Integrity Verification of Outsourced Frequent Itemset Mining with Deterministic Guarantee

@article{Dong2013IntegrityVO,
  title={Integrity Verification of Outsourced Frequent Itemset Mining with Deterministic Guarantee},
  author={Boxiang Dong and Ruilin Liu and Wendy Hui Wang},
  journal={2013 IEEE 13th International Conference on Data Mining},
  year={2013},
  pages={1025-1030}
}
In this paper, we focus on the problem of result integrity verification for outsourcing of frequent item set mining. We design efficient cryptographic approaches that verify whether the returned frequent item set mining results are correct and complete with deterministic guarantee. The key of our solution is that the service provider constructs cryptographic proofs of the mining results. Both correctness and completeness of the mining results are measured against the proofs. We optimize the… CONTINUE READING

From This Paper

Figures, tables, and topics from this paper.

References

Publications referenced by this paper.
Showing 1-10 of 24 references

Optimal Verification of Operations on Dynamic Sets

IACR Cryptology ePrint Archive • 2010
View 5 Excerpts
Highly Influenced

Audio: An integrity auditing framework of outl iermining-as-a-service systems

Ruilin Liu, Hui Wang, +3 authors WengeGuo
ECML/PKDD, • 2012

Vaikuntanatha n. How to delegate and verify in public: verifiable computation from at tribute-based encryption

Bryan Parno, Mariana Raykova, Vinod
InTCC, • 2012
View 1 Excerpt

Practical delegation of computation using multiple servers

ACM Conference on Computer and Communications Security • 2011
View 2 Excerpts

Vadhan . Improved delegation of computation using fully homomorphic encryption

Boxiang Dong, Wendy Hui Wang
2010

Similar Papers

Loading similar papers…