DocumentCode :
2772655
Title :
On the (In)Security and (Im)Practicality of Outsourcing Precise Association Rule Mining
Author :
Molloy, Ian ; Li, Ninghui ; Li, Tiancheng
Author_Institution :
Dept. of Comput. Sci., Purdue Univ. West Lafayette, West Lafayette, IN, USA
fYear :
2009
fDate :
6-9 Dec. 2009
Firstpage :
872
Lastpage :
877
Abstract :
The recent interest in outsourcing IT services onto the cloud raises two main concerns: security and cost. One task that could be outsourced is data mining. In VLDB 2007, Wong et al. propose an approach for outsourcing association rule mining. Their approach maps a set of real items into a set of pseudo items, then maps each transaction non-deterministically. This paper, analyzes both the security and costs associated with outsourcing association rule mining. We show how to break the encoding scheme from Wong et al. without using context specific information and reduce the security to a one-to-one mapping. We present a stricter notion of security than used by Wong et al., and then consider the practicality of outsourcing association rule mining. Our results indicate that outsourcing association rule mining may not be practical, if the data owner is concerned with data confidentiality.
Keywords :
data mining; information technology; outsourcing; security of data; association rule mining; data confidentiality; data mining; information technology; one-to-one mapping; outsourcing IT services; security; Association rules; Computer security; Costs; Data mining; Data security; Encoding; Frequency; Information security; Outsourcing; Transaction databases; association rule mining; outsourcing; security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Data Mining, 2009. ICDM '09. Ninth IEEE International Conference on
Conference_Location :
Miami, FL
ISSN :
1550-4786
Print_ISBN :
978-1-4244-5242-2
Electronic_ISBN :
1550-4786
Type :
conf
DOI :
10.1109/ICDM.2009.122
Filename :
5360326
Link To Document :
بازگشت