{"id":"https://openalex.org/W4367359385","doi":"https://doi.org/10.1109/tcc.2023.3269510","title":"Towards Strong Privacy Protection for Association Rule Mining and Query in the Cloud","display_name":"Towards Strong Privacy Protection for Association Rule Mining and Query in the Cloud","publication_year":2023,"publication_date":"2023-04-28","ids":{"openalex":"https://openalex.org/W4367359385","doi":"https://doi.org/10.1109/tcc.2023.3269510"},"language":"en","primary_location":{"id":"doi:10.1109/tcc.2023.3269510","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcc.2023.3269510","pdf_url":null,"source":{"id":"https://openalex.org/S2492498579","display_name":"IEEE Transactions on Cloud Computing","issn_l":"2168-7161","issn":["2168-7161","2372-0018"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Cloud Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100383303","display_name":"Lin Liu","orcid":"https://orcid.org/0000-0002-5930-8881"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Lin Liu","raw_affiliation_strings":["College of Computer, National University of Defense Technology, Changsha, Hunan, China"],"affiliations":[{"raw_affiliation_string":"College of Computer, National University of Defense Technology, Changsha, Hunan, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055375948","display_name":"Jinshu Su","orcid":"https://orcid.org/0000-0001-9273-616X"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jinshu Su","raw_affiliation_strings":["College of Computer, National University of Defense Technology, Changsha, Hunan, China"],"affiliations":[{"raw_affiliation_string":"College of Computer, National University of Defense Technology, Changsha, Hunan, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058120371","display_name":"Ximeng Liu","orcid":"https://orcid.org/0000-0002-4238-3295"},"institutions":[{"id":"https://openalex.org/I80947539","display_name":"Fuzhou University","ror":"https://ror.org/011xvna82","country_code":"CN","type":"education","lineage":["https://openalex.org/I80947539"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ximeng Liu","raw_affiliation_strings":["College of Mathematics and Computer Science, Fuzhou University, Fuzhou, Fujian, China"],"affiliations":[{"raw_affiliation_string":"College of Mathematics and Computer Science, Fuzhou University, Fuzhou, Fujian, China","institution_ids":["https://openalex.org/I80947539"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038663309","display_name":"Rongmao Chen","orcid":"https://orcid.org/0000-0002-5113-387X"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Rongmao Chen","raw_affiliation_strings":["College of Computer, National University of Defense Technology, Changsha, Hunan, China"],"affiliations":[{"raw_affiliation_string":"College of Computer, National University of Defense Technology, Changsha, Hunan, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031931063","display_name":"Xinyi Huang","orcid":"https://orcid.org/0000-0003-0070-1707"},"institutions":[{"id":"https://openalex.org/I200769079","display_name":"Hong Kong University of Science and Technology","ror":"https://ror.org/00q4vv597","country_code":"HK","type":"education","lineage":["https://openalex.org/I200769079"]},{"id":"https://openalex.org/I889458895","display_name":"University of Hong Kong","ror":"https://ror.org/02zhqgq86","country_code":"HK","type":"education","lineage":["https://openalex.org/I889458895"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Xinyi Huang","raw_affiliation_strings":["Thrust of Artificial Intelligence, Information Hub, Hong Kong University of Science and Technology (Guangzhou), Guangzhou, Guangdong Province, China"],"affiliations":[{"raw_affiliation_string":"Thrust of Artificial Intelligence, Information Hub, Hong Kong University of Science and Technology (Guangzhou), Guangzhou, Guangdong Province, China","institution_ids":["https://openalex.org/I200769079","https://openalex.org/I889458895"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079173360","display_name":"Guang Kou","orcid":"https://orcid.org/0000-0001-7224-1274"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Guang Kou","raw_affiliation_strings":["Artificial Intelligence Research Center, National Innovation Institute of Defense Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Artificial Intelligence Research Center, National Innovation Institute of Defense Technology, Beijing, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5082564456","display_name":"Shaojing Fu","orcid":"https://orcid.org/0000-0002-7275-8190"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shaojing Fu","raw_affiliation_strings":["College of Computer, National University of Defense Technology, Changsha, Hunan, China"],"affiliations":[{"raw_affiliation_string":"College of Computer, National University of Defense Technology, Changsha, Hunan, China","institution_ids":["https://openalex.org/I170215575"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5100383303"],"corresponding_institution_ids":["https://openalex.org/I170215575"],"apc_list":null,"apc_paid":null,"fwci":1.2178,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.82743012,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"11","issue":"3","first_page":"3211","last_page":"3225"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.991599977016449,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7965574264526367},{"id":"https://openalex.org/keywords/association-rule-learning","display_name":"Association rule learning","score":0.7650279402732849},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.743449866771698},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6292492151260376},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.611318051815033},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.6108695268630981},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.6044855713844299},{"id":"https://openalex.org/keywords/semantic-security","display_name":"Semantic security","score":0.5884155035018921},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.4619472622871399},{"id":"https://openalex.org/keywords/web-search-query","display_name":"Web search query","score":0.4564218521118164},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.4376254081726074},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.3900805413722992},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.3838210701942444},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2982102632522583},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.24792072176933289},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.2401960790157318},{"id":"https://openalex.org/keywords/search-engine","display_name":"Search engine","score":0.18258816003799438}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7965574264526367},{"id":"https://openalex.org/C193524817","wikidata":"https://www.wikidata.org/wiki/Q386780","display_name":"Association rule learning","level":2,"score":0.7650279402732849},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.743449866771698},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6292492151260376},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.611318051815033},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.6108695268630981},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.6044855713844299},{"id":"https://openalex.org/C204806902","wikidata":"https://www.wikidata.org/wiki/Q2333581","display_name":"Semantic security","level":5,"score":0.5884155035018921},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.4619472622871399},{"id":"https://openalex.org/C164120249","wikidata":"https://www.wikidata.org/wiki/Q995982","display_name":"Web search query","level":3,"score":0.4564218521118164},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.4376254081726074},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.3900805413722992},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.3838210701942444},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2982102632522583},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.24792072176933289},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.2401960790157318},{"id":"https://openalex.org/C97854310","wikidata":"https://www.wikidata.org/wiki/Q19541","display_name":"Search engine","level":2,"score":0.18258816003799438},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tcc.2023.3269510","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcc.2023.3269510","pdf_url":null,"source":{"id":"https://openalex.org/S2492498579","display_name":"IEEE Transactions on Cloud Computing","issn_l":"2168-7161","issn":["2168-7161","2372-0018"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Cloud Computing","raw_type":"journal-article"},{"id":"pmh:oai:repository.hkust.edu.hk:1783.1-131463","is_oa":false,"landing_page_url":"https://repository.hkust.edu.hk/ir/Record/1783.1-131463","pdf_url":null,"source":{"id":"https://openalex.org/S4306401796","display_name":"Rare & Special e-Zone (The Hong Kong University of Science and Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I200769079","host_organization_name":"Hong Kong University of Science and Technology","host_organization_lineage":["https://openalex.org/I200769079"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.41999998688697815,"display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G2341005444","display_name":null,"funder_award_id":"62102430","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2852687242","display_name":null,"funder_award_id":"ZK22-50","funder_id":"https://openalex.org/F4320324150","funder_display_name":"National University of Defense Technology"},{"id":"https://openalex.org/G5254524242","display_name":null,"funder_award_id":"62006241","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5669255772","display_name":null,"funder_award_id":"62032005","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6432220756","display_name":null,"funder_award_id":"2021JJ40688","funder_id":"https://openalex.org/F4320322843","funder_display_name":"Natural Science Foundation of\u00a0Hunan Province"},{"id":"https://openalex.org/G7482821243","display_name":null,"funder_award_id":"62072466","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7698119313","display_name":null,"funder_award_id":"62102429","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G869780927","display_name":null,"funder_award_id":"62122092","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320322843","display_name":"Natural Science Foundation of\u00a0Hunan Province","ror":null},{"id":"https://openalex.org/F4320324150","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":45,"referenced_works":["https://openalex.org/W121345474","https://openalex.org/W1485800369","https://openalex.org/W1524288918","https://openalex.org/W1571926107","https://openalex.org/W1583975142","https://openalex.org/W1971991172","https://openalex.org/W2004957971","https://openalex.org/W2030573583","https://openalex.org/W2031533839","https://openalex.org/W2038942569","https://openalex.org/W2049577860","https://openalex.org/W2051469853","https://openalex.org/W2062765858","https://openalex.org/W2093367651","https://openalex.org/W2109009448","https://openalex.org/W2109647623","https://openalex.org/W2112022568","https://openalex.org/W2141420453","https://openalex.org/W2163786474","https://openalex.org/W2165111290","https://openalex.org/W2186354314","https://openalex.org/W2233233025","https://openalex.org/W2330315293","https://openalex.org/W2345464210","https://openalex.org/W2562025978","https://openalex.org/W2616666333","https://openalex.org/W2623294209","https://openalex.org/W2701059868","https://openalex.org/W2746415647","https://openalex.org/W2794031572","https://openalex.org/W2807899116","https://openalex.org/W2811423811","https://openalex.org/W2922439134","https://openalex.org/W2954436409","https://openalex.org/W2963106566","https://openalex.org/W2966418036","https://openalex.org/W2998574808","https://openalex.org/W3004270304","https://openalex.org/W3040028709","https://openalex.org/W4224913800","https://openalex.org/W4248708867","https://openalex.org/W4253336088","https://openalex.org/W4288057779","https://openalex.org/W6628750762","https://openalex.org/W6674671283"],"related_works":["https://openalex.org/W2601739120","https://openalex.org/W4402347828","https://openalex.org/W4391920153","https://openalex.org/W2363701519","https://openalex.org/W3212491810","https://openalex.org/W2292786713","https://openalex.org/W2947510282","https://openalex.org/W2949316140","https://openalex.org/W1565128838","https://openalex.org/W2951404390"],"abstract_inverted_index":{"Efficiently":[0],"mining":[1,35,38,58,62,150],"frequent":[2,30,56,107,119],"itemsets":[3,31,108],"and":[4,32,41,59,75,95,109,121,134,169],"association":[5,33,60,110,122],"rules":[6],"on":[7,55,63,91,152],"the":[8,17,50,71,101,106,131,149,153,162,165,178,191],"encrypted":[9,74,155],"outsourced":[10,64,76],"data":[11,65,72,154,168],"remains":[12],"a":[13,67],"great":[14],"challenge":[15],"for":[16,28],"time-consuming":[18],"ciphertext":[19],"computations.":[20],"Nowadays,":[21],"it":[22],"has":[23],"been":[24],"not":[25,146],"well":[26],"addressed":[27],"privacy-preserving":[29],"rule":[34,61,123],"schemes":[36],"with":[37,138],"efficiency,":[39],"dataset,":[40],"query":[42,124,130,137,167,170,184],"confidentiality":[43],"simultaneously.":[44],"In":[45,176],"this":[46],"paper,":[47],"we":[48,113],"investigate":[49],"study":[51],"of":[52,118,164],"privacy":[53],"issues":[54],"itemset":[57,120],"in":[66],"two-cloud":[68],"model,":[69],"where":[70],"are":[73],"by":[77,156],"multiple":[78,157],"owners":[79],"holding":[80],"different":[81],"public":[82,158],"keys.":[83],"We":[84],"develop":[85],"several":[86],"secure":[87],"computation":[88],"protocols":[89],"based":[90],"additively":[92],"homomorphic":[93],"cryptosystem":[94],"additive":[96],"secret":[97],"sharing,":[98],"which":[99],"enable":[100],"clouds":[102],"could":[103],"securely":[104],"mine":[105],"rules.":[111],"Furthermore,":[112],"also":[114,173],"design":[115],"two":[116],"kinds":[117],"service":[125,128,135],"models,":[126],"i.e.,":[127],"customers":[129,136],"cloud-mined":[132],"results,":[133,171],"their":[139],"own":[140],"decided":[141],"threshold.":[142],"The":[143],"proposed":[144],"scheme":[145,185],"only":[147],"supports":[148],"process":[151],"keys":[159],"without":[160],"compromising":[161],"security":[163],"datasets,":[166],"but":[172],"offline":[174],"users.":[175],"addition,":[177],"experimental":[179],"results":[180],"show":[181],"that":[182],"our":[183],"is":[186],"much":[187],"more":[188],"efficient":[189],"than":[190],"state-of-the-art":[192],"work.":[193]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":3}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
