A comprehensive survey on secure outsourced computation and its applications

Y Yang, X Huang, X Liu, H Cheng, J Weng, X Luo… - IEEE …, 2019 - ieeexplore.ieee.org
With the ever-increasing requirement of storage and computation resources, it is unrealistic
for local devices (with limited sources) to implement large-scale data processing. Therefore …

Privacy preserving association rule mining: Taxonomy, techniques, and metrics

L Zhang, W Wang, Y Zhang - IEEE Access, 2019 - ieeexplore.ieee.org
In the last decades, pervasive computing is generating a growing quantity of data. Data
mining (DM) technology has become increasingly popular. However, the excessive …

Preserving data confidentiality in association rule mining using data share allocator algorithm

D Dhinakaran, PM Prathap - arXiv preprint arXiv:2304.14605, 2023 - arxiv.org
These days, investigations of information are becoming essential for various associations all
over the globe. By and large, different associations need to perform information …

SecureNLP: A system for multi-party privacy-preserving natural language processing

Q Feng, D He, Z Liu, H Wang… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Natural language processing (NLP) allows a computer program to understand human
language as it is spoken, and has been increasingly deployed in a growing number of …

Privacy-preserving association rule mining using homomorphic encryption in a multikey environment

H Pang, B Wang - IEEE Systems Journal, 2020 - ieeexplore.ieee.org
With the development of big data and cloud computing, data analysis technologies play an
important role to produce huge market values. Customers with limited computing resources …

Verifiable privacy-preserving association rule mining using distributed decryption mechanism on the cloud

Y Chen, Q Zhao, P Duan, B Zhang, Z Hong… - Expert Systems with …, 2022 - Elsevier
As one of the important ways in data mining, the association rule mining is to analyze the
correlation of transactions based on massive data and mine the hidden valuable …

Secure association rule mining on vertically partitioned data using private-set intersection

K Nomura, Y Shiraishi, M Mohri, M Morii - IEEE Access, 2020 - ieeexplore.ieee.org
Data mining entails the discovery of unexpected but reusable knowledge from large
unorganized datasets. Among the many available data-mining algorithms, association rule …

[PDF][PDF] Enhancement in privacy preservation in cloud computing using apriori algorithm

RA Mustafa, HS Chyad, JR Mutar - Indonesian Journal of Electrical …, 2022 - academia.edu
Cloud computing provides a set of the advantages, like flexibly of space, security, cost
optimization, and accessibility from any remote location. In cloud computing a database can …

Efficient privacy-preserving frequent itemset query over semantically secure encrypted cloud database

W Wu, M Xian, U Parampalli, B Lu - World Wide Web, 2021 - Springer
In recent years, more users tend to use data mining as a service (DMaaS) provided by cloud
service providers. However, while enjoying the convenient pay-per-use mode and powerful …

Toward fault-tolerant and secure frequent itemset mining outsourcing in hybrid cloud environment

H Rong, J Liu, W Wu, J Hao, H Wang, M Xian - Computers & Security, 2020 - Elsevier
Due to the rising costs of maintaining IT infrastructures for large-scale data mining, it is
becoming a trend for data owners to outsource data mining tasks together with storage to …