Stevens Creek Software LLC
In this paper, the authors focus on the problem of result integrity verification for outsourcing of frequent itemset mining. They design efficient cryptographic approaches that verify whether the returned frequent itemset mining results are correct and complete with deterministic guarantee. The key of their solution is that the service provider constructs cryptographic proofs of the mining results. Both correctness and completeness of the mining results are measured against the proofs. They optimize the verification by minimizing the number of proofs.