Award Abstract # 1350324
CAREER: Verifiable Outsourcing of Data Mining Computations

NSF Org: CNS
Division Of Computer and Network Systems
Recipient: THE TRUSTEES OF THE STEVENS INSTITUTE OF TECHNOLOGY
Initial Amendment Date: April 8, 2014
Latest Amendment Date: May 7, 2018
Award Number: 1350324
Award Instrument: Continuing Grant
Program Manager: Wei-Shinn Ku
CNS
 Division Of Computer and Network Systems
CSE
 Directorate for Computer and Information Science and Engineering
Start Date: June 1, 2014
End Date: May 31, 2021 (Estimated)
Total Intended Award Amount: $471,164.00
Total Awarded Amount to Date: $471,164.00
Funds Obligated to Date: FY 2014 = $90,873.00
FY 2015 = $92,518.00

FY 2016 = $94,199.00

FY 2017 = $95,912.00

FY 2018 = $97,662.00
History of Investigator:
  • Wendy Hui Wang (Principal Investigator)
    Hui.Wang@stevens.edu
Recipient Sponsored Research Office: Stevens Institute of Technology
ONE CASTLE POINT ON HUDSON
HOBOKEN
NJ  US  07030-5906
(201)216-8762
Sponsor Congressional District: 08
Primary Place of Performance: Stevens Institute of Technology
Castle Point on Hudson
Hoboken
NJ  US  07030-5954
Primary Place of Performance
Congressional District:
08
Unique Entity Identifier (UEI): JJ6CN5Y5A2R5
Parent UEI:
NSF Program(s): Secure &Trustworthy Cyberspace
Primary Program Source: 01001415DB NSF RESEARCH & RELATED ACTIVIT
01001516DB NSF RESEARCH & RELATED ACTIVIT

01001617DB NSF RESEARCH & RELATED ACTIVIT

01001718DB NSF RESEARCH & RELATED ACTIVIT

01001819DB NSF RESEARCH & RELATED ACTIVIT
Program Reference Code(s): 1045, 7434, 9102
Program Element Code(s): 806000
Award Agency Code: 4900
Fund Agency Code: 4900
Assistance Listing Number(s): 47.070

ABSTRACT

Spurred by developments such as cloud computing, there has been considerable interest in the data-mining-as-a-service (DMaS) paradigm in which a client outsources his/her data mining needs to a third-party service provider. However, this raises a few security concerns. One of the security concerns is that the service provider may return plausible but incorrect mining results to the client. There is a crucial need for techniques that enable the client to verify, without much effort, that the service provider has performed the outsourced computations faithfully and returned correct mining results. Despite the recent intensive efforts on verifiable general-purpose computations, efficient result verification of data mining computations remains a largely unexplored territory.

This CAREER proposal aims at designing efficient and practical verification techniques for data mining computations outsourced to an untrusted service provider. Research activities include developing (1) innovative verification approaches for data mining computations without any privacy preservation mechanisms; (2) new verification approaches for privacy-preserving data mining computations; (3) novel methods for the analysis of attack types and modeling of the collusion behaviors of service providers; and (4) a full system approach in developing, deploying, and evaluating the proposed techniques.

Advances in verifiable outsourcing of data mining computations can spur wider adoption of cloud services. This project also includes curriculum development and the training of high school, undergraduate, graduate, women and students in underrepresented groups.

PUBLICATIONS PRODUCED AS A RESULT OF THIS RESEARCH

Note:  When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

(Showing: 1 - 10 of 27)
Anna Monreale, Hui Wang "Privacy-Preserving Outsourcing of Data Mining" The 2nd IEEE International Workshop on Secure Identity Management in the Cloud Environment, co-located with the 40th IEEE Computer Society International Conference on Computers, Software & Applications , 2016
Boxiang Dong and Hui Wang "EARRING: Efficient Authentication of Outsourced Record Matching" the Proceedings of 2017 IEEE International Conference on Information Reuse and Integration (IRI 2017) , 2017 978-1-5386-1562-1
Boxiang Dong, Hui Wang "ARM:Authenticated Approximate Record Matching for Outsourced Databases" IEEE 17 th International Conference on Information Reuse and Integration (IRI) , 2016 , p.591 978-1-5090-3207-5
Boxiang Dong, Hui Wang "Frequency-hiding Dependency-preserving Encryption for Outsourced Databases" The 37th IEEE International Conference on Data Engineering (ICDE)  , 2017 , p.721 978-1-5090-6543-1
Boxiang Dong, Hui Wang, Anna Monreale, Dino Pedreschi, Fosca Giannotti, Wenge Guo "Authenticated Outlier Mining in Outsourced Databases" Transactions on Dependable and Secure Computing , 2017 1545-5971
Boxiang Dong, Ruilin Liu, Hui Wang "Trust-but-Verify: Verifying Result Correctness of Outsourced Frequent Itemset Mining" IEEE Transactions on Services Computing , v.9 , 2016 , p.18
Boxiang Dong, Wendy Hui Wang "Secure partial encryption with adversarial functional dependency constraints in the database-as-a-service model" Data & Knowledge Engineering , v.116 , 2018 , p.1 0169-023X
Boxiang Dong, Wendy Hui Wang "Secure partial encryption with adversarial functional dependency constraints in the database-as-a-service model." Data & Knowledge Engineering , v.116 , 2018 0169-023X
Boxiang Dong, Wendy Hui Wang, Ruilin Liu "Privacy-preserving Outsourced Record Matching" International Journal of Information Security , 2017
Boxiang Dong, Wendy Hui Wang, Ruilin Liu "Privacy-preserving Outsourced Record Matching" International Journal of Information Security , 2017
Bo Zhang, Boxiang Dong and Hui Wang "Budget-constrained Result Integrity Verification of Outsourced Data Mining Computations" The 31st Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSec) , 2017 , p.311 978-3-319-61175-4
(Showing: 1 - 10 of 27)

PROJECT OUTCOMES REPORT

Disclaimer

This Project Outcomes Report for the General Public is displayed verbatim as submitted by the Principal Investigator (PI) for this award. Any opinions, findings, and conclusions or recommendations expressed in this Report are those of the PI and do not necessarily reflect the views of the National Science Foundation; NSF has not approved or endorsed its content.

Data Mining as a Service (DMaaS) allows clients with limited resources to outsource their expensive data mining tasks to powerful servers. Despite the huge benefits, current DMaaS solutions still lack strong assurances on service correctness (i.e., whether the DMaaS service providers faithfully execute the data mining tasks as expected). Without these assurances, unfaithful service providers can return improperly-executed data mining results or partially-trained data mining models while asking for over-claimed rewards. However, it is challenging to verify the integrity of service provider, especially in the open market without a trusted third party. 

Intellectual Merit: The goal of this CAREER project is to design efficient and practical verification techniques to bring integrity assurances to DMaaS. With these techniques, the clients can be assured that data mining tasks are correctly executed on an untrusted server. The project has four main research tasks: (1) developing theory and algorithms for correctness verification of data mining computations without privacy constraint; (2) designing verification methods for privacy-preserving data mining computations in DMaaS; (3) analyzing and modeling the attacks and misbehaviors of DMaaS service providers; and (4) providing a full systematic approach in developing, deploying, and evaluating the proposed verification techniques. The work supported by this CAREER Award has led to quantitative new insights on the behaviors of state-of-the-art data mining models, greatly enhancing our capabilities to implement verification techniques for these models in DMaaS systems. The findings from this CAREER project have been published in 27 peer-reviewed journals and conference proceedings. This NSF CAREER award also leads to four PhD dissertations and 28 paper presentations in conferences.

Broader Impacts: With the support by this NSF CAREER award, the PI has been able to develop a highly interdisciplinary and collaborative research and education program that involves broad participation of graduate and undergraduate students. Furthermore, the PI has incorporated new course materials relevant to the PI's research into undergraduate (CS442: Database Management System) and graduate (CS609: Data Management and Exploration on the Web) courses at Stevens Institute of Technology (SIT). The PI also has provided training of female students through this CAREER project. With this CAREER award, the PI has been working with two female master students for their independent study at SIT, and graduated one female PhD student. 


Last Modified: 10/06/2021
Modified by: Wendy Hui Wang

Please report errors in award information by writing to: awardsearch@nsf.gov.

Print this page

Back to Top of page