2021
DOI: 10.1109/jsyst.2020.3001316
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-Preserving Association Rule Mining Using Homomorphic Encryption in a Multikey Environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

3
44
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 34 publications
(47 citation statements)
references
References 24 publications
3
44
0
Order By: Relevance
“…It also supports naive Bayes disease classification over the encrypted data at the fog node; however, it does not effectively support processing over data from multiple users. Pang and Wang [39] propose privacy preserving data mining operations on outsourced data from multiple parties under multi-key environments using VP-HE. The proposal supports sharing of processed data only with a data recipient (miner); however, it does not support user-centric and fine-grained data sharing with multiple users.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…It also supports naive Bayes disease classification over the encrypted data at the fog node; however, it does not effectively support processing over data from multiple users. Pang and Wang [39] propose privacy preserving data mining operations on outsourced data from multiple parties under multi-key environments using VP-HE. The proposal supports sharing of processed data only with a data recipient (miner); however, it does not support user-centric and fine-grained data sharing with multiple users.…”
Section: Related Workmentioning
confidence: 99%
“…This section reviews briefly the Paillier cryptosystem [32], the Variant-Paillier in Multikey cryptosystem [39], and CP-ABE [34], which are used in the SAMA scheme design. The notations used throughout the paper are presented in Table II.…”
Section: Building Blocksmentioning
confidence: 99%
See 1 more Smart Citation
“…Pang and Wang (Pang & Wang, 2020) developed novel homomorphic cryptosystem that supports multiple cloud users with different public keys. In this work, secure association rule mining scheme is used with outsourced databases from multiple parties in a twin-cloud architecture.…”
Section: Related Workmentioning
confidence: 99%
“…Wang et al [14] devised a blocking based rule hiding that replaces data by unknowns such that patterns containing identified items on the antecedent part of the rule are not generated during the ARM process. Homomorphic encryption algorithm [15] conceals sensitive association rules in the outsourced data that is uploaded by multiple data owners. The key disadvantage of the heuristic technique is that it fails to provide an optimal solution to the data hiding problem in the vast majority of circumstances.…”
Section: Related Workmentioning
confidence: 99%