Abstract | ||
---|---|---|
The data-mining-as-a-service (DMaS) paradigm enables the data owner (client) that lacks expertise or computational resources to outsource its mining tasks to a third-party service provider (server). Outsourcing, however, raises a serious security issue: how can the client of weak computational power verify that the server returned correct mining result? In this paper, we focus on the problem of frequent itemset mining, and propose efficient and practical probabilistic verification approaches to check whether the server has returned correct and complete frequent itemsets. |
Year | DOI | Venue |
---|---|---|
2013 | 10.1007/978-3-642-39256-6_17 | DBSec |
Keywords | Field | DocType |
result integrity verification,practical probabilistic verification approach,complete frequent itemsets,weak computational power,outsourced frequent itemset mining,computational resource,data owner,frequent itemset mining,serious security issue,third-party service provider,mining task,correct mining result,cloud computing | Computer science,Outsourcing,Service provider,Probabilistic logic,Database,Cloud computing | Conference |
Volume | ISSN | Citations |
7964 | 0302-9743 | 4 |
PageRank | References | Authors |
0.46 | 12 | 3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Boxiang Dong | 1 | 17 | 9.45 |
Ruilin Liu | 2 | 159 | 17.17 |
Wendy Hui Wang | 3 | 133 | 13.82 |