_17

M3 - Conference contribution

SN - 9783642392559

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 258

EP - 265

BT - Data and Applications Security and Privacy XXVII - 27th Annual IFIP WG 11.3 Conference, DBSec 2013, Proceedings

ER -

Dong B, Liu R, Wang H. Result integrity verification of outsourced frequent itemset mining. In Data and Applications Security and Privacy XXVII - 27th Annual IFIP WG 11.3 Conference, DBSec 2013, Proceedings. 2013. p. 258-265. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)). https://doi.org/10.1007/978-3-642-39256-6_17