Frequent item set mining method based on cloud outsourcing transaction data

A frequent item set mining and transaction data technology, applied in the fields of information security and data processing, can solve the problem of low security of data mining models

Active Publication Date: 2019-08-13
XIDIAN UNIV
View PDF7 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to address the problems existing in the above-mentioned prior art, and propose a frequent itemset mining metho

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Frequent item set mining method based on cloud outsourcing transaction data
  • Frequent item set mining method based on cloud outsourcing transaction data
  • Frequent item set mining method based on cloud outsourcing transaction data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0073] The following is attached figure 1 , the present invention will be described in further detail.

[0074] Step 1, send the encrypted system key.

[0075] The key generation center generates the strong private key and the public key of the encryption system according to the key generation algorithm Paillier.KeyGen.

[0076] The steps of the described key generation algorithm Paillier.KeyGen are as follows:

[0077] In the first step, the key generation center randomly selects two large prime numbers p and q, and the two large prime numbers satisfy gcd[p×q,(p-1)×(q-1)]=1, where gcd[· ] means the greatest common divisor.

[0078] Step 2, calculate the strong private key λ=lcm(p-1,q-1), where lcm(·) represents the least common multiple.

[0079] Step 3, the key generation center calculates the modulus N=p×q, from Randomly select an integer g in which satisfies ord(g)|N and gcd[L(g λ mod N 2 ), N]=1, the key generation center takes as the public key pk of the encrypt...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a frequent item set mining method based on cloud outsourcing transaction data. The method comprises the following steps: sending an encryption system key; sending a query userkey; sending the signature key of each participant; verifying the identity of the data owner; enabling the legal data owner to upload a transaction transaction; inquiring user identity verification; enabling the legal query user to upload query data; disturbing the transaction ciphertext set; calculating the inner product ciphertext of the transaction affair of the query user and each confused transaction; calculating the actual support degree of the transaction affair of the query user; signing and sending a mining result ciphertext; and inquiring a user verification result source and performing decrypting. A digital signature technology is used for verifying the user identity, the cloud server decryption capability is weakened based on a homomorphic encryption algorithm, the privacy of user outsourcing data and the privacy of a mining result are protected, and the safety and reliability of cloud outsourcing data mining are improved.

Description

technical field [0001] The invention belongs to the technical field of data processing, and further relates to a frequent itemset mining method based on cloud outsourcing transaction data in the technical field of information security. The present invention can be used to analyze the frequency of encrypted data outsourced by users, and the outsourced data of users involved in the present invention refers to the transactions of intensive transaction items (frequently traded items in physical stores such as shopping malls and supermarkets, and frequently traded items on the Internet by consumers) data. Background technique [0002] With the advent of the big data era, it is difficult for resource-constrained users to perform intensive data computing tasks locally. Therefore, it is a reasonable choice to deliver data calculations to cloud servers with large storage and computing capabilities. Data mining is to search for hidden valuable information from massive databases. Ass...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L9/08H04L29/06
CPCH04L9/0861H04L9/3247H04L63/06H04L63/08
Inventor 赵青青王保仓平源庞宏平薛冠豪魏文宽曾一波曲全博
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products