首页> 外文学位 >Integrity verification of outsourced data mining computations.
【24h】

Integrity verification of outsourced data mining computations.

机译:外包数据挖掘计算的完整性验证。

获取原文
获取原文并翻译 | 示例

摘要

Today, the volume of data collected everyday has tremendously increased. Data mining, the technology that extracts useful information and insights from the data becomes intriguing for the end users. Due to the fact that the data owner may not possess sufficient resources to perform data mining computations by his/her own, there is a need for outsourcing data mining computations to a third-party computationally powerful data mining service provider. With the advance of the Cloud computing technology, a paradigm called the Data-Mining-as-a-Service (DMaS) has emerged. Although the DMaS paradigm provides an affordable data mining solution for the data owner, there are several security concerns that must be addressed. In this dissertation, we focus on the result integrity of outsourced data mining computations, one of the most important security concerns of the DMaS paradigm.;We propose efficient and practical approaches to verify the integrity of the data mining results that are returned by a potentially untrusted DMaS service provider (server). We propose both deterministic and probabilistic approaches that provide different degree of integrity guarantee. The deterministic approaches verify the integrity of the outsourced data mining results with 100% certainty, while the probabilistic approaches provide high probabilistic integrity guarantee with small overhead. For all the approaches, we provide both theoretical analysis and empirical study to show their effectiveness and efficiency.;We also study the problem of integrity verification of outsourced privacy preserving data mining computations. We focus on the randomization-based privacy preserving data mining technique that perturbs the dataset randomly to protect data privacy. We design efficient, robust result integrity verification approaches for such privacy-preserving data mining computations. Our empirical study illustrates the robustness and efficiency of our approaches.
机译:今天,每天收集的数据量已大大增加。数据挖掘是一种从数据中提取有用信息和见解的技术,对于最终用户而言,这很有吸引力。由于数据所有者可能没有足够的资源来自己进行数据挖掘计算,因此需要将数据挖掘计算外包给第三方具有强大计算能力的数据挖掘服务提供商。随着云计算技术的发展,一种称为数据挖掘即服务(DMaS)的范例已经出现。尽管DMaS范式为数据所有者提供了负担得起的数据挖掘解决方案,但仍需要解决一些安全问题。在本文中,我们将重点放在外包数据挖掘计算的结果完整性上,这是DMaS范式最重要的安全问题之一。我们提出了一种有效且实用的方法来验证潜在的返回数据挖掘结果的完整性不受信任的DMaS服务提供商(服务器)。我们提出了确定性和概率性方法,它们提供了不同程度的完整性保证。确定性方法以100%的确定性验证了外包数据挖掘结果的完整性,而概率性方法则以较小的开销提供了较高的概率完整性保证。对于所有方法,我们都提供了理论分析和实证研究,以证明它们的有效性和效率。我们还研究了外包隐私保护数据挖掘计算的完整性验证问题。我们专注于基于随机化的隐私保护数据挖掘技术,该技术随机扰动数据集以保护数据隐私。我们针对此类保护隐私的数据挖掘计算设计了高效,鲁棒的结果完整性验证方法。我们的实证研究表明了我们方法的鲁棒性和有效性。

著录项

  • 作者

    Liu, Ruilin.;

  • 作者单位

    Stevens Institute of Technology.;

  • 授予单位 Stevens Institute of Technology.;
  • 学科 Computer science.
  • 学位 Ph.D.
  • 年度 2015
  • 页码 260 p.
  • 总页数 260
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号