Cloud computing technology has enabled large organization to outsource data to a third-party service provider (server) for data mining and has provided a natural solution for the data-mining paradigms. However, outsourcing raises a serious security and privacy issue. Data outsourcing is the key task in recent days, for accessing services of the database processing. For the client with the weak computational capacity, there is no assurance or guarantee to know if the server returned correct mining results or not. This paper focuses on the specific task of frequent item set mining. The server that is potentially untrusted and tries to escape from verification by using its prior knowledge of the outsourced data is considered. An efficient probabilistic and deterministic verification.......
展开▼