Practical secure computation outsourcing: A survey
The rapid development of cloud computing promotes a wide deployment of data and
computation outsourcing to cloud service providers by resource-limited entities. Based on a …
computation outsourcing to cloud service providers by resource-limited entities. Based on a …
Security and privacy in cloud computing: vision, trends, and challenges
Cloud computing offers cost-effective solutions via a variety of flexible services. However,
security concerns related to managing data, applications, and interactions hamper the rapid …
security concerns related to managing data, applications, and interactions hamper the rapid …
Privacy-preserving-outsourced association rule mining on vertically partitioned databases
Association rule mining and frequent itemset mining are two popular and widely studied
data analysis techniques for a range of applications. In this paper, we focus on privacy …
data analysis techniques for a range of applications. In this paper, we focus on privacy …
Privacy-preserving mining of association rules from outsourced transaction databases
Spurred by developments such as cloud computing, there has been considerable recent
interest in the paradigm of data mining-as-a-service. A company (data owner) lacking in …
interest in the paradigm of data mining-as-a-service. A company (data owner) lacking in …
Authenticated indexing for outsourced spatial databases
In spatial database outsourcing, a data owner delegates its data management tasks to a
location-based service (LBS), which indexes the data with an authenticated data structure …
location-based service (LBS), which indexes the data with an authenticated data structure …
Privacy-preserving association rule mining using homomorphic encryption in a multikey environment
H Pang, B Wang - IEEE Systems Journal, 2020 - ieeexplore.ieee.org
With the development of big data and cloud computing, data analysis technologies play an
important role to produce huge market values. Customers with limited computing resources …
important role to produce huge market values. Customers with limited computing resources …
Privacy-preserving association rule mining in cloud computing
Recently, the paradigm of data mining-as-a-service in cloud computing environment has
been attracting interests. In this paradigm, a company (data owner), lacking data storage …
been attracting interests. In this paradigm, a company (data owner), lacking data storage …
[PDF][PDF] Privacy-by-design in big data analytics and social mining
Privacy is ever-growing concern in our society and is becoming a fundamental aspect to
take into account when one wants to use, publish and analyze data involving human …
take into account when one wants to use, publish and analyze data involving human …
Privacy preserving association rule mining: Taxonomy, techniques, and metrics
In the last decades, pervasive computing is generating a growing quantity of data. Data
mining (DM) technology has become increasingly popular. However, the excessive …
mining (DM) technology has become increasingly popular. However, the excessive …
A data mining approach to assess privacy risk in human mobility data
Human mobility data are an important proxy to understand human mobility dynamics,
develop analytical services, and design mathematical models for simulation and what-if …
develop analytical services, and design mathematical models for simulation and what-if …