Verifiable privacy-preserving association rule mining using distributed decryption mechanism on the cloud
作者:
Highlights:
• This paper proposes a verifiable privacy-preserving ARM scheme.
• This scheme stores two weak private keys realizing jointly decryption ciphertext.
• The BLS signature scheme verifies data integrity and legitimacy.
• The CSP uses adding virtual transactions, permutation, and random number methods.
摘要
•This paper proposes a verifiable privacy-preserving ARM scheme.•This scheme stores two weak private keys realizing jointly decryption ciphertext.•The BLS signature scheme verifies data integrity and legitimacy.•The CSP uses adding virtual transactions, permutation, and random number methods.
论文关键词:Verifiable,Association rule mining,Privacy-preserving,Active attack,Poisoning attack
论文评审过程:Received 24 June 2021, Revised 8 January 2022, Accepted 28 March 2022, Available online 9 April 2022, Version of Record 19 April 2022.
论文官网地址:https://doi.org/10.1016/j.eswa.2022.117086