• P-ISSN 0974-6846 E-ISSN 0974-5645

Indian Journal of Science and Technology

Article

Indian Journal of Science and Technology

Year: 2024, Volume: 17, Issue: 1, Pages: 1-15

Original Article

Two Level Privacy Preserving Model for Association Rule Mining in Cloud Using Deep-SVM Method

Received Date:22 March 2023, Accepted Date:07 December 2023, Published Date:05 January 2024

Abstract

Background/ Objectives: It is becoming more common for data owners to outsource data mining tasks and storage to cloud service providers as a result of the rising costs of maintaining IT infrastructures for large-scale data mining. This trend, however, also raises security concerns about unauthorized breaches of data confidentiality and outcome integrity. Methods: This research considers this scenario in which cloud user can encrypt their data and store it to cloud environment. In order to perform mining operation, the user needs to outsource the task to cloud servers. Then, the cloud server performs the mining task on the encrypted data and share the encrypted association rule to the cloud user. Yet, existing single cloud server systems have privacy leakage issues since their work focuses on either database privacy or item privacy. To remedy this gap in the literature, this study maintains both database privacy and item privacy during the frequent itemset mining process. For item privacy, it first describes a universal safe multiplication protocol with a single cloud server. We build the inner product rules, comparison rules, frequent itemset protocol, and final association rule mining process that is secure against privacy leaking on top of this multiplication protocol. During this Association Rule Mining (ARM) operation, it provides two level of protection to data privacy. This model is designed with distributed Elgamal cryptosystem and sub-protocols for item and database privacy along with Deep learning-based Support Vector Machine (SVM) for secure rule generation. Findings: The proposed method is named as two-level privacy preserving method association with Deep SVM model (2-level:D-SVM), provides guaranteed solutions to the confidentiality of the outsourced cloud data and minimizes the user interaction during association rule mining task. Here, data on breast cancer and heart disease are used, and the effectiveness of the proposed model is demonstrated by comparison to existing models. According to the study, at 25000 transactions, the proposed 2-level:D-SVM model stands for 52% and 50% more efficient than Parallel Processing (PP) and Privacy-preserving Collaborative Model Learning (PCML) techniques in terms of computing cost. Additionally, the proposed model performs 34%, 22%, 6%, and 4% better in terms of execution time than the PP, Apriori, Eclat, and FP-growth techniques, respectively. Novelty: The proposed method is built on a set of well-constructed 2-level secure computation techniques that not only maintains confidentiality of data and query confidentiality, but additionally allows the data owner to operate offline throughout data mining. When compared with previous attempts, this technique provides a higher degree of privacy, in addition, lowers the computation cost for data owners.

Keywords: Association Rule mining, Cloud, Data mining as a service, Deep learning, SVM

References

  1. Pengwei M, Kai W, Chunyu J, Junyi L, Jiafeng T, Siyuan L, et al. Research on Evaluation System of Relational Cloud Database. In: 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). (pp. 1369-1373) IEEE. 2021.
  2. Asadianfam S, Kolivand H, Asadianfam S. A new approach for web usage mining using case based reasoning. SN Applied Sciences. 2020;2(7):1–11. Available from: https://doi.org/10.1007/s42452-020-3046-z
  3. Priyadarsini S, Sangeerthana B, Maheswari S, Prasanth A. An Efficient Privacy-Preserving in Frequent Item Set for Cloud Environment Using Apriori. Annals of the Romanian Society for Cell Biology. 2021;25(6):2934–2946. Available from: https://www.annalsofrscb.ro/index.php/journal/article/view/5991
  4. Purbey L, Samhitha N, Shreyam K, Teja PK, DRG. ECLAT Algorithm for Encrypted Files in the Cloud for Fast Association Rule Mining. International Journal of Engineering Research & Technology (IJERT) NCAIT. 2020;8(15):49–52. Available from: https://www.ijert.org/research/eclat-algorithm-for-encrypted-files-in-the-cloud-for-fast-association-rule-mining-IJERTCONV8IS15012.pdf
  5. Zhang B. Optimization of FP-Growth algorithm based on cloud computing and computer big data. International Journal of System Assurance Engineering and Management. 2021;12(4):853–863. Available from: https://doi.org/10.1007/s13198-021-01139-2
  6. Bu L, Zhang H, Xing H, Wu L. Research on parallel data processing of data mining platform in the background of cloud computing. Journal of Intelligent Systems. 2021;30(1):479–486. Available from: https://doi.org/10.1515/jisys-2020-0113
  7. Nomura K, Shiraishi Y, Mohri M, Morii M. Secure Association Rule Mining on Vertically Partitioned Data Using Private-Set Intersection. IEEE Access. 2020;8:144458–144467. Available from: https://doi.org/10.1109/ACCESS.2020.3014330
  8. Dhinakaran D, Prathap PMJ, Selvaraj D, Kumar DA, Murugeshwari B. Mining Privacy-Preserving Association Rules based on Parallel Processing in Cloud Computing. International Journal of Engineering Trends and Technology. 2022;70(3):284–294. Available from: https://doi.org/10.14445/22315381/IJETT-V70I3P232
  9. Wu J, Mu N, Lei X, Le J, Zhang D, Liao X. SecEDMO: Enabling Efficient Data Mining with Strong Privacy Protection in Cloud Computing. IEEE Transactions on Cloud Computing. 2022;10(1):691–705. Available from: https://doi.org/10.1109/TCC.2019.2932065
  10. Hong Z, Zhang Z, Duan P, Zhang B, Wang B, Gao W, et al. Secure Privacy-Preserving Association Rule Mining With Single Cloud Server. IEEE Access. 2021;9:165090–165102. Available from: https://doi.org/10.1109/ACCESS.2021.3128526
  11. Balasubramaniam S, Joe CV, Sivakumar TA, Prasanth A, Kumar KS, Kavitha V, et al. Optimization Enabled Deep Learning-Based DDoS Attack Detection in Cloud Computing. International Journal of Intelligent Systems. 2023;2023:1–16. Available from: https://doi.org/10.1155/2023/2039217
  12. Shantha RMJ, Mahender K, Jenifer AJM, Prasanth A. Security analysis of hybrid one time password generation algorithm for IoT data. In: International Conference on Research In Sciences, Engineering & Technology, AIP Conference Proceedings. Warangal, India, 12–13 February 2021. AIP Publishing. 2418, Issue 1.
  13. Wang F, Zhu H, Liu X, Lu R, Hua J, Li H, et al. Privacy-Preserving Collaborative Model Learning Scheme for E-Healthcare. IEEE Access. 2019;7:166054–166065. Available from: https://doi.org/10.1109/ACCESS.2019.2953495
  14. Rajab A, Aqeel S, Reshan MSA, Ashraf A, Almakdi S, Rajab K. Cryptography based Techniques of Encryption for Security of Data in Cloud Computing Paradigm. International Journal of Engineering Trends and Technology. 2021;69(10):1–6. Available from: https://doi.org/10.14445/22315381/IJETT-V69I10P201
  15. Qiao Z, Yang Q, Zhou Y, Yang B, Xia Z, Zhang M, et al. An Efficient Certificate-Based Aggregate Signature Scheme With Provable Security for Industrial Internet of Things. IEEE Systems Journal. 2023;17(1):72–82. Available from: https://doi.org/10.1109/JSYST.2022.3188012
  16. Liu L, Su J, Chen R, Liu X, Wang X, Chen S, et al. Privacy-Preserving Mining of Association Rule on Outsourced Cloud Data from Multiple Parties. In: Australasian Conference on Information Security and Privacy, ACISP 2018, Lecture Notes in Computer Science . (Vol. 10946, pp. 431-451) Springer, Cham. 2018.

Copyright

© 2024 Mangayarkkarasi.  This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. Published By Indian Society for Education and Environment (iSee)

DON'T MISS OUT!

Subscribe now for latest articles and news.