{"id":"https://openalex.org/W2746415647","doi":"https://doi.org/10.1109/tcc.2017.2739146","title":"Toward Practical Privacy-Preserving Frequent Itemset Mining on Encrypted Cloud Data","display_name":"Toward Practical Privacy-Preserving Frequent Itemset Mining on Encrypted Cloud Data","publication_year":2017,"publication_date":"2017-08-14","ids":{"openalex":"https://openalex.org/W2746415647","doi":"https://doi.org/10.1109/tcc.2017.2739146","mag":"2746415647"},"language":"en","primary_location":{"id":"doi:10.1109/tcc.2017.2739146","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcc.2017.2739146","pdf_url":null,"source":{"id":"https://openalex.org/S2492498579","display_name":"IEEE Transactions on Cloud Computing","issn_l":"2168-7161","issn":["2168-7161","2372-0018"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Cloud Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101973536","display_name":"Shuo Qiu","orcid":"https://orcid.org/0000-0001-8843-6711"},"institutions":[{"id":"https://openalex.org/I4210166603","display_name":"Jinling Institute of Technology","ror":"https://ror.org/05em1gq62","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210166603"]},{"id":"https://openalex.org/I21193070","display_name":"Beijing Jiaotong University","ror":"https://ror.org/01yj56c84","country_code":"CN","type":"education","lineage":["https://openalex.org/I21193070"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Shuo Qiu","raw_affiliation_strings":["School of Computer and Information Technology, Beijing Jiaotong University, Beijing, China","School of Software Engineering, Jinling Institute of Technology, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Information Technology, Beijing Jiaotong University, Beijing, China","institution_ids":["https://openalex.org/I21193070"]},{"raw_affiliation_string":"School of Software Engineering, Jinling Institute of Technology, Nanjing, China","institution_ids":["https://openalex.org/I4210166603"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100725035","display_name":"Boyang Wang","orcid":"https://orcid.org/0000-0001-8973-2328"},"institutions":[{"id":"https://openalex.org/I138006243","display_name":"University of Arizona","ror":"https://ror.org/03m2x1q45","country_code":"US","type":"education","lineage":["https://openalex.org/I138006243"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Boyang Wang","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Arizona, Tucson"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Arizona, Tucson","institution_ids":["https://openalex.org/I138006243"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100351421","display_name":"Ming Li","orcid":"https://orcid.org/0000-0002-4073-0273"},"institutions":[{"id":"https://openalex.org/I138006243","display_name":"University of Arizona","ror":"https://ror.org/03m2x1q45","country_code":"US","type":"education","lineage":["https://openalex.org/I138006243"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ming Li","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Arizona, Tucson"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Arizona, Tucson","institution_ids":["https://openalex.org/I138006243"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070828650","display_name":"Jiqiang Liu","orcid":"https://orcid.org/0000-0003-1147-4327"},"institutions":[{"id":"https://openalex.org/I21193070","display_name":"Beijing Jiaotong University","ror":"https://ror.org/01yj56c84","country_code":"CN","type":"education","lineage":["https://openalex.org/I21193070"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiqiang Liu","raw_affiliation_strings":["School of Computer and Information Technology, Beijing Jiaotong University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Information Technology, Beijing Jiaotong University, Beijing, China","institution_ids":["https://openalex.org/I21193070"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5045820947","display_name":"Yanfeng Shi","orcid":"https://orcid.org/0000-0002-2924-0548"},"institutions":[{"id":"https://openalex.org/I21193070","display_name":"Beijing Jiaotong University","ror":"https://ror.org/01yj56c84","country_code":"CN","type":"education","lineage":["https://openalex.org/I21193070"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yanfeng Shi","raw_affiliation_strings":["School of Computer and Information Technology, Beijing Jiaotong University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Information Technology, Beijing Jiaotong University, Beijing, China","institution_ids":["https://openalex.org/I21193070"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5101973536"],"corresponding_institution_ids":["https://openalex.org/I21193070","https://openalex.org/I4210166603"],"apc_list":null,"apc_paid":null,"fwci":2.7303,"has_fulltext":false,"cited_by_count":40,"citation_normalized_percentile":{"value":0.9246058,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":"8","issue":"1","first_page":"312","last_page":"323"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8433737754821777},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.83894944190979},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6778664588928223},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.583975076675415},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.5779764652252197},{"id":"https://openalex.org/keywords/association-rule-learning","display_name":"Association rule learning","score":0.5508188009262085},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5449588894844055},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.4904341399669647},{"id":"https://openalex.org/keywords/secure-multi-party-computation","display_name":"Secure multi-party computation","score":0.4733676612377167},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.4579436182975769},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2955209016799927},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.09036552906036377},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.0831238329410553}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8433737754821777},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.83894944190979},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6778664588928223},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.583975076675415},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.5779764652252197},{"id":"https://openalex.org/C193524817","wikidata":"https://www.wikidata.org/wiki/Q386780","display_name":"Association rule learning","level":2,"score":0.5508188009262085},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5449588894844055},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.4904341399669647},{"id":"https://openalex.org/C18396474","wikidata":"https://www.wikidata.org/wiki/Q2465888","display_name":"Secure multi-party computation","level":3,"score":0.4733676612377167},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.4579436182975769},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2955209016799927},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.09036552906036377},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.0831238329410553},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tcc.2017.2739146","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcc.2017.2739146","pdf_url":null,"source":{"id":"https://openalex.org/S2492498579","display_name":"IEEE Transactions on Cloud Computing","issn_l":"2168-7161","issn":["2168-7161","2372-0018"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Cloud Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W1484413656","https://openalex.org/W1583975142","https://openalex.org/W1798609567","https://openalex.org/W1971991172","https://openalex.org/W2004957971","https://openalex.org/W2013623332","https://openalex.org/W2014841127","https://openalex.org/W2030573583","https://openalex.org/W2031738616","https://openalex.org/W2037965136","https://openalex.org/W2038942569","https://openalex.org/W2051469853","https://openalex.org/W2078937669","https://openalex.org/W2093367651","https://openalex.org/W2096337497","https://openalex.org/W2104983592","https://openalex.org/W2112022568","https://openalex.org/W2115515715","https://openalex.org/W2132172731","https://openalex.org/W2134021315","https://openalex.org/W2145341289","https://openalex.org/W2146828512","https://openalex.org/W2161067131","https://openalex.org/W2166559705","https://openalex.org/W2167411443","https://openalex.org/W2327496419","https://openalex.org/W2623294209","https://openalex.org/W2950800519","https://openalex.org/W2998574808","https://openalex.org/W3020511868","https://openalex.org/W4253336088","https://openalex.org/W6628750762","https://openalex.org/W6634829514","https://openalex.org/W6658429498","https://openalex.org/W6674671283"],"related_works":["https://openalex.org/W2751920613","https://openalex.org/W2415164632","https://openalex.org/W2238349241","https://openalex.org/W2355668701","https://openalex.org/W2370453500","https://openalex.org/W2079402849","https://openalex.org/W2359717995","https://openalex.org/W1561334777","https://openalex.org/W2338045944","https://openalex.org/W2231316036"],"abstract_inverted_index":{"Frequent":[0],"itemset":[1,112,136],"mining,":[2,11,113],"which":[3],"is":[4,12,45],"the":[5,15,27,31,54,61,66,75,81,166,169,187,196,209],"essential":[6],"operation":[7],"in":[8,41,53,110,121,125,206],"association":[9],"rule":[10],"one":[13],"of":[14,33,57,141,168,177,189],"most":[16],"widely":[17],"used":[18],"data":[19,86,115],"mining":[20,51,63,85,137,150],"techniques":[21],"on":[22,30,88,96,139],"massive":[23],"datasets":[24,34],"nowadays.":[25],"With":[26],"dramatic":[28],"increase":[29],"scale":[32],"collected":[35,118],"and":[36,119,195],"stored":[37,87],"with":[38,192,208],"cloud":[39,128],"services":[40],"recent":[42],"years,":[43],"it":[44,91],"promising":[46],"to":[47,79,163,179],"carry":[48],"this":[49,100,142],"computation-intensive":[50],"process":[52],"cloud.":[55],"Amount":[56],"work":[58],"also":[59,77],"transferred":[60],"approximate":[62],"computation":[64],"into":[65],"exact":[67],"computation,":[68],"where":[69,114],"such":[70],"methods":[71],"not":[72],"only":[73],"improve":[74],"accuracy":[76],"aim":[78],"enhance":[80],"efficiency.":[82],"However,":[83],"while":[84,152],"public":[89,127],"clouds,":[90],"inevitably":[92],"introduces":[93],"privacy":[94,109,159,178],"concerns":[95],"sensitive":[97],"datasets.":[98],"In":[99,161],"paper,":[101],"we":[102,172,185],"propose":[103],"a":[104,126,157,174],"new":[105],"framework":[106],"for":[107],"enforcing":[108],"frequent":[111,135],"are":[116],"both":[117],"mined":[120],"an":[122],"encrypted":[123],"form":[124],"service.":[129],"We":[130],"specifically":[131],"design":[132],"three":[133],"secure":[134],"protocols":[138,191,201],"top":[140],"framework.":[143],"Our":[144],"first":[145],"protocol":[146,155],"achieves":[147],"more":[148],"efficient":[149],"performance":[151,167,188,207],"our":[153,181,190,200],"second":[154,170],"provides":[156],"stronger":[158],"guarantee.":[160],"order":[162],"further":[164],"optimize":[165],"protocol,":[171],"leverage":[173],"minor":[175],"trade-off":[176],"get":[180],"third":[182],"protocol.":[183],"Finally,":[184],"evaluate":[186],"extensive":[193],"experiments,":[194],"results":[197],"demonstrate":[198],"that":[199],"obviously":[202],"outperform":[203],"previous":[204],"solutions":[205],"same":[210],"security":[211],"level.":[212]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":10},{"year":2021,"cited_by_count":8},{"year":2020,"cited_by_count":5},{"year":2019,"cited_by_count":6},{"year":2018,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
