Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Privacy protection frequent item set mining method for large-scale shopping mall transaction record

A frequent item set mining and transaction recording technology, applied in the field of information security, can solve problems such as large amount of calculation

Active Publication Date: 2018-11-27
XIDIAN UNIV
View PDF2 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to overcome the above-mentioned defects in the prior art, and propose a privacy-protected frequent item set mining method for large-scale shopping mall transaction records, which is used to solve the problem of mining frequent items under high privacy protection levels in the prior art. The technical problem of large amount of calculation in the process of set

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privacy protection frequent item set mining method for large-scale shopping mall transaction record
  • Privacy protection frequent item set mining method for large-scale shopping mall transaction record
  • Privacy protection frequent item set mining method for large-scale shopping mall transaction record

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] The present invention will be described in further detail below in conjunction with the accompanying drawings and specific embodiments.

[0050] refer to figure 1 , a privacy-preserving frequent itemset mining method for transaction records of large shopping malls, including the following steps:

[0051] Step 1) The evaluator obtains the public-private key pair for data encryption and the public-private key pair for support evaluation:

[0052] Step 1.1) Assessor adopts key generation algorithm Generate data encryption public-private key pair: Among them, λ 1 is the security parameter of the BGN cryptosystem, PK Enc is the public key used for data encryption, SK Enc is the private key used for data encryption;

[0053] Step 1.2) Assessor adopts key generation algorithm Generate support evaluation public-private key pair: Among them, λ 2 is the security parameter of the Paillier cryptosystem, PK Eva is the public key used for support evaluation, SK Eva is ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a privacy protection frequent item set mining method for a large-scale shopping mall transaction record, so as to solve the technical problem of a large amount of calculation during a frequent item set mining process under a high privacy protection level existing in the prior art. The method comprises steps: an evaluator acquires a public-private key pair, and any user generates a shared key; each user sends an encrypted transaction record to a cloud service provider, and a miner sends an encrypted mining query, a ciphertext with a goods number existing in the mining query and a support threshold ciphertext to the cloud service provider; and the cloud service provider acquires an encrypted false transaction record; and the cloud service and the evaluator interact tojudge whether the mining query is a frequent item set. The mining frequency is high.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a privacy-protected frequent item set mining method for transaction records of large shopping malls. Background technique [0002] With the rise of cloud services, many users choose to store their data on cloud servers in order to save storage space. Therefore, cloud servers have a large amount of data, and there may be some hidden relationship between some of the data. Relationships can be used for market forecasting, intrusion detection, and network traffic management, among others. In order to reveal this hidden relationship, data mining techniques have emerged. Association rule mining is an important method in data mining, and frequent item set mining is the basic step of association rule mining. Therefore, frequent item set mining is very important. In the process of mining frequent itemsets of transaction records in large shopping malls, a semi-ho...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/30H04L9/08G06F21/62
CPCG06F21/6245H04L9/085H04L9/0861H04L9/0869H04L9/3066H04L63/04
Inventor 马晨阳王保仓杨爱洁柴炎廷宋威周立国
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products