A Novel Technique of Privacy Protection. Mining of Association Rules from Outsourced. Transaction Databases

Size: px
Start display at page:

Download "A Novel Technique of Privacy Protection. Mining of Association Rules from Outsourced. Transaction Databases"

Transcription

1 A Novel Technique of Privacy Protection Mining of Association Rules from Outsource Transaction Databases 1 Dhananjay D. Wadkar, 2 Santosh N. Shelke 1 Computer Engineering, Sinhgad Academy of Engineering Pune, India 2 Assistant Professor, Sinhgad Academy of Engineering Pune, India Abstract - In developments such as cloud computing in data mining, it has been consider recent interest in the paradigm of data mining-as-a-service. A third party service provider needs in computational resources can outsource its mining needs to a third party service provider. In that case items and the association rules of the outsourced database are considered private property of the corporation. In that corporate property can protect to protect this privacy, first the data owner transforms its data and loads it to the server; server sends its mining queries to user and retrieves the true patterns from the extracted patterns received from the data owner. In the propose method we study the problem of Privacypreserving Mining of Association Rules from Outsourced Transaction Databases. In that we can propose a one dataset and this dataset representation we used the k means clustering algorithm. Here we can propose an attack model based on background knowledge and divided this scheme for privacy preserving outsourced data mining. Propose system ensures that each transformed item is identical and with respect to the attacker s background knowledge in the outsource transaction data mining. Keywords - Privacy Preserving Mining, Association Rule Mining, Data Perturbation, Encryption/Decryption module. 1. Introduction Data mining is to extract information from large databases in corporate data as well as data process. Data mining is the process of displaying new patterns from large data set marketing analysis, medical diagnosis etc. The data mining is under attack from privacy supporters because of a misunderstanding about what it actually is and a valid concern about how it will be actually works. This has caused concerns that personal data may be used for a variety of intrusive in the private property. In the privacy preserving data mining help to achieve data mining goals without resign the privacy of the individuals and without allowing learning underlying original data values. Association mining rule is a technology in data mining that identifies the regularities found in large volume of data [2]. Association mining rule technique could be compromised when allowing third party to identify and reveal hidden information that is private for an individual or corporate data. Privacyprotecting data mining using association rule mining refers to the area of data mining that seeks to safeguard sensitive information from unsanctioned disclosure. When people talk of privacy protection, they say keep information about me from being available to others or third party. The real concern is that people or corporate data information not be misused. When the once information is released, it will be impossible to prevent misuse. Utilizing this distinction ensuring that a data mining concept won t enable misuse of personal information in that complete privacy would prevent. We need technical and social solutions that ensure data will not be released or not be protected [5]. We see the existing method conservative frequencybased attack model in which the server knows the exact set of items in the owner s data and it also knows the exact support of every item in the original data. It has been developed the idea of using fake items to defend against the frequency-based attack and it was lacking a formal theoretical analysis of privacy guarantees and has been shown to be flawed very recently in, the method for breaking the proposed encryption is given. Therefore, in our previous and preliminary work, we proposed to solve this problem by using k-privacy, in that each item in the outsourced dataset should be identical from at least k 1 items regarding their support. 196

2 Fig.1. Architecture of Data Mining as a service. Fig. shows the architecture of the mining as a service Fig 1 [1] the client encrypts its data using an encrypt/decrypt module in privacy preserving outsource transaction databases. The third party conducts data mining and sends the encrypted patterns to the owner. The existing system encryption scheme has the property that the returned supports are not true supports. In the propose system the E/D module which is useful to recover the true identity of the returned patterns as well their true supports. The (E/D) module trivial to show that if the data is encrypted using 1-1 substitution ciphers, In the cipher text there are many ciphers and because of this transactions and supported patterns can be broken by the server with a high probability by launching the frequency-based attack. In propose method we are going to use devise encryption schemes such that formal based attack privacy guarantees can be proven against attacks conducted by the server using background knowledge [1]. First, we define an attack model for the displaying and make precise the background knowledge the adversary may possess. Our notion of privacy requires that for each cipher text item, there are at least k 1 distinct cipher items that are indistinguishable from the item regarding their supports Second, we make an encryption scheme, called Rob Frugal that the E/D module can employ to transform client data before it is shipped to the server. Third, to allow the E/D module to recover the confidence value and true patterns and along with their correct support of data item, we propose that it successfully creates and keeps a compact structure, called summary [1]. 2. Related Work There are several edges where related work is occurring. Previous work in privacy-protection data mining has two issues. First is the aim is preserving customer privacy by distorting the data values [4]. The idea is that the prevented data does not reveal private information, and thus is safe to use for mining. The key result is that the prevent data, and information on the distribution of the random data used to change the data and it can be used to generate an approximation to the original data distribution without changing the original data values. The distribution is used to improve mining results over mining the distorted data directly from the corporate data [5]. The data distortion approach has been applied to association rules [4], [5]. And developed the idea is to modify data values such that reconstruction of the values for any individual transaction is difficult, but the rules learned on the distorted data are still valid. One of the main interesting feature of this work is a flexible definition of privacy protection if data and the ability to correctly guess a value of 1 from the distorted data can be considered a greater threat to privacy than correctly learning a 0.The data displaying approach addresses a different problem from our related work [5]. The research of privacy-preserving data mining (PPDM) has caught much attention recently in data mining. The main approach here is that private data is collected from a number of sources by a collector for the purpose of consolidating the data and conducting mining. The data owner is not trusted with protecting the privacy, so data is subjected to a random disturbance as it is collected. A new approach have been developed for disordering the data so as to preserve privacy while ensuring the mined 197

3 patterns or other analytical properties are sufficiently close to the patterns mined from original data [1] [2].We can study the problem of outsourcing the association rule mining task within a corporate privacy-preserving framework. A significantly body of work has been done on privacy-preserving data mining in a variety of contexts. A common attribute of most of the previously studied frameworks is that the patterns mined from the data are intended to be shared with parties other than the data owner. The key different between such bodies of work and our problem is that, both the underlying data and the mined results are not intended for sharing and muster main private to the data owner.[3] We adopt a conservative frequency-based attack model in which the server knows the exact set of items in the owner s data; server also knows the exact support of every item in the original data. They introduced the idea of using fake items to defend against the frequencybased attack, it was lacking a formal theoretical analysis of privacy guarantees and it has been shown to be flawed very recently in where a method for breaking the proposed encryption is given. We proposed to solve this problem by using k-privacy and that each item in the outsourced dataset should be indistinguishable from at least k-1 items regarding their support. There are two techniques can be classified into Cryptography-Based Techniques and Generative-Based Techniques. 1. Cryptography-Based Techniques: In the context of PPDM over distributed data or cryptography-based techniques have been developed to solve problem of the following nature: Number of parties want to conduct a computation based on their private inputs. In the system the issue here is how to conduct such a computation so that no party knows anything except its own input. This problem is referred to as the Secure Multi- Party Computation (SMC) problem the technique proposed in address privacy-preserving classification, while the techniques proposed in address privacy-preserving association rule mining, and the technique in addresses privacy-preserving clustering [6]. 2. Generative-Based Techniques: These techniques can be designed to perform distributed mining tasks. In this existing system each party shares just a small portion of its local model which is used to construct the global model for the existing solutions are built over horizontally partitioned data. The solution presented in addresses privacy-preserving frequent item sets in distributed databases [6]. 3. Proposed System This problem attacked in our paper is outsourcing of pattern mining within a corporate privacy-preserving framework. A key different between this problem and the abovementioned PPDM problems is that, not only the underlying data but also the mined results are not intended for sharing and must remain private. When the server possesses background knowledge and conducts attacks on that basis and it should not be able to guess the correct candidate item or item set corresponding to a given cipher item or item set with a probability above a given threshold. Fig 2: General Architecture of Outsourced 3rd Party Association Rules Mining. Fig. shows the architecture of outsource 3 rd party association rules mining (Refer [4]) in this process the specialized terminals are semi trusted in nature, this makes privacy and security leakages a real danger. The 3rd party server knows the confidence and support values of each item-set in every transaction. In that case the data encryption is applied and the process is susceptible to frequency attacks and then leads to a loss of privacy data. The server can make deductions as to the semantic meanings of each encrypted item-set. Clearly, privacy and security mechanisms are required to be in place in such outsourcing activities. How this 198

4 activity secures are these mechanisms and what security notions do they satisfy? This propose system attempts to contribute to the body of knowledge by making a case for the distribution of outsourced association rules mining, the application scenarios, as well as to define a security notation for an implementation. There are four main modules in the propose system they can be given below: 1. Encryption scheme Rob frugal 2. Data preprocessing and K-means clustering algorithm 3. Support and confidence calculation by using Apriori algorithm 4. Rob frugal Decryption scheme 1. Encryption Scheme of Rob Frugal: The server who gains access to it may possess some background knowledge using which they can on the encrypted database D. We can be referring to of these agents as an attacker. We can adopt a conservative model and assume that the attacker knows exactly the set of (plain) items I in the original transaction database D and their true supports. We assume the service provider (who can be an attacker) is semi-honest in the sense that although he does not know the details of our encryption algorithm, he can be interested and thus can use his background knowledge to make inferences on the encrypted transactions. We also consider that the attacker always returns (encrypted) item sets together with their exact support. The data owner considers the true identity of: (1) Every cipher item (2) Every cipher transaction (3) Every cipher frequent pattern in data mining as the intellectual property which should be protected. In this section, we introduce the encryption scheme, it can be transforms a TDB D into its encrypted version D*. The proposed scheme is parametric k > 0 and consists of three main steps: (1) using 1-1 substitution ciphers for each plain item (2) using a specific item k- grouping method (3)using a method for adding new fake transactions for achieving k-privacy. The build fake transactions are added to D(once items are replaced by cipher items) to form D* and transmitted to the server. 2. K-Means Clustering Algorithm: Clustering is defined as clustering of data is a method by which large sets of data are grouped into clusters of smaller sets of similar data. K-means clustering algorithm to classify or to group your objects based on attributes/features into K number of group. In this algorithm K is positive integer number and the grouping is done by minimizing the sum of squares of distances between data and the corresponding cluster centroid. Fig3. K-means clustering for finding centroid Given k The k-means algorithm consists of four steps: 1. Select initial centroids at random way to choose nearest node. 2. Assign each object to the cluster with the nearest centroid node. 3. Compute each centroid as the mean of the objects assigned to it. 4. Repeat previous 2 steps until no change. In the k-means clustering algorithm we use the dataset and that dataset will be cleaned by the preprocessing techniques.in that also unwanted data will be remove from the dataset. 3. Apriori Algorithm: In a data mining, Apriori is a classic algorithm for learning association rules. The Apriori algorithm is designed to operate on databases containing transactions. The algorithm attempts to find subsets which are common to at least a minimum number C (the support, or confidence threshold) of the item sets. In this algorithm where frequent subsets are extended one item at a time known as candidate generation, and the number of groups of candidates are tested against the data. This algorithm uses breadth-first search and a hash tree structure to count candidate item sets efficiently. Support count: The support count of an item set X and it is denoted by X count, in a data set T is the number of transactions in T that contain X. We can assume T has n transactions. Then, 199

5 4. Result In the Apriori algorithm find out all rules that satisfy the user-specified minimum support (minsup) and minimum confidence (minconf). Apriori algorithm consist of eight steps they can be given below: 1: Find all large itemsets 2: For (a = 2; while La-1 is non-empty; a++) 3: {Ca = apriori-gen(lk-1) 4: For each c in Ca, initialize c. where c=count to zero 5: For all records r in the database 6: {Cr = subset (Ca, r); For each c in Cr, c. count++ } 7: Set La := all c in Ca whose count >= minsup Related work done on mining association rules for outsources transaction databases. We have been comparing all the previous results and get the proposed method result.we can create a number of power industries database and calculate the used power of that industries by assuming the last five years dataset and calculate the current used power of that industries. This industries data can be secure by using the AES encryption decryption algorithm. In this Proposed method we also calculate the next year power uses by using the current year power uses. We can calculate the next year power uses also. 4. Rob Frugal Decryption Scheme: When the client requests the execution of a pattern mining query to the server, It can be specify a minimum support threshold σ and server returns the computed frequent patterns from D. Clearly, for every item set S and its corresponding cipher item set E, we have that supp D(S) supp D_(E) and for each cipher pattern E returned by the server together with supp D_(E) and the E/D module recovers the corresponding plain pattern S. It requires reconstructing the exact support of S in D and deciding on this basis if S is a frequent pattern. To reach this goal, the E/D module adjusts the support of E by removing the effect of the fake transactions. Supp D(S) = supp D_(E) supp D_\D(E). This can be follows from the fact that support of an item set is additive over a disjoint union of transaction sets. The pattern S with adjusted support is kept in the output if supp D(S) σ and the final calculation of supp D_\D(E) is performed by the E/D module using the synopsis of the fake transactions in D \ D. Fig 5. Accuracy of Proposed Method In the above graph we can calculate the detection rate (false negative, true positive) we also calculated the penalty and reward for databases. Fig. 4: Flow of the Project Fig 6. Prediction and Uses power details 200

6 In the above two graph we can show the industry wise prediction power and actual used power. In this figure the uses power is greater than the prediction power we can show the rewards for that day and uses power is less than prediction power then we can give the penalty of the current date. 5. Conclusion Protecting privacy in data mining activities is a very important issue in many applications. There is new approach to solve the problem of privacy preserving data mining in the scenario of outsourced business transaction database has been solved successfully. This approach is efficient and better than many other perturbation techniques. Proposed algorithm has reduced the time complexity and space complexity as well as false rules problems in effective manner from the previous work. In future, we will try to make it is more powerful for cloud and distributed databases. References [1] Fosca Giannotti, Laks V.S. Lakshmanan, Anna Monreale, Dino Pedreschi, and Hui (Wendy) Wang. Privacy-preserving Mining of Association Rules from Outsourced Transaction Databases. Ieee systems journal vol:7 no:3 year 2013 [2] Vineet Richhariya1 & Prateek Chourey. A Robust Technique For Privacy Preservation Of Outsourced Transaction Database. Issn(E): ; Issn(P): Vol. 2, Issue 6, Jun 2014, [3] Joseph Chan Joo Keng. Privacy Protection in Outsourced Association Rule Mining using Distributed Servers and Its Privacy Notions. IS752: [4] Adsure Sharad S., Prof. S.Pratap Singh. Preserving Data Privacy By Susceptible Association Rule Hiding Approach. International Journal Of Computer Engineering And Applications, Volume Vii, Issue I, July 14. [5] Sunil kumar chintada,jayanthiraomadina. A Privacy Preserving Association Rule Mining Over Unrealized Datasets. International Journal of Engineering Trends and Technology (IJETT) Volume 5 Number 4 - Nov 2013 ISSN: [6] R.Natarajan1, Dr.R.Sugumar, M.Mahendran, K.Anbazhagan. A survey on Privacy Preserving Data Mining. ISSN International Journal of Advanced Research in Computer and Communication Engineering Vol. 1, Issue 1, MARCH 2012 [7] Rakesh Agrawal and Ramakrishnan Srikant. Fast algorithms for mining association rules. In VLDB, pages , [8] Rakesh Agrawal and Ramakrishnan Srikant. Privacy preserving data mining. In SIGMOD, pages , [9] Gilburd B, Schuste A, and Wolff R. k-ttp: A new privacy model for large scale distributed environments. In VLDB, pages , [10] Fosca Giannotti, Laks V.S. Lakshmanan, Anna Monreale, Dino Pedreschi, and Hui Wang. Privacypreserving outsourcing of association Rule mining. Tech Report: 2009-TR-013, ISTI-CNR, Pisa, [11] Fosca Giannotti, Laks V.S. Lakshmanan, Anna Monreale, Dino Pedreschi, and Hui Wang. Privacypreserving data mining from outsourced Databases. In SPCC2010, in conjunction with CPDP, [12] Murat Kantarcioglu and Chris Clifton. Privacypreserving distributed mining of association rules on horizontally partitioned data. TKDE, 16(9): , [13] P. Krishna Prasad and C. Pandu Rangan. Privacy preserving birch algorithm for clustering over arbitrarily partitioned databases. In Advanced Data Mining and Applications, pages ,

Privacy Preserving Outsourcing for Frequent Itemset Mining

Privacy Preserving Outsourcing for Frequent Itemset Mining Privacy Preserving Outsourcing for Frequent Itemset Mining M. Arunadevi 1, R. Anuradha 2 PG Scholar, Department of Software Engineering, Sri Ramakrishna Engineering College, Coimbatore, India 1 Assistant

More information

PRIVACY PRESERVING ASSOCIATION RULE MINING

PRIVACY PRESERVING ASSOCIATION RULE MINING Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 10, October 2014,

More information

Privacy Preserved Association Rule Mining For Attack Detection and Prevention

Privacy Preserved Association Rule Mining For Attack Detection and Prevention Privacy Preserved Association Rule Mining For Attack Detection and Prevention V.Ragunath 1, C.R.Dhivya 2 P.G Scholar, Department of Computer Science and Engineering, Nandha College of Technology, Erode,

More information

Privacy-Preserving in Outsourced Transaction Databases from Association Rules Mining

Privacy-Preserving in Outsourced Transaction Databases from Association Rules Mining Privacy-Preserving in Outsourced Transaction Databases from Association Rules Mining Ms. Deokate Pallavi B., Prof. M.M. Waghmare 2 Student of ME (Information Technology), DGOFFE, University of Pune, Pune

More information

Homomorphic Encryption Schema for Privacy Preserving Mining of Association Rules

Homomorphic Encryption Schema for Privacy Preserving Mining of Association Rules Homomorphic Encryption Schema for Privacy Preserving Mining of Association Rules M.Sangeetha 1, P. Anishprabu 2, S. Shanmathi 3 Department of Computer Science and Engineering SriGuru Institute of Technology

More information

BSS Homomorphic Encryption: A Privacy model for large transactional database

BSS Homomorphic Encryption: A Privacy model for large transactional database International Journal of Engineering Research and Development e-issn: 78-067X, p-issn: 78-800X, www.ijerd.com Volume 9, Issue 5 (December 0), PP. 5-59 BSS Homomorphic Encryption: A Privacy model for large

More information

Privacy Preserving Mining of Transaction Databases Sunil R 1 Dr. N P Kavya 2

Privacy Preserving Mining of Transaction Databases Sunil R 1 Dr. N P Kavya 2 IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 04, 2014 ISSN (online): 2321-0613 Privacy Preserving Mining of Transaction Databases Sunil R 1 Dr. N P Kavya 2 1 M.Tech

More information

International Journal of Scientific & Engineering Research, Volume 4, Issue 10, October-2013 ISSN 2229-5518 1582

International Journal of Scientific & Engineering Research, Volume 4, Issue 10, October-2013 ISSN 2229-5518 1582 1582 AN EFFICIENT CRYPTOGRAPHIC APPROACH FOR PRESERVING PRIVACY IN DATA MINING T.Sujitha 1, V.Saravanakumar 2, C.Saravanabhavan 3 1. M.E. Student, Sujiraj.me@gmail.com 2. Assistant Professor, visaranams@yahoo.co.in

More information

Privacy-Preserving Mining of Association Rules On Cloud by improving Rob Frugal Algorithm

Privacy-Preserving Mining of Association Rules On Cloud by improving Rob Frugal Algorithm Privacy-Preserving Mining of Association Rules On Cloud by improving Rob Frugal Algorithm Mr.Vishal R. Redekar Department of Computer Engineering Smt.Kashibai Navale College of Engineering Pune-411041,

More information

Enhancement of Security in Distributed Data Mining

Enhancement of Security in Distributed Data Mining Enhancement of Security in Distributed Data Mining Sharda Darekar 1, Prof.D.K.Chitre, 2 1,2 Department Of Computer Engineering, Terna Engineering College,Nerul,Navi Mumbai. 1 sharda.darekar@gmail.com,

More information

International Journal of Advanced Computer Technology (IJACT) ISSN:2319-7900 PRIVACY PRESERVING DATA MINING IN HEALTH CARE APPLICATIONS

International Journal of Advanced Computer Technology (IJACT) ISSN:2319-7900 PRIVACY PRESERVING DATA MINING IN HEALTH CARE APPLICATIONS PRIVACY PRESERVING DATA MINING IN HEALTH CARE APPLICATIONS First A. Dr. D. Aruna Kumari, Ph.d, ; Second B. Ch.Mounika, Student, Department Of ECM, K L University, chittiprolumounika@gmail.com; Third C.

More information

Performing Data Mining in (SRMS) through Vertical Approach with Association Rules

Performing Data Mining in (SRMS) through Vertical Approach with Association Rules Performing Data Mining in (SRMS) through Vertical Approach with Association Rules Mr. Ambarish S. Durani 1 and Miss. Rashmi B. Sune 2 MTech (III rd Sem), Vidharbha Institute of Technology, Nagpur, Nagpur

More information

Information Security in Big Data using Encryption and Decryption

Information Security in Big Data using Encryption and Decryption International Research Journal of Computer Science (IRJCS) ISSN: 2393-9842 Information Security in Big Data using Encryption and Decryption SHASHANK -PG Student II year MCA S.K.Saravanan, Assistant Professor

More information

Data Outsourcing based on Secure Association Rule Mining Processes

Data Outsourcing based on Secure Association Rule Mining Processes , pp. 41-48 http://dx.doi.org/10.14257/ijsia.2015.9.3.05 Data Outsourcing based on Secure Association Rule Mining Processes V. Sujatha 1, Debnath Bhattacharyya 2, P. Silpa Chaitanya 3 and Tai-hoon Kim

More information

Multi-table Association Rules Hiding

Multi-table Association Rules Hiding Multi-table Association Rules Hiding Shyue-Liang Wang 1 and Tzung-Pei Hong 2 1 Department of Information Management 2 Department of Computer Science and Information Engineering National University of Kaohsiung

More information

IMPROVED BYZANTINE FAULT TOLERANCE TWO PHASE COMMIT PROTOCOL

IMPROVED BYZANTINE FAULT TOLERANCE TWO PHASE COMMIT PROTOCOL IMPROVED BYZANTINE FAULT TOLERANCE TWO PHASE COMMIT PROTOCOL Robert Benny.B 1, Saravanan.M.C 2 1 PG Scholar, Dhanalakshmi Srinivasan College of Engineering, Coimbatore. 2 Asstistant Professor, Dhanalakshmi

More information

A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA

A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA U.Pandi Priya 1, R.Padma Priya 2 1 Research Scholar, Department of Computer Science and Information Technology,

More information

MUTI-KEYWORD SEARCH WITH PRESERVING PRIVACY OVER ENCRYPTED DATA IN THE CLOUD

MUTI-KEYWORD SEARCH WITH PRESERVING PRIVACY OVER ENCRYPTED DATA IN THE CLOUD MUTI-KEYWORD SEARCH WITH PRESERVING PRIVACY OVER ENCRYPTED DATA IN THE CLOUD A.Shanthi 1, M. Purushotham Reddy 2, G.Rama Subba Reddy 3 1 M.tech Scholar (CSE), 2 Asst.professor, Dept. of CSE, Vignana Bharathi

More information

Privacy-by-design in big data analytics and social mining

Privacy-by-design in big data analytics and social mining Monreale et al. EPJ Data Science 2014, 2014:10 REGULAR ARTICLE OpenAccess Privacy-by-design in big data analytics and social mining Anna Monreale 1,2*, Salvatore Rinzivillo 2, Francesca Pratesi 1,2, Fosca

More information

A FRAMEWORK FOR SECURITY IN DATA MINING USING INTELLIGENT AGENTS

A FRAMEWORK FOR SECURITY IN DATA MINING USING INTELLIGENT AGENTS A FRAMEWORK FOR SECURITY IN DATA MINING USING INTELLIGENT AGENTS Sharath Kumar J. and Maheswari N. School of Computing Science and Engineering, VIT University Chennai, Vandalur, Kelambakkam Road, Tamil

More information

A COGNITIVE APPROACH IN PATTERN ANALYSIS TOOLS AND TECHNIQUES USING WEB USAGE MINING

A COGNITIVE APPROACH IN PATTERN ANALYSIS TOOLS AND TECHNIQUES USING WEB USAGE MINING A COGNITIVE APPROACH IN PATTERN ANALYSIS TOOLS AND TECHNIQUES USING WEB USAGE MINING M.Gnanavel 1 & Dr.E.R.Naganathan 2 1. Research Scholar, SCSVMV University, Kanchipuram,Tamil Nadu,India. 2. Professor

More information

K-NN CLASSIFICATION OVER SECURE ENCRYPTED RELATIONAL DATA IN OUTSOURCED ENVIRONMENT

K-NN CLASSIFICATION OVER SECURE ENCRYPTED RELATIONAL DATA IN OUTSOURCED ENVIRONMENT Journal homepage: www.mjret.in K-NN CLASSIFICATION OVER SECURE ENCRYPTED RELATIONAL DATA IN OUTSOURCED ENVIRONMENT Akshay Dabi, Arslan Shaikh, Pranay Bamane, Vivek Thorat, Prof.Popat Borse. Computer Engineering.

More information

Privacy-preserving Analysis Technique for Secure, Cloud-based Big Data Analytics

Privacy-preserving Analysis Technique for Secure, Cloud-based Big Data Analytics 577 Hitachi Review Vol. 63 (2014),. 9 Featured Articles Privacy-preserving Analysis Technique for Secure, Cloud-based Big Data Analytics Ken Naganuma Masayuki Yoshino, Ph.D. Hisayoshi Sato, Ph.D. Yoshinori

More information

AN IMPROVED PRIVACY PRESERVING ALGORITHM USING ASSOCIATION RULE MINING(27-32) AN IMPROVED PRIVACY PRESERVING ALGORITHM USING ASSOCIATION RULE MINING

AN IMPROVED PRIVACY PRESERVING ALGORITHM USING ASSOCIATION RULE MINING(27-32) AN IMPROVED PRIVACY PRESERVING ALGORITHM USING ASSOCIATION RULE MINING AN IMPROVED PRIVACY PRESERVING ALGORITHM USING ASSOCIATION RULE MINING Ravindra Kumar Tiwari Ph.D Scholar, Computer Sc. AISECT University, Bhopal Abstract-The recent advancement in data mining technology

More information

A generalized Framework of Privacy Preservation in Distributed Data mining for Unstructured Data Environment

A generalized Framework of Privacy Preservation in Distributed Data mining for Unstructured Data Environment www.ijcsi.org 434 A generalized Framework of Privacy Preservation in Distributed Data mining for Unstructured Data Environment V.THAVAVEL and S.SIVAKUMAR* Department of Computer Applications, Karunya University,

More information

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption Partitioning Data and Domain Integrity Checking for Storage - Improving Cloud Storage Security Using Data Partitioning Technique Santosh Jogade *, Ravi Sharma, Prof. Rajani Kadam Department Of Computer

More information

An Analysis on Density Based Clustering of Multi Dimensional Spatial Data

An Analysis on Density Based Clustering of Multi Dimensional Spatial Data An Analysis on Density Based Clustering of Multi Dimensional Spatial Data K. Mumtaz 1 Assistant Professor, Department of MCA Vivekanandha Institute of Information and Management Studies, Tiruchengode,

More information

Security in Outsourcing of Association Rule Mining

Security in Outsourcing of Association Rule Mining Security in Outsourcing of Association Rule Mining W. K. Wong The University of Hong Kong wkwong2@cs.hku.hk David W. Cheung The University of Hong Kong dcheung@cs.hku.hk Ben Kao The University of Hong

More information

A Survey on Intrusion Detection System with Data Mining Techniques

A Survey on Intrusion Detection System with Data Mining Techniques A Survey on Intrusion Detection System with Data Mining Techniques Ms. Ruth D 1, Mrs. Lovelin Ponn Felciah M 2 1 M.Phil Scholar, Department of Computer Science, Bishop Heber College (Autonomous), Trichirappalli,

More information

DEVELOPMENT OF HASH TABLE BASED WEB-READY DATA MINING ENGINE

DEVELOPMENT OF HASH TABLE BASED WEB-READY DATA MINING ENGINE DEVELOPMENT OF HASH TABLE BASED WEB-READY DATA MINING ENGINE SK MD OBAIDULLAH Department of Computer Science & Engineering, Aliah University, Saltlake, Sector-V, Kol-900091, West Bengal, India sk.obaidullah@gmail.com

More information

Secure Collaborative Privacy In Cloud Data With Advanced Symmetric Key Block Algorithm

Secure Collaborative Privacy In Cloud Data With Advanced Symmetric Key Block Algorithm Secure Collaborative Privacy In Cloud Data With Advanced Symmetric Key Block Algorithm Twinkle Graf.F 1, Mrs.Prema.P 2 1 (M.E- CSE, Dhanalakshmi College of Engineering, Chennai, India) 2 (Asst. Professor

More information

An Overview of Knowledge Discovery Database and Data mining Techniques

An Overview of Knowledge Discovery Database and Data mining Techniques An Overview of Knowledge Discovery Database and Data mining Techniques Priyadharsini.C 1, Dr. Antony Selvadoss Thanamani 2 M.Phil, Department of Computer Science, NGM College, Pollachi, Coimbatore, Tamilnadu,

More information

Impelling Heart Attack Prediction System using Data Mining and Artificial Neural Network

Impelling Heart Attack Prediction System using Data Mining and Artificial Neural Network General Article International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347-5161 2014 INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Impelling

More information

ASSOCIATION RULE MINING ON WEB LOGS FOR EXTRACTING INTERESTING PATTERNS THROUGH WEKA TOOL

ASSOCIATION RULE MINING ON WEB LOGS FOR EXTRACTING INTERESTING PATTERNS THROUGH WEKA TOOL International Journal Of Advanced Technology In Engineering And Science Www.Ijates.Com Volume No 03, Special Issue No. 01, February 2015 ISSN (Online): 2348 7550 ASSOCIATION RULE MINING ON WEB LOGS FOR

More information

SURVEY ON: CLOUD DATA RETRIEVAL FOR MULTIKEYWORD BASED ON DATA MINING TECHNOLOGY

SURVEY ON: CLOUD DATA RETRIEVAL FOR MULTIKEYWORD BASED ON DATA MINING TECHNOLOGY SURVEY ON: CLOUD DATA RETRIEVAL FOR MULTIKEYWORD BASED ON DATA MINING TECHNOLOGY 1 Kavya G, 2 K.S. Rajesh 1 P.G Scholar, Dept. of Computer Science & Engineering RajaRajeswari College of Engineering, Bangalore,

More information

Mining for Web Engineering

Mining for Web Engineering Mining for Engineering A. Venkata Krishna Prasad 1, Prof. S.Ramakrishna 2 1 Associate Professor, Department of Computer Science, MIPGS, Hyderabad 2 Professor, Department of Computer Science, Sri Venkateswara

More information

Information Security in Big Data: Privacy and Data Mining (IEEE, 2014) Dilara USTAÖMER 2065787

Information Security in Big Data: Privacy and Data Mining (IEEE, 2014) Dilara USTAÖMER 2065787 Information Security in Big Data: Privacy and Data Mining (IEEE, 2014) Dilara USTAÖMER 2065787 2015/5/13 OUTLINE Introduction User Role Based Methodology Data Provider Data Collector Data Miner Decision

More information

International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014

International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014 RESEARCH ARTICLE OPEN ACCESS A Survey of Data Mining: Concepts with Applications and its Future Scope Dr. Zubair Khan 1, Ashish Kumar 2, Sunny Kumar 3 M.Tech Research Scholar 2. Department of Computer

More information

DATA MINING - 1DL360

DATA MINING - 1DL360 DATA MINING - 1DL360 Fall 2013" An introductory class in data mining http://www.it.uu.se/edu/course/homepage/infoutv/per1ht13 Kjell Orsborn Uppsala Database Laboratory Department of Information Technology,

More information

A Survey on Association Rule Mining in Market Basket Analysis

A Survey on Association Rule Mining in Market Basket Analysis International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 4 (2014), pp. 409-414 International Research Publications House http://www. irphouse.com /ijict.htm A Survey

More information

A Survey of Quantification of Privacy Preserving Data Mining Algorithms

A Survey of Quantification of Privacy Preserving Data Mining Algorithms A Survey of Quantification of Privacy Preserving Data Mining Algorithms Elisa Bertino, Dan Lin, and Wei Jiang Abstract The aim of privacy preserving data mining (PPDM) algorithms is to extract relevant

More information

EFFECTIVE DATA RECOVERY FOR CONSTRUCTIVE CLOUD PLATFORM

EFFECTIVE DATA RECOVERY FOR CONSTRUCTIVE CLOUD PLATFORM INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE EFFECTIVE DATA RECOVERY FOR CONSTRUCTIVE CLOUD PLATFORM Macha Arun 1, B.Ravi Kumar 2 1 M.Tech Student, Dept of CSE, Holy Mary

More information

To Enhance The Security In Data Mining Using Integration Of Cryptograhic And Data Mining Algorithms

To Enhance The Security In Data Mining Using Integration Of Cryptograhic And Data Mining Algorithms IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 04, Issue 06 (June. 2014), V2 PP 34-38 www.iosrjen.org To Enhance The Security In Data Mining Using Integration Of Cryptograhic

More information

How To Make A Secure Storage On A Mobile Device Secure

How To Make A Secure Storage On A Mobile Device Secure Outsourcing with secure accessibility in mobile cloud computing Monika Waghmare 1, Prof T.A.Chavan 2 Department of Information technology, Smt.Kashibai Navale College of Engineering, Pune, India. Abstract

More information

How To Create A Privacy Preserving And Dynamic Load Balancing System In A Distributed System

How To Create A Privacy Preserving And Dynamic Load Balancing System In A Distributed System Enforcing Secure and Privacy-Preserving Information Brokering with Dynamic Load Balancing in Distributed Information Sharing. 1 M.E. Computer Engineering Department GHRCEM, Wagholi, Pune. Jyotimore2283@gmail.com

More information

International Journal of World Research, Vol: I Issue XIII, December 2008, Print ISSN: 2347-937X DATA MINING TECHNIQUES AND STOCK MARKET

International Journal of World Research, Vol: I Issue XIII, December 2008, Print ISSN: 2347-937X DATA MINING TECHNIQUES AND STOCK MARKET DATA MINING TECHNIQUES AND STOCK MARKET Mr. Rahul Thakkar, Lecturer and HOD, Naran Lala College of Professional & Applied Sciences, Navsari ABSTRACT Without trading in a stock market we can t understand

More information

A survey on Data Mining based Intrusion Detection Systems

A survey on Data Mining based Intrusion Detection Systems International Journal of Computer Networks and Communications Security VOL. 2, NO. 12, DECEMBER 2014, 485 490 Available online at: www.ijcncs.org ISSN 2308-9830 A survey on Data Mining based Intrusion

More information

ADVANCE SECURITY TO CLOUD DATA STORAGE

ADVANCE SECURITY TO CLOUD DATA STORAGE Journal homepage: www.mjret.in ADVANCE SECURITY TO CLOUD DATA STORAGE ISSN:2348-6953 Yogesh Bhapkar, Mitali Patil, Kishor Kale,Rakesh Gaikwad ISB&M, SOT, Pune, India Abstract: Cloud Computing is the next

More information

Single Sign-On Secure Authentication Password Mechanism

Single Sign-On Secure Authentication Password Mechanism Single Sign-On Secure Authentication Password Mechanism Deepali M. Devkate, N.D.Kale ME Student, Department of CE, PVPIT, Bavdhan, SavitribaiPhule University Pune, Maharashtra,India. Assistant Professor,

More information

Clustering on Large Numeric Data Sets Using Hierarchical Approach Birch

Clustering on Large Numeric Data Sets Using Hierarchical Approach Birch Global Journal of Computer Science and Technology Software & Data Engineering Volume 12 Issue 12 Version 1.0 Year 2012 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global

More information

Hui(Wendy) Wang Stevens Institute of Technology New Jersey, USA. VLDB Cloud Intelligence workshop, 2012

Hui(Wendy) Wang Stevens Institute of Technology New Jersey, USA. VLDB Cloud Intelligence workshop, 2012 Integrity Verification of Cloud-hosted Data Analytics Computations (Position paper) Hui(Wendy) Wang Stevens Institute of Technology New Jersey, USA 9/4/ 1 Data-Analytics-as-a- Service (DAaS) Outsource:

More information

The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems

The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems Becky Cutler Rebecca.cutler@tufts.edu Mentor: Professor Chris Gregg Abstract Modern day authentication systems

More information

A Review of Data Mining Techniques

A Review of Data Mining Techniques Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,

More information

An Improved Algorithm for Fuzzy Data Mining for Intrusion Detection

An Improved Algorithm for Fuzzy Data Mining for Intrusion Detection An Improved Algorithm for Fuzzy Data Mining for Intrusion Detection German Florez, Susan M. Bridges, and Rayford B. Vaughn Abstract We have been using fuzzy data mining techniques to extract patterns that

More information

Index Terms Cloud Storage Services, data integrity, dependable distributed storage, data dynamics, Cloud Computing.

Index Terms Cloud Storage Services, data integrity, dependable distributed storage, data dynamics, Cloud Computing. Volume 3, Issue 5, May 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Privacy - Preserving

More information

Improving data integrity on cloud storage services

Improving data integrity on cloud storage services International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 2 ǁ February. 2013 ǁ PP.49-55 Improving data integrity on cloud storage services

More information

Privacy-preserving Data Mining: current research and trends

Privacy-preserving Data Mining: current research and trends Privacy-preserving Data Mining: current research and trends Stan Matwin School of Information Technology and Engineering University of Ottawa, Canada stan@site.uottawa.ca Few words about our research Universit[é

More information

An Efficiency Keyword Search Scheme to improve user experience for Encrypted Data in Cloud

An Efficiency Keyword Search Scheme to improve user experience for Encrypted Data in Cloud , pp.246-252 http://dx.doi.org/10.14257/astl.2014.49.45 An Efficiency Keyword Search Scheme to improve user experience for Encrypted Data in Cloud Jiangang Shu ab Xingming Sun ab Lu Zhou ab Jin Wang ab

More information

An Efficient Data Security in Cloud Computing Using the RSA Encryption Process Algorithm

An Efficient Data Security in Cloud Computing Using the RSA Encryption Process Algorithm An Efficient Data Security in Cloud Computing Using the RSA Encryption Process Algorithm V.Masthanamma 1,G.Lakshmi Preya 2 UG Scholar, Department of Information Technology, Saveetha School of Engineering

More information

Protein Protein Interaction Networks

Protein Protein Interaction Networks Functional Pattern Mining from Genome Scale Protein Protein Interaction Networks Young-Rae Cho, Ph.D. Assistant Professor Department of Computer Science Baylor University it My Definition of Bioinformatics

More information

Use of Data Mining Techniques to Improve the Effectiveness of Sales and Marketing

Use of Data Mining Techniques to Improve the Effectiveness of Sales and Marketing Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 4, April 2015,

More information

Big Data - Security and Privacy

Big Data - Security and Privacy Big Data - Security and Privacy Elisa Bertino CS Department, Cyber Center, and CERIAS Purdue University Cyber Center! Big Data EveryWhere! Lots of data is being collected, warehoused, and mined Web data,

More information

Enhanced Algorithm for Efficient Retrieval of Data from a Secure Cloud

Enhanced Algorithm for Efficient Retrieval of Data from a Secure Cloud OPEN JOURNAL OF MOBILE COMPUTING AND CLOUD COMPUTING Volume 1, Number 2, November 2014 OPEN JOURNAL OF MOBILE COMPUTING AND CLOUD COMPUTING Enhanced Algorithm for Efficient Retrieval of Data from a Secure

More information

How To Write A Privacy Preserving Firewall Optimization Protocol

How To Write A Privacy Preserving Firewall Optimization Protocol Asia-pacific Journal of Multimedia Services Convergence with Art, Humanities and Sociology Vol.1, No.2 (2011), pp. 93-100 http://dx.doi.org/10.14257/ajmscahs.2011.12.06 Secure Multi-Party Computation in

More information

Data Mining Approach in Security Information and Event Management

Data Mining Approach in Security Information and Event Management Data Mining Approach in Security Information and Event Management Anita Rajendra Zope, Amarsinh Vidhate, and Naresh Harale Abstract This paper gives an overview of data mining field & security information

More information

Association Technique on Prediction of Chronic Diseases Using Apriori Algorithm

Association Technique on Prediction of Chronic Diseases Using Apriori Algorithm Association Technique on Prediction of Chronic Diseases Using Apriori Algorithm R.Karthiyayini 1, J.Jayaprakash 2 Assistant Professor, Department of Computer Applications, Anna University (BIT Campus),

More information

Scalable Private Database Querying for Arbitrary Formulas

Scalable Private Database Querying for Arbitrary Formulas Scalable Private Database Querying for Arbitrary Formulas Vladimir Kolesnikov (Bell Labs) Seung Geol Choi, Angelos Keromytis, Fernando Krell, Tal Malkin, Vasilis Pappas and Binh Vo (Columbia) Wesley George

More information

Data Mining Individual Assignment report

Data Mining Individual Assignment report Björn Þór Jónsson bjrr@itu.dk Data Mining Individual Assignment report This report outlines the implementation and results gained from the Data Mining methods of preprocessing, supervised learning, frequent

More information

A Layered Signcryption Model for Secure Cloud System Communication

A Layered Signcryption Model for Secure Cloud System Communication Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 6, June 2015, pg.1086

More information

Efficient Integration of Data Mining Techniques in Database Management Systems

Efficient Integration of Data Mining Techniques in Database Management Systems Efficient Integration of Data Mining Techniques in Database Management Systems Fadila Bentayeb Jérôme Darmont Cédric Udréa ERIC, University of Lyon 2 5 avenue Pierre Mendès-France 69676 Bron Cedex France

More information

Cryptographic Data Security over Cloud

Cryptographic Data Security over Cloud Cryptographic Data Security over Cloud Er. Lalit Gehlod Asst.Professor, Dept.Of Computer Engineering, Institute Of Engineering & Technology, Devi Ahilya University, Indore, India. Govind Patidar Dept.

More information

Building A Smart Academic Advising System Using Association Rule Mining

Building A Smart Academic Advising System Using Association Rule Mining Building A Smart Academic Advising System Using Association Rule Mining Raed Shatnawi +962795285056 raedamin@just.edu.jo Qutaibah Althebyan +962796536277 qaalthebyan@just.edu.jo Baraq Ghalib & Mohammed

More information

Experimental Analysis of Privacy-Preserving Statistics Computation

Experimental Analysis of Privacy-Preserving Statistics Computation Experimental Analysis of Privacy-Preserving Statistics Computation Hiranmayee Subramaniam 1, Rebecca N. Wright 2, and Zhiqiang Yang 2 1 Stevens Institute of Technology graduate, hiran@polypaths.com. 2

More information

A Statistical Text Mining Method for Patent Analysis

A Statistical Text Mining Method for Patent Analysis A Statistical Text Mining Method for Patent Analysis Department of Statistics Cheongju University, shjun@cju.ac.kr Abstract Most text data from diverse document databases are unsuitable for analytical

More information

A Tokenization and Encryption based Multi-Layer Architecture to Detect and Prevent SQL Injection Attack

A Tokenization and Encryption based Multi-Layer Architecture to Detect and Prevent SQL Injection Attack A Tokenization and Encryption based Multi-Layer Architecture to Detect and Prevent SQL Injection Attack Mr. Vishal Andodariya PG Student C. U. Shah College Of Engg. And Tech., Wadhwan city, India vishal90.ce@gmail.com

More information

A Comprehensive Data Forwarding Technique under Cloud with Dynamic Notification

A Comprehensive Data Forwarding Technique under Cloud with Dynamic Notification Research Journal of Applied Sciences, Engineering and Technology 7(14): 2946-2953, 2014 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2014 Submitted: July 7, 2013 Accepted: August

More information

On the Performance Measurements for Privacy Preserving Data Mining

On the Performance Measurements for Privacy Preserving Data Mining On the Performance Measurements for Privacy Preserving Data Mining Nan Zhang, Wei Zhao, and Jianer Chen Department of Computer Science, Texas A&M University College Station, TX 77843, USA {nzhang, zhao,

More information

Bisecting K-Means for Clustering Web Log data

Bisecting K-Means for Clustering Web Log data Bisecting K-Means for Clustering Web Log data Ruchika R. Patil Department of Computer Technology YCCE Nagpur, India Amreen Khan Department of Computer Technology YCCE Nagpur, India ABSTRACT Web usage mining

More information

Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG

Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG 1 Security Analytics Crypto and Privacy Technologies Infrastructure Security 60+ members Framework and Taxonomy Chair - Sree Rajan, Fujitsu

More information

Data Mining and Knowledge Discovery in Databases (KDD) State of the Art. Prof. Dr. T. Nouri Computer Science Department FHNW Switzerland

Data Mining and Knowledge Discovery in Databases (KDD) State of the Art. Prof. Dr. T. Nouri Computer Science Department FHNW Switzerland Data Mining and Knowledge Discovery in Databases (KDD) State of the Art Prof. Dr. T. Nouri Computer Science Department FHNW Switzerland 1 Conference overview 1. Overview of KDD and data mining 2. Data

More information

Mining an Online Auctions Data Warehouse

Mining an Online Auctions Data Warehouse Proceedings of MASPLAS'02 The Mid-Atlantic Student Workshop on Programming Languages and Systems Pace University, April 19, 2002 Mining an Online Auctions Data Warehouse David Ulmer Under the guidance

More information

EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY

EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY Siliveru Ashok kumar* S.G. Nawaz ## and M.Harathi # * Student of M.Tech, Sri Krishna Devaraya Engineering College, Gooty # Department

More information

SEARCH ENGINE WITH PARALLEL PROCESSING AND INCREMENTAL K-MEANS FOR FAST SEARCH AND RETRIEVAL

SEARCH ENGINE WITH PARALLEL PROCESSING AND INCREMENTAL K-MEANS FOR FAST SEARCH AND RETRIEVAL SEARCH ENGINE WITH PARALLEL PROCESSING AND INCREMENTAL K-MEANS FOR FAST SEARCH AND RETRIEVAL Krishna Kiran Kattamuri 1 and Rupa Chiramdasu 2 Department of Computer Science Engineering, VVIT, Guntur, India

More information

International Journal of Innovative Research in Computer and Communication Engineering

International Journal of Innovative Research in Computer and Communication Engineering FP Tree Algorithm and Approaches in Big Data T.Rathika 1, J.Senthil Murugan 2 Assistant Professor, Department of CSE, SRM University, Ramapuram Campus, Chennai, Tamil Nadu,India 1 Assistant Professor,

More information

Web Usage Mining: Identification of Trends Followed by the user through Neural Network

Web Usage Mining: Identification of Trends Followed by the user through Neural Network International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 7 (2013), pp. 617-624 International Research Publications House http://www. irphouse.com /ijict.htm Web

More information

Near Sheltered and Loyal storage Space Navigating in Cloud

Near Sheltered and Loyal storage Space Navigating in Cloud IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 8 (August. 2013), V2 PP 01-05 Near Sheltered and Loyal storage Space Navigating in Cloud N.Venkata Krishna, M.Venkata

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 3, March 3 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Using Third Party

More information

International Journal of Engineering Research ISSN: 2348-4039 & Management Technology November-2015 Volume 2, Issue-6

International Journal of Engineering Research ISSN: 2348-4039 & Management Technology November-2015 Volume 2, Issue-6 International Journal of Engineering Research ISSN: 2348-4039 & Management Technology Email: editor@ijermt.org November-2015 Volume 2, Issue-6 www.ijermt.org Modeling Big Data Characteristics for Discovering

More information

Selection of Optimal Discount of Retail Assortments with Data Mining Approach

Selection of Optimal Discount of Retail Assortments with Data Mining Approach Available online at www.interscience.in Selection of Optimal Discount of Retail Assortments with Data Mining Approach Padmalatha Eddla, Ravinder Reddy, Mamatha Computer Science Department,CBIT, Gandipet,Hyderabad,A.P,India.

More information

A Review of Anomaly Detection Techniques in Network Intrusion Detection System

A Review of Anomaly Detection Techniques in Network Intrusion Detection System A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In

More information

PREDICTIVE MODELING OF INTER-TRANSACTION ASSOCIATION RULES A BUSINESS PERSPECTIVE

PREDICTIVE MODELING OF INTER-TRANSACTION ASSOCIATION RULES A BUSINESS PERSPECTIVE International Journal of Computer Science and Applications, Vol. 5, No. 4, pp 57-69, 2008 Technomathematics Research Foundation PREDICTIVE MODELING OF INTER-TRANSACTION ASSOCIATION RULES A BUSINESS PERSPECTIVE

More information

A Survey on Security Issues and Security Schemes for Cloud and Multi-Cloud Computing

A Survey on Security Issues and Security Schemes for Cloud and Multi-Cloud Computing International Journal of Emerging Engineering Research and Technology Volume 3, Issue 5, May 2015, PP 1-7 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) A Survey on Security Issues and Security Schemes

More information

MAXIMAL FREQUENT ITEMSET GENERATION USING SEGMENTATION APPROACH

MAXIMAL FREQUENT ITEMSET GENERATION USING SEGMENTATION APPROACH MAXIMAL FREQUENT ITEMSET GENERATION USING SEGMENTATION APPROACH M.Rajalakshmi 1, Dr.T.Purusothaman 2, Dr.R.Nedunchezhian 3 1 Assistant Professor (SG), Coimbatore Institute of Technology, India, rajalakshmi@cit.edu.in

More information

A REVIEW ON ENHANCING DATA SECURITY IN CLOUD COMPUTING USING RSA AND AES ALGORITHMS

A REVIEW ON ENHANCING DATA SECURITY IN CLOUD COMPUTING USING RSA AND AES ALGORITHMS A REVIEW ON ENHANCING DATA SECURITY IN CLOUD COMPUTING USING RSA AND AES ALGORITHMS Dr.S.Gunasekaran, M.P.Lavanya Professor, CSE, Coimbatore Institute of Engineering and Tech, Coimbatore PG Scholar, Coimbatore

More information

Social Media Mining. Data Mining Essentials

Social Media Mining. Data Mining Essentials Introduction Data production rate has been increased dramatically (Big Data) and we are able store much more data than before E.g., purchase data, social media data, mobile phone data Businesses and customers

More information

Clustering Data Streams

Clustering Data Streams Clustering Data Streams Mohamed Elasmar Prashant Thiruvengadachari Javier Salinas Martin gtg091e@mail.gatech.edu tprashant@gmail.com javisal1@gatech.edu Introduction: Data mining is the science of extracting

More information

Dual Mechanism to Detect DDOS Attack Priyanka Dembla, Chander Diwaker 2 1 Research Scholar, 2 Assistant Professor

Dual Mechanism to Detect DDOS Attack Priyanka Dembla, Chander Diwaker 2 1 Research Scholar, 2 Assistant Professor International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Journal of Engineering, Business and Enterprise

More information

MALLET-Privacy Preserving Influencer Mining in Social Media Networks via Hypergraph

MALLET-Privacy Preserving Influencer Mining in Social Media Networks via Hypergraph MALLET-Privacy Preserving Influencer Mining in Social Media Networks via Hypergraph Janani K 1, Narmatha S 2 Assistant Professor, Department of Computer Science and Engineering, Sri Shakthi Institute of

More information

AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION

AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION K.Anusha 1, K.Sudha 2 1 M.Tech Student, Dept of CSE, Aurora's Technological

More information

Binary Coded Web Access Pattern Tree in Education Domain

Binary Coded Web Access Pattern Tree in Education Domain Binary Coded Web Access Pattern Tree in Education Domain C. Gomathi P.G. Department of Computer Science Kongu Arts and Science College Erode-638-107, Tamil Nadu, India E-mail: kc.gomathi@gmail.com M. Moorthi

More information