{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T10:04:40Z","timestamp":1753437880507,"version":"3.37.3"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2024,9,25]],"date-time":"2024-09-25T00:00:00Z","timestamp":1727222400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,9,25]],"date-time":"2024-09-25T00:00:00Z","timestamp":1727222400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["62102447"],"award-info":[{"award-number":["62102447"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Henan Key Laboratory of Network Cryptography Technology","award":["LNCT2022-A16"],"award-info":[{"award-number":["LNCT2022-A16"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2024,11]]},"DOI":"10.1007\/s12083-024-01761-4","type":"journal-article","created":{"date-parts":[[2024,9,25]],"date-time":"2024-09-25T01:39:16Z","timestamp":1727228356000},"page":"4156-4174","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Privacy-preserving Apriori-based association rule mining over semantically secure encrypted cloud database"],"prefix":"10.1007","volume":"17","author":[{"given":"Wei","family":"Wu","sequence":"first","affiliation":[]},{"given":"Jialu","family":"Hao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,9,25]]},"reference":[{"issue":"1","key":"1761_CR1","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/s11280-018-0539-4","volume":"22","author":"W Wei","year":"2019","unstructured":"Wei W, Parampalli U, Liu J, Xian M (2019) Privacy preserving k-nearest neighbor classification over encrypted database in outsourced cloud environments. World Wide Web 22(1):101\u2013123","journal-title":"World Wide Web"},{"issue":"3","key":"1761_CR2","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1002\/cpe.3286","volume":"28","author":"H Wang","year":"2016","unstructured":"Wang H, Yi X, Bertino E, Sun L (2016) Protecting outsourced data in cloud computing through access management. Concurr Comput Pract Exp 28(3):600\u2013615","journal-title":"Concurr Comput Pract Exp"},{"key":"1761_CR3","doi-asserted-by":"publisher","first-page":"2914","DOI":"10.1109\/TIFS.2020.2980192","volume":"15","author":"L Liu","year":"2020","unstructured":"Liu L, Chen R, Liu X, Jinshu S, Qiao L (2020) Towards practical privacy-preserving decision tree training and evaluation in the cloud. IEEE Trans Inf Forensics Secur 15:2914\u20132929","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"5","key":"1761_CR4","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1109\/TDSC.2015.2483503","volume":"14","author":"J Zhang","year":"2015","unstructured":"Zhang J, Li H, Liu X, Luo Y, Chen F, Wang H, Chang L (2015) On efficient and robust anonymization for privacy protection on massive streaming categorical information. IEEE Trans Dependable Secure Comput 14(5):507\u2013520","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"1761_CR5","doi-asserted-by":"crossref","unstructured":"Wang H, Wang Y, Taleb T, Jiang X (2019) Special issue on security and privacy in network computing. World Wide Web 1\u20137","DOI":"10.1007\/s11280-019-00704-x"},{"issue":"3","key":"1761_CR6","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1109\/TKDE.2005.35","volume":"17","author":"H Wang","year":"2005","unstructured":"Wang H, Cao J, Zhang Y (2005) A flexible payment scheme and its role-based access control. IEEE Trans Knowl Data Eng 17(3):425\u2013436","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"6","key":"1761_CR7","doi-asserted-by":"publisher","first-page":"840","DOI":"10.1109\/TKDE.2008.132","volume":"21","author":"H Wang","year":"2009","unstructured":"Wang H, Zhang Y, Cao J (2009) Effective collaboration with information sharing in virtual universities. IEEE Trans Knowl Data Eng 21(6):840\u2013853","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"4","key":"1761_CR8","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1007\/s11280-011-0114-8","volume":"14","author":"M Li","year":"2011","unstructured":"Li M, Sun X, Wang H, Zhang Y, Zhang J (2011) Privacy-aware access control with trust management in web service. World Wide Web 14(4):407\u2013430","journal-title":"World Wide Web"},{"key":"1761_CR9","doi-asserted-by":"crossref","unstructured":"Wang H, Zhang Z, Taleb T (2017) Special issue on security and privacy of iot. World Wide Web 1\u20136","DOI":"10.1007\/s11280-017-0490-9"},{"issue":"4","key":"1761_CR10","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1016\/j.is.2003.09.001","volume":"29","author":"Alexandre Evfimievski","year":"2004","unstructured":"Evfimievski Alexandre, Srikant Ramakrishnan, Agrawal Rakesh, Gehrke Johannes (2004) Privacy preserving mining of association rules. Inf Syst 29(4):343\u2013364","journal-title":"Inf Syst"},{"key":"1761_CR11","doi-asserted-by":"crossref","unstructured":"Lin J-L, Liu JY-C (2007) Privacy preserving itemset mining through fake transactions. In: Proceedings of the 2007 ACM symposium on applied computing, pp 375\u2013379. ACM","DOI":"10.1145\/1244002.1244092"},{"issue":"2","key":"1761_CR12","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1587\/transinf.E93.D.315","volume":"93","author":"A Mohaisen","year":"2010","unstructured":"Mohaisen A, Jho N-S, Hong D, Nyang DH (2010) Privacy preserving association rule mining revisited: Privacy enhancement and resources efficiency. IEICE Trans Inf Syst 93(2):315\u2013325","journal-title":"IEICE Trans Inf Syst"},{"key":"1761_CR13","unstructured":"Wong WK, Cheung DW, Hung E, Kao B, Mamoulis N (2007) Security in outsourcing of association rule mining. In: Proceedings of the 33rd international conference on Very large data bases, pp 111\u2013122. VLDB Endowment"},{"key":"1761_CR14","doi-asserted-by":"crossref","unstructured":"Tai C-H, Yu PS, Chen M-S (2010) k-support anonymity based on pseudo taxonomy for outsourcing of frequent itemset mining. In: Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining, pp 473\u2013482. ACM","DOI":"10.1145\/1835804.1835866"},{"issue":"3","key":"1761_CR15","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1109\/JSYST.2012.2221854","volume":"7","author":"F Giannotti","year":"2013","unstructured":"Giannotti F, Lakshmanan LVS, Monreale A, Pedreschi D, Wang H (2013) Privacy-preserving mining of association rules from outsourced transaction databases. IEEE Syst J 7(3):385\u2013395","journal-title":"IEEE Syst J"},{"issue":"8","key":"1761_CR16","doi-asserted-by":"publisher","first-page":"1847","DOI":"10.1109\/TIFS.2016.2561241","volume":"11","author":"L Li","year":"2016","unstructured":"Li L, Lu R, Choo K-KR, Datta A, Shao J (2016) Privacy-preserving-outsourced association rule mining on vertically partitioned databases. IEEE Trans Inf Forensics Secur 11(8):1847\u20131861","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"1761_CR17","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1016\/j.ins.2014.01.040","volume":"267","author":"J Lai","year":"2014","unstructured":"Lai J, Li Y, Deng RH, Weng J, Guan C, Yan Q (2014) Towards semantically secure outsourcing of association rule mining on categorical data. Inf Sci 267:267\u2013286","journal-title":"Inf Sci"},{"key":"1761_CR18","doi-asserted-by":"crossref","unstructured":"Yi X, Rao F-Y, Bertino E, Bouguettaya A (2015) Privacy-preserving association rule mining in cloud computing. In: Proceedings of the 10th ACM symposium on information, computer and communications security, pp 439\u2013450. ACM","DOI":"10.1145\/2714576.2714603"},{"key":"1761_CR19","doi-asserted-by":"crossref","unstructured":"Imabayashi H,\u00a0Ishimaki Y, Umayabara A, Sato H, Yamana H (2016) Secure frequent pattern mining by fully homomorphic encryption with ciphertext packing. In: Data privacy management and security assurance, pp 181\u2013195. Springer","DOI":"10.1007\/978-3-319-47072-6_12"},{"key":"1761_CR20","unstructured":"Qiu S, Wang B, Li M, Liu J, Shi Y (2017) Toward practical privacy-preserving frequent itemset mining on encrypted cloud data. IEEE Trans Cloud Comput"},{"key":"1761_CR21","doi-asserted-by":"crossref","unstructured":"Liu L, Su J, Chen R, Liu X, Wang X, Chen S, Leung H (2018) Privacy-preserving mining of association rule on outsourced cloud data from multiple parties. In: Australasian conference on information security and privacy, pp 431\u2013451. Springer","DOI":"10.1007\/978-3-319-93638-3_25"},{"issue":"2","key":"1761_CR22","doi-asserted-by":"publisher","first-page":"607","DOI":"10.1007\/s11280-021-00863-w","volume":"24","author":"W Wei","year":"2021","unstructured":"Wei W, Xian M, Parampalli U, Bin L (2021) Efficient privacy-preserving frequent itemset query over semantically secure encrypted cloud database. World Wide Web 24(2):607\u2013629","journal-title":"World Wide Web"},{"key":"1761_CR23","doi-asserted-by":"crossref","unstructured":"Vaidya J, Clifton C (2002) Privacy preserving association rule mining in vertically partitioned data. In: Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining, pp 639\u2013644. ACM","DOI":"10.1145\/775047.775142"},{"issue":"9","key":"1761_CR24","doi-asserted-by":"publisher","first-page":"1026","DOI":"10.1109\/TKDE.2004.45","volume":"16","author":"M Kantarcioglu","year":"2004","unstructured":"Kantarcioglu M, Clifton C (2004) Privacy-preserving distributed mining of association rules on horizontally partitioned data. IEEE Trans Knowl Data Eng 16(9):1026\u20131037","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"1761_CR25","doi-asserted-by":"crossref","unstructured":"Ma C, Wang B, Jooste K, Zhang Z, Ping Y (2019) Practical privacy-preserving frequent itemset mining on supermarket transactions. IEEE Syst J","DOI":"10.1109\/JSYST.2019.2922281"},{"issue":"2","key":"1761_CR26","doi-asserted-by":"publisher","first-page":"3131","DOI":"10.1109\/JSYST.2020.3001316","volume":"15","author":"Hongping Pang","year":"2020","unstructured":"Pang Hongping, Wang Baocang (2020) Privacy-preserving association rule mining using homomorphic encryption in a multikey environment. IEEE Syst J 15(2):3131\u20133141","journal-title":"IEEE Syst J"},{"issue":"2","key":"1761_CR27","first-page":"641","volume":"35","author":"P Jia","year":"2023","unstructured":"Jia P, Zhang J, Zhao B, Li H, Liu X (2023) Privacy-preserving association rule mining via multi-key fully homomorphic encryption. J King Saud Univ-Comput Inf Sci 35(2):641\u2013650","journal-title":"J King Saud Univ-Comput Inf Sci"},{"key":"1761_CR28","doi-asserted-by":"crossref","unstructured":"Elmehdwi Y, Samanthula BK, Jiang W (2014) Secure k-nearest neighbor query over encrypted data in outsourced environments. In: Data Engineering (ICDE), 2014 IEEE 30th international conference on, pp 664\u2013675. IEEE","DOI":"10.1109\/ICDE.2014.6816690"},{"issue":"5","key":"1761_CR29","doi-asserted-by":"publisher","first-page":"1261","DOI":"10.1109\/TKDE.2014.2364027","volume":"27","author":"BK Samanthula","year":"2015","unstructured":"Samanthula BK, Elmehdwi Y, Jiang W (2015) K-nearest neighbor classification over semantically secure encrypted relational data. IEEE Trans Knowl Data Eng 27(5):1261\u20131273","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"1761_CR30","doi-asserted-by":"crossref","unstructured":"Rong H, Wang H, Liu J, Hao J, Xian M (2017) Privacy-preserving k-means clustering under multiowner setting in distributed cloud environments. Secur Commun Netw 2017","DOI":"10.1155\/2017\/3910126"},{"key":"1761_CR31","doi-asserted-by":"crossref","unstructured":"Wu W, Liu J, Wang H, Hao J, Xian M (2020) Secure and efficient outsourced k-means clustering using fully homomorphic encryption with ciphertext packing technique. IEEE Trans Knowl Data Eng","DOI":"10.1109\/TKDE.2020.2969633"},{"key":"1761_CR32","doi-asserted-by":"publisher","first-page":"599","DOI":"10.1017\/CBO9780511721656.004","volume":"2","author":"O Goldreich","year":"2004","unstructured":"Goldreich O (2004) General cryptographic protocols. Found Cryptogr 2:599\u2013764","journal-title":"Found Cryptogr"},{"key":"1761_CR33","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1017\/CBO9780511721656.002","volume":"2","author":"O Goldreich","year":"2004","unstructured":"Goldreich O (2004) Encryption schemes. Found Cryptogr 2:373\u2013470","journal-title":"Found Cryptogr"},{"key":"1761_CR34","doi-asserted-by":"crossref","unstructured":"Bos JW, Lauter K, Loftus J, Naehrig M (2013) Improved security for a ring-based fully homomorphic encryption scheme. In: IMA International conference on cryptography and coding, pp 45\u201364. Springer","DOI":"10.1007\/978-3-642-45239-0_4"},{"key":"1761_CR35","doi-asserted-by":"crossref","unstructured":"Paillier P (1999) Public-key cryptosystems based on composite degree residuosity classes. In: International conference on the theory and applications of cryptographic techniques, pp 223\u2013238. Springer","DOI":"10.1007\/3-540-48910-X_16"},{"issue":"1","key":"1761_CR36","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1007\/s10623-012-9720-4","volume":"71","author":"NP Smart","year":"2014","unstructured":"Smart NP, Vercauteren F (2014) Fully homomorphic simd operations. Des Codes Cryptogr 71(1):57\u201381","journal-title":"Des Codes Cryptogr"},{"key":"1761_CR37","unstructured":"Agrawal R, Srikant R et\u00a0al (1994) Fast algorithms for mining association rules. In: Proc. 20th int. conf. very large data bases, VLDB, vol 1215, pp 487\u2013499"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-024-01761-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-024-01761-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-024-01761-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,12]],"date-time":"2024-11-12T15:08:49Z","timestamp":1731424129000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-024-01761-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,25]]},"references-count":37,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2024,11]]}},"alternative-id":["1761"],"URL":"https:\/\/doi.org\/10.1007\/s12083-024-01761-4","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"type":"print","value":"1936-6442"},{"type":"electronic","value":"1936-6450"}],"subject":[],"published":{"date-parts":[[2024,9,25]]},"assertion":[{"value":"26 October 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 July 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 September 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have read the Springer journal policies on author responsibilities and submits this manuscript in accordance with those policies. The authors consent to publish this paper in this journal.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare no Conflict of interest.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}