Security in Outsourcing of Association Rule Mining - - PowerPoint PPT Presentation

security in outsourcing of association rule mining
SMART_READER_LITE
LIVE PREVIEW

Security in Outsourcing of Association Rule Mining - - PowerPoint PPT Presentation

Security in Outsourcing of Association Rule Mining


slide-1
SLIDE 1

Security in Outsourcing of Association Rule Mining

  • !"
slide-2
SLIDE 2

Agenda

#$ #%%$&% '(

$%$(

)% *&

slide-3
SLIDE 3

Introduction and motivation

"$

$%)&()%

$(

  • $

+%$ $((($

slide-4
SLIDE 4

Security concerns in outsourcing

'%&$, %$

  • $% . %

/%&0$$ $$

  • $% . %

12 $

slide-5
SLIDE 5

Outsource model

  • 3

'( "$ 4/430 "$ 4/40

Data Owner

Data Miner Outsourcing

slide-6
SLIDE 6

Item mapping - encryption

slide-7
SLIDE 7

Example item mapping (one-to-one)

,+567 $$+5896

:,$$5+5:896675

:678965

:$,5:,$$5;

*,$%

$&%()

"&$;;;;

slide-8
SLIDE 8

One-to-n item mapping

"++%%

<( <#+5

)%#=>,$?

=>8@76?

/0=>876? /,0=>? /$0=>@6?

#++$;

slide-9
SLIDE 9

Itemset mapping using one-to-n item mapping

<#+5<++%% <# +5<%% /A0=B) A /)0=C +8/C0=A(/A0=C )%<

/:$50=:8@765 /:,$50=:@65 +8/:8@7650=:$5 +8/:8@7650=:,$5

<%%

%%

< +5>876? ,+5>? $+5>@6?

slide-10
SLIDE 10

Correctness – restrictions on one- to-n mapping

:,5=5:8@5 :,$5=5:8@5

D $&%(D

:5=5:85

EEE

:,5=5:8@5

F

:,$5=5:8@

75

< +5>8? ,+5>@? $+5>8@? 3< +5>? ,+5>? $+5>?

", %%<%%($$ G 4<+8//A00=A/$$$&%0(( ,

slide-11
SLIDE 11

Is one-to-n mapping more secure?

'=

>? >,? >$? >,? >$? >,$? >,$?

'3 =

>876? >? >@6? >876? >8@76? >@6? >8@76?

< +5>876? ,+5>? $+5>@6? 3< +5>8? ,+5>? $+5>@?

Todecrypttransactionsencryptedby,wecanuse! (misnotmoresecurethanm’)!!!!

slide-12
SLIDE 12

Function coverage

M1:2I !>2D1 M2:2I !>2D2 M1 coversM2iff

forallX⊆ I,letY=M2(X)

M2

!1(Y)=M1 !1(Y∩ D1)

M1 coversM2

IfanytransactionencryptedbyM2canbe

decryptedbyusingtheinverseofM1

slide-13
SLIDE 13

One-to-n is not more secure than

  • ne-to-one mapping

H/%0

"&,++

%%$,&/$, $&%,&0 ++ %%

DDD

H++%%H'

$++%%

slide-14
SLIDE 14

One-to-n vs one-to-one

++ ++;

#&++,$

B(*$<

++ I %%

=++ I %% H<

"$%$

(

#++&,/

$0++

slide-15
SLIDE 15

One-to-n Transformation

++%%

+5>8?,+5>?F =>,?

3 =>8?

++%%

+5>8@?,+5>@?F =>,?

3 =>8@?

++(

+5>8@?,+5>@?F =>,?

3 =>8@79 ?

Randomly generated

slide-16
SLIDE 16

Transaction transformation

<# +5 ,++

%%

<$(

%(# BJ

3 =/0=/0B

,(BJKJ

(

+8/30=>)L/)03?

slide-17
SLIDE 17

Example transformation

'=

>? >,? >$? >,? >$? >,$? >,$?

'3 =

>876? >8@? >@67? >876? >8@76? >@68? >8@76?

< +5>876? ,+5>? $+5>@6? 3< +5>8? ,+5>? $+5>@? /0=/0B

!

  • !
slide-18
SLIDE 18

Necessary properties of transformation N

'$&%$$ +8//00=

%/,0

J&$/0&

%,3 /=/0B0 $+8/30=

  • <++

%%$$$% $((++ %%

slide-19
SLIDE 19

Generating E for valid and complete transformation N

N(<c>)=<3,5>UE

Form:a!>{1,4,5}

E={1}or{4},butnot{1,4}

Form:b!>{2}

E=Φ

ThetransformationNisvalidifEiseither{1}or

{4}orΦ ;

Niscompleteifitispossibletogenerateallofthe

threecases,i.e.,E={1}or{4}orΦ.

< +5>876? ,+5>? $+5>@6?

E=?

slide-20
SLIDE 20

Algorithm – valid and complete transaction transformation

slide-21
SLIDE 21

Algorithm to perform valid and complete transformation

t=<…>

Start

Meet quota? a!>… b!>… … !>… Mappings No N(t) Pickone x!>x1,…,xn History Storesitemswe mustnotadd xi,…,xj Filter E E=Ø atstart Someadd toE Othersto history Next AddEto result

slide-22
SLIDE 22

Important Property

'$(

%$,&" $%E

slide-23
SLIDE 23

Experiments

slide-24
SLIDE 24

Design

  • %

*&$&(($$&(

*$&

"$

(G$

#%$((G$&

&

(($$&

'( H

slide-25
SLIDE 25

Background knowledge

  • %<$%$$

$;

/"%0

#&$$(,

&%,$/,$0

$/%0

%<%M(

,

,<%%

  • %%N/8,0
slide-26
SLIDE 26

20 40 60 80 100 100% 90% 80% 70% 60% 50% Mapping accuracy (%) 0% 10% 20% 30% 40% 50%

alpha beta

Mapping accuracy

&%%$$

H&,$

$((%%

slide-27
SLIDE 27

Efficiency

796 @O@ P@ 7 O

H $

88 P76 !@O 7OO 8P6

  • 88E

7

8E6 PE6 6E6 EO

  • /(

$&0

6 @ 8

slide-28
SLIDE 28

Summary

'(,$%

%,($&%( $,

H++%%$,

$&%%$(($& ++%%

'$(

%%, $%

)%,

($

slide-29
SLIDE 29

End