• Àüü
  • ÀüÀÚ/Àü±â
  • Åë½Å
  • ÄÄÇ»ÅÍ
´Ý±â

»çÀÌÆ®¸Ê

Loading..

Please wait....

±¹³» ³í¹®Áö

Ȩ Ȩ > ¿¬±¸¹®Çå > ±¹³» ³í¹®Áö > Çѱ¹Á¤º¸°úÇÐȸ ³í¹®Áö > Á¤º¸°úÇÐȸ³í¹®Áö (Journal of KIISE)

Á¤º¸°úÇÐȸ³í¹®Áö (Journal of KIISE)

Current Result Document : 8 / 128 ÀÌÀü°Ç ÀÌÀü°Ç   ´ÙÀ½°Ç ´ÙÀ½°Ç

ÇѱÛÁ¦¸ñ(Korean Title) Ŭ¶ó¿ìµå ÄÄÇ»Æà ȯ°æ¿¡¼­ °³ÀÎÁ¤º¸¸¦ º¸È£ÇÏ´Â FP-Growth ±â¹Ý ¿¬°ü ±ÔÄ¢ ¸¶ÀÌ´× ¾Ë°í¸®Áò
¿µ¹®Á¦¸ñ(English Title) Privacy-preserving Association Rule Mining Algorithm Based on FP-Growth in Cloud Computing Environment
ÀúÀÚ(Author) ½ÅÀçȯ   ±èÇüÁø   ÀåÀç¿ì   ¼Û¿µÈ£   JaeHwan Shin   Hyeong-Jin Kim   JaeWoo Chang   Young-Ho Song  
¿ø¹®¼ö·Ïó(Citation) VOL 47 NO. 08 PP. 0707 ~ 0716 (2020. 08)
Çѱ۳»¿ë
(Korean Abstract)
Ãֱ٠Ŭ¶ó¿ìµå ÄÄÇ»Æà ±â¼úÀÇ ¹ßÀü°ú ÇÔ²², µ¥ÀÌÅͺ£À̽º ¼ÒÀ¯ÀÚ´Â ÀÚ½ÅÀÇ µ¥ÀÌÅͺ£À̽º¸¦ Ŭ¶ó¿ìµå ¼­¹ö¿¡ ¾Æ¿ô¼Ò½ÌÇÏ¿© ³·Àº ºñ¿ëÀ¸·Î Àü¹®ÀûÀÎ µ¥ÀÌÅÍ °ü¸®¸¦ Á¦°ø¹ÞÀ» ¼ö ÀÖ´Ù. ±×·¯³ª ¿øº» µ¥ÀÌÅͺ£À̽º¸¦ Ŭ¶ó¿ìµå ¼­¹ö¿¡ ¾Æ¿ô¼Ò½ÌÇÏ´Â °ÍÀº µ¥ÀÌÅͺ£À̽º¿¡ ÀÖ´Â ±ÝÀ¶, ÀÇ·á¿Í °°Àº ¹Î°¨ Á¤º¸°¡ ³ëÃâµÉ ¼ö ÀÖ´Ù. º» ³í¹®¿¡¼­´Â Ŭ¶ó¿ìµå ÄÄÇ»Æà ȯ°æ¿¡¼­ °³ÀÎ Á¤º¸¸¦ º¸È£ÇÏ´Â FP-Growth ±â¹Ý ¿¬°ü ±ÔÄ¢ ¸¶ÀÌ´× ¾Ë°í¸®ÁòÀ» Á¦¾ÈÇÑ´Ù. Á¦¾ÈÇÏ´Â ¾Ë°í¸®ÁòÀº ¹Î°¨ Á¤º¸¸¦ º¸È£Çϱâ À§ÇØ ¾ÏÈ£¹® »ó¿¡¼­ ƯÁ¤ ¿¬»êÀ» Áö¿øÇÏ´Â µ¿Çü ¾ÏÈ£ ü°è¸¦ »ç¿ëÇÏ¿© ¿øº» µ¥ÀÌÅÍ¿Í »ç¿ëÀÚÀÇ ÁúÀǸ¦ ¾ÏȣȭÇÑ´Ù. ¾ÏÈ£¹® »ó¿¡¼­ÀÇ È¿À²ÀûÀÎ ÁúÀÇ Ã³¸®¸¦ Á¦°øÇϱâ À§ÇØ, ¿øº» µ¥ÀÌÅÍÀÇ ³ëÃâ ¾øÀÌ ¾ÏÈ£¹®À» ºñ±³ÇÏ´Â ºñ±³ ¿¬»ê ÇÁ·ÎÅäÄÝÀ» Á¦¾ÈÇÑ´Ù. ¼º´ÉÆò°¡¸¦ ÅëÇØ Á¦¾ÈÇÏ´Â ¾Ë°í¸®ÁòÀÌ ±âÁ¸ ±â¹ý¿¡ ºñÇØ ¾à 68¢¦123%ÀÇ ¼º´É Çâ»óÀ» º¸ÀδÙ.
¿µ¹®³»¿ë
(English Abstract)
Recently, with the advancement of cloud computing technology, database owners can outsource their databases to the cloud for professional management of data at low cost. However, outsourcing the original database to the cloud server exposes sensitive information in the database, such as banking and medical treatment. In this paper, we propose a privacy-preserving association rule mining algorithm based on the FP-Growth in the cloud computing environment. To protect the sensitive information, the proposed algorithm encrypts the original data and the user's queries with homomorphic encryption schemes that support specific operations on cipher-texts. To provide efficient query processing on cipher-texts, we propose a comparison operation protocol that compares ciphertexts without exposing the original data. Through the performance evaluation, the proposed algorithm shows approximately 68¢¦123% performance improvement, compared to the existing algorithm.
Å°¿öµå(Keyword) Ŭ¶ó¿ìµå ÄÄÇ»Æà  µ¥ÀÌÅͺ£À̽º ¾Æ¿ô¼Ò½Ì   µ¿Çü ¾ÏÈ£   ¿¬°ü ±ÔÄ¢ ¸¶ÀÌ´×   cloud computing   database outsourcing   homomorphic encryption   association rule mining  
ÆÄÀÏ÷ºÎ PDF ´Ù¿î·Îµå