Practical secure computation outsourcing: A survey

Z Shan, K Ren, M Blanton, C Wang - ACM Computing Surveys (CSUR), 2018‏ - dl.acm.org
The rapid development of cloud computing promotes a wide deployment of data and
computation outsourcing to cloud service providers by resource-limited entities. Based on a …

Security and privacy in cloud computing: vision, trends, and challenges

Z Tari, X Yi, US Premarathne, P Bertok… - IEEE Cloud …, 2015‏ - ieeexplore.ieee.org
Cloud computing offers cost-effective solutions via a variety of flexible services. However,
security concerns related to managing data, applications, and interactions hamper the rapid …

Privacy-preserving-outsourced association rule mining on vertically partitioned databases

L Li, R Lu, KKR Choo, A Datta… - IEEE transactions on …, 2016‏ - ieeexplore.ieee.org
Association rule mining and frequent itemset mining are two popular and widely studied
data analysis techniques for a range of applications. In this paper, we focus on privacy …

Privacy-preserving mining of association rules from outsourced transaction databases

F Giannotti, LVS Lakshmanan, A Monreale… - IEEE Systems …, 2012‏ - ieeexplore.ieee.org
Spurred by developments such as cloud computing, there has been considerable recent
interest in the paradigm of data mining-as-a-service. A company (data owner) lacking in …

Authenticated indexing for outsourced spatial databases

Y Yang, S Papadopoulos, D Papadias, G Kollios - The VLDB Journal, 2009‏ - Springer
In spatial database outsourcing, a data owner delegates its data management tasks to a
location-based service (LBS), which indexes the data with an authenticated data structure …

Privacy-preserving association rule mining using homomorphic encryption in a multikey environment

H Pang, B Wang - IEEE Systems Journal, 2020‏ - ieeexplore.ieee.org
With the development of big data and cloud computing, data analysis technologies play an
important role to produce huge market values. Customers with limited computing resources …

Privacy-preserving association rule mining in cloud computing

X Yi, FY Rao, E Bertino, A Bouguettaya - … of the 10th ACM symposium on …, 2015‏ - dl.acm.org
Recently, the paradigm of data mining-as-a-service in cloud computing environment has
been attracting interests. In this paradigm, a company (data owner), lacking data storage …

[PDF][PDF] Privacy-by-design in big data analytics and social mining

A Monreale, S Rinzivillo, F Pratesi, F Giannotti… - EPJ Data Science, 2014‏ - Springer
Privacy is ever-growing concern in our society and is becoming a fundamental aspect to
take into account when one wants to use, publish and analyze data involving human …

Privacy preserving association rule mining: Taxonomy, techniques, and metrics

L Zhang, W Wang, Y Zhang - IEEE Access, 2019‏ - ieeexplore.ieee.org
In the last decades, pervasive computing is generating a growing quantity of data. Data
mining (DM) technology has become increasingly popular. However, the excessive …

A data mining approach to assess privacy risk in human mobility data

R Pellungrini, L Pappalardo, F Pratesi… - ACM Transactions on …, 2017‏ - dl.acm.org
Human mobility data are an important proxy to understand human mobility dynamics,
develop analytical services, and design mathematical models for simulation and what-if …