Evaluation of a data mining application adopting private information retrieval in the cloud computing environment

Cloud computing has become a cost effective and practical solution for data-intensive data mining technologies. The results of data mining are highly sensitive and should be private to the end user in order to provide a trustful service. Although cloud vendors have provided a series of cloud securit...

Full description

Bibliographic Details
Main Author: Yunyi, Chen (Author)
Other Authors: Shoba, Tegginmath (Contributor)
Format: Others
Published: Auckland University of Technology, 2015-08-12T04:17:54Z.
Subjects:
Online Access:Get fulltext
LEADER 02553 am a22001933u 4500
001 9007
042 |a dc 
100 1 0 |a Yunyi, Chen  |e author 
100 1 0 |a Shoba, Tegginmath  |e contributor 
245 0 0 |a Evaluation of a data mining application adopting private information retrieval in the cloud computing environment 
260 |b Auckland University of Technology,   |c 2015-08-12T04:17:54Z. 
520 |a Cloud computing has become a cost effective and practical solution for data-intensive data mining technologies. The results of data mining are highly sensitive and should be private to the end user in order to provide a trustful service. Although cloud vendors have provided a series of cloud security controls, users are still concerned about the internal security loopholes which come from cloud service provider staff such as DBA or data analyst. Private information retrieval (PIR) is a protocol that retrieves information from database without revealing the information. However, few studies have examined the possibility and efficiency of implementing PIR in data mining under cloud environment and this is what we set out to investigate in this research. This research was carried out to analyse whether PIR can improve security without negatively affecting performance. In this research, data mining application was implemented under cloud environment. A PIR protocol was also applied to the data mining application to improve security. The processing time of PIR and entire data mining application over multiple datasets with different sizes were recorded. The results were analysed using t-test and linear regression in order to analyse the relationships among dataset size, processing time of PIR and entire data mining applications. The experiments showed that the PIR protocol used in this research is capable of encrypting the results of queries while producing the correct query results. There are indications that the processing time of PIR will eventually constitute 90% of the overalls, therefore, the PIR protocol used in this research has been found to be inefficient under the experimental data mining application with large dataset. This research has shown that the PIR protocol requires further improvement for use with big data and other encryption methods should also be investigated in order to secure data mining results. 
540 |a OpenAccess 
546 |a en 
650 0 4 |a Data mining 
650 0 4 |a Cloud computing 
650 0 4 |a Private information retrieval 
655 7 |a Thesis 
856 |z Get fulltext  |u http://hdl.handle.net/10292/9007