Preventing Diversity Attacks in Privacy Preserving Data Mining Sailaja.R.J.L #1, P.Dayaker *2
|
|
- Arleen Linette Barber
- 7 years ago
- Views:
Transcription
1 International Journal of Computer Trends and Technology (IJCTT) volume 4 Issue 9 Sep 213 Preventing Diversity Attacks in Privacy Preserving Data Mining Sailaja.R.J.L #1, P.Dayaker *2 #1 M.Tech, Computer Science Engineering, MLRIT, Hyderabad, Andhra Pradesh, India # Assistant Professor, Department of CSE, MLRIT, Hyderabad, Andhra Pradesh, India Abstract -- Data mining exposes dataset to the researchers. However, it is possible to establish sensitive information from the given dataset. To overcome this problem Privacy Preserving Data Mining (PPDM) came into existence. PPDM ensures that the datasets are generated in such a way that they can not disclose identity of the entities present in the dataset. Before data is published, perturbation of data is made in order to preserve privacy in the data. Existing PPDM systems assumed single level trust on data miners. Recently Li et al. relaxed this by introducing Multilevel Trust in PPDM. They believe that if the data miner is more trusted less perturbation is required. However, malicious data miners can establish identity information by combining multiple perturbed copies. It prevents malicious attacks and it is a true PPDM. In this paper we implement that multilevel trust based PPDM which enables data owners to have freedom to choose the level of privacy needed. Based on this trust level perturbations are made. We built a prototype application that demonstrates the proof of concept. The empirical results revealed that the proposed approach is effective and offers flexibility to data owners. Index Terms -- Data mining, privacy preserving data mining, random perturbation, multilevel trust I. INTRODUCTION Data mining is a process of extracting trends in the historical data. In other words it provides business intelligence that helps in taking good decisions which will lead to profits. However, data owner is supposed to give his data to data miner for the purpose of extracting business intelligence or discovering actionable knowledge from the data. When data miner has malicious intentions, he can use the data for knowing sensitive information and take advantage of it for monetary gains. To avoid this problem before giving data to data miner, it is perturbed in such a way that sensitive information is encoded or altered in order to ensure that the privacy of data is preserved. This feature is known as Privacy Preserving Data Mining (PPDM). There were many researches on the PPDM [1], [2], [3], [4], [5]. All these existing PPDM schemes assume single level trust on data miner. It does mean that the data owner generates only one perturbed copy. However, in the real world different trust levels might be required. It is the motivation behind exploring multilevel trust. For instance a government organization might have internal and external miners. Moreover, it also wants to give data to public. In this case obviously it needs to generate multiple copies of data with different perturbation applied based on the trust level of the data miners and general public. There is a problem in this approach too. When adversaries are able to get internal and external miner copies, they can establish the identity information from the data. Therefore it is very challenging to implement multiple level trust based PPDM. When compared to single level trust scenario, many perturbed copies are required by the data owner to ensure non-disclosure of sensitive details. The number of perturbed copies depend on the trust level of the data miner. If the miner is trusted more, then it is likely that the number of perturbations of data to be published is less. However, from multiple diverse and perturbed copies the miner might produce original information accurately. This is the problem with the approach. Preventing such diversity attacks is a challenging task in multi-level trust based PPDM. Random Gaussian noise is added to overcome this problem. Recently Li et al. [6] proposed a multi-level trust based PPDM that solves the problem of diversity attacks. The key challenge in the construction of the scheme is to ensure that the adversaries can t establish original data from diversity of multiple perturbed copies. This problem is overcome by properly correlating perturbed copies with different trust levels. In this paper we implement the scheme proposed by Li et al. [6] and make a provision to end users to choose levels trust and number of perturbed copies required which do not allow diversity attacks. The reminder of the paper is structured as follows. Section II reviews related literature. Section III describes the proposed multilevel truest based PPDM. Section IV presents experimental results while section V concludes the paper. II. PRIOR WORKS ISSN: Page3349
2 International Journal of Computer Trends and Technology (IJCTT) volume 4 Issue 9 Sep 213 Privacy preserving data mining has been around for many years. First of all it was introduced in [7] and [8]. The problem of PPDM has attracted many researchers. The existing work on this concept is categorized into two types. The first one is SMC (Secure Multiparty Computation) which can provide highest level of privacy to data. It enables data miners to perform mining operations on data without disclosing sensitive information to data miners [7], [9]. This is achieved by implementing algorithms using genetic algorithms pertaining to SMC [1]. However, in practice, these algorithms are very expensive and not feasible. To overcome this drawback many solutions came into existence that are more efficient than SMC. The solutions are nothing but data mining techniques such as building decision trees [7], association rule mining [9], clustering through K-means algorithm [11] and other data mining algorithms like frequent pattern mining [12]. For privacy preserving data mining in collaborative fashion secure coprocessor was used for privacy preserving. The second category is the approach known as partial information hiding which ensures good privacy and also performance. Many solutions came into this category. For instance k-anonymity [13], [14], [15], [16], [17], retention replacement [18], [19], [2] and perturbation of data [4], [3], [2], [1], [21] are some of the examples. The data perturbation methods are of two classes. Thy are known as additive [5], [1], [3], [8] and other scheme is known as matrix multiplicative schemes [2], [22]. These methods are suitable for numeric data. To solve the problem of PPDM, in [23] a new adversary model is proposed. Some of the existing protocols have drawback of leaking information [24]. Private and threshold set is introduced in [25] and they are algorithms that are equity based. Reanonymization is the concept studied to solve the problem of PPDM. This Study is made in [26], [27], and [28]. IN this paper we study the anonymization of data many times for privacy preserving data mining with multiple levels of trust computations. Our multilevel trust based approach is effective as it relaxes the assumption of single level trust on data miners. III. MULTILEVEL TRUST BASED PPDM This section provides details about the PPDM scheme which will support multi-level trust to protect privacy of data which is given to data miners for discovering knowledge. The existing solutions use single level trust on data miners. It does mean that those systems use a single perturbed copy of data. In this paper we support multilevel trust based PPDM that helps data owners to make multiple perturbed copies of the data. For each data miner based on the trust level the data owner generates different perturbed copy. Privacy Goal The design goal of the multilevel trust based PPDM is that the data owner should be allowed to built distinct perturbed data for each data miner. The data owner distributes such copies to data miners. M is assumed to be the number of copies generated by data owner for ease of analysis. Based on the trust level of data miner, the privacy of perturbed copy can be computed as follows. This will help data owner to control the data easily. This is achieved by setting the privacy of perturbed copies. However, this has a drawback when adversaries launch attack by combining multiple perturbed copies and generate the original data. To overcome this problem Noise concept is introduced. With this data owner produces another copy of perturbed copy which will ensure more security. The adversaries can t have diversified attacks. To achieve this noise covariance matrix as part of corner-wave property is used. Batch Generation When the data owner knows the number of data miners, trust levels he generates corresponding number of perturbed copies with privacy goal in mind. This process is known as batch generation. Two algorithms are proposed for noise generation in parallel and sequentially. The parallel generation algorithm is as shown in fig. 1. ISSN: Page335
3 International Journal of Computer Trends and Technology (IJCTT) volume 4 Issue 9 Sep 213 Fig. 1 Parallel generation algorithm This algorithm generates noise components simultaneously. The algorithm 2 is presented in figure 2 which generates noise sequentially. Fig. 3 On demand noise generation algorithm This algorithm provides flexibility to data owner as it can generate perturbed copies of data on demand. This will achieve privacy goal specified and also based on multilevel trust based. More details about the technical details of multi-level trust based PPDM can be found in [29]. IV. EPERIMENTAL RESULTS Fig. 2 Sequential Generation of Noise This algorithm generates noise components sequentially. It is a memory efficient solution. The drawback of the parallel generation is that the data owner should have known all the possible trust levels required by all data miners priori. Therefore this is not flexible. For on demand requirement, another algorithm is proposed as presented in figure 3. In the first set of experiments, algorithm 3 is used as it gives flexibility to data owner. The experiments are made on multiple perturbed copies which is the best case attack scenario. We assume that all perturbed copies are accessible to data miners to have such scenario. The perturbed copies are releases one by one therefore their availability also is influenced by this. Experiments are made based on two sensitive columns such as Age and Income. The experimental results are compared with that of IN (independent noise scheme). Normalized Estimation Error IN K=1 OURS K=1 IN K=2 OURS K=2 IN K=3 OURS K=3 Number of Perturbed Copies IN WITH PERFECT KNOELEDGE OURS WITH PERFECT KNOWLEDGE OUR LEAST PERTUBRED ISSN: Page3351
4 International Journal of Computer Trends and Technology (IJCTT) volume 4 Issue 9 Sep 213 Fig.4 Comparisons of average normalized estimation error of the independent noise scheme (denoted as IN) and our scheme (denoted as Ours) on the data Age As shown in the above figure represents horizontal axis represents number of perturbed copies while vertical axis represents normalized estimation error. Normalized Estimation Error Fig. 5. Comparisons of average normalized estimation error of the independent noise scheme (denoted as IN) and our scheme (denoted as Ours) on the data Income As shown in the above figure represents horizontal axis represents number of perturbed copies while vertical axis represents normalized estimation error IN K=1 OURS K=2 IN K=2 OURS K=2 IN K=3 OURS K=3 IN WITH PERFECT KNOELEDGE Number of perturbed copies Our Independen t Noise Fig. 7. The cumulative histogram of the estimation error when M =5 As shown in the above figure 7 represents the Our Independe nt Noise Our Independent Noise Fig. 8. The corresponding histogram of the estimation error when M =1 As shown in the above figure 8 represents the Fig. 6. The corresponding histogram of the estimation error when M =5 As shown in the above figure 6 represents the ISSN: Page3352
5 International Journal of Computer Trends and Technology (IJCTT) volume 4 Issue 9 Sep 213 Cumulative Fig. 9. The cumulative histogram of the estimation error when M =1 As shown in the above figure 9 represents the Fig. 1. The corresponding histogram of the estimation error when M =2 As shown in the above figure 1 represents the V. CONCLUSION Indepen dent Noise Our Our Independe nt Noise In this paper we proposed a new approach for privacy preserving data mining. The existing perturbation based PPDM models assume single level trust on data miners. In this work we focus on multilevel trust based PPDM which provides more flexibility to data owner in choosing the level of privacy to data. A challenge in doing so is that malicious data miners can use multiple copies of perturbed data in order to establish the original data. This kind of attack is prevented by using noise correlation matrix acrossthe copies to deny the attackers not to have diversity option. We build a prototype application that demonstrates the proof of concept pertaining to multi-level trust based PPDM. The empirical results revealed that the proposed solution is robust and effective. REFERENCES [1] S. Papadimitriou, F. Li, G. Kollios, and P.S. Yu, Time Series Compressibility and Privacy, Proc. 33rd Int l Conf. Very Large Data Bases (VLDB 7), 27. [2] K. Liu, H. Kargupta, and J. Ryan, Random Projection-Based Multiplicative Data Perturbation for Privacy Preserving Distributed Data Mining, IEEE Trans. Knowledge and Data Eng., vol. 18, no. 1, pp , Jan. 26. [3] F. Li, J. Sun, S. Papadimitriou, G. Mihaila, and I. Stanoi, Hiding in the Crowd: Privacy Preservation on Evolving Streams Through Correlation Tracking, Proc. IEEE 23rd Int l Conf. Data Eng. (ICDE), 27. [4] Z. Huang, W. Du, and B. Chen, Deriving Private Information From Randomized Data, Proc. ACM SIGMOD Int l Conf. Management of Data (SIGMOD), 25. [5] D. Agrawal and C.C. Aggarwal, On the Design and Quantification of Privacy Preserving Data Mining Algorithms, Proc. 2 th ACM SIGMOD-SIGACT-SIGART Symp. Principles of Database Systems (PODS 1), pp , May 21. [6] Enabling Multilevel Trust in Privacy Preserving Data Mining, Yaping Li, Minghua Chen, Qiwei Li, and Wei Zhang. [7] Y. Lindell and B. Pinkas, Privacy Preserving Data Mining, Proc. Int l Cryptology Conf. (CRYPTO), 2. [8] R. Agrawal and R. Srikant, Privacy Preserving Data Mining, Proc. ACM SIGMOD Int l Conf. Management of Data (SIGMOD ), 2. [9] J. Vaidya and C.W. Clifton, Privacy Preserving Association Rule Mining in Vertically Partitioned Data, Proc. ACM SIGKDD Int l Conf. Knowledge Discovery and Data Mining, 22. [1] O. Goldreich, Secure Multi-Party Computation, Final (incomplete) draft, version 1.4, 22. [11] J. Vaidya and C. Clifton, Privacy-Preserving K-Means Clustering over Vertically Partitioned Data, Proc. ACM SIGKDD Int l Conf. Knowledge Discovery and Data Mining, 23. [12] A.W.-C. Fu, R.C.-W. Wong, and K. Wang, Privacy- Preserving Frequent Pattern Mining across Private Databases, Proc. IEEE Fifth Int l Conf. Data Mining, 25. [13] C.C. Aggarwal and P.S. Yu, A Condensation Approach to Privacy Preserving Data Mining, Proc. Int l Conf. Extending Database Technology (EDBT), 24. ISSN: Page3353
6 International Journal of Computer Trends and Technology (IJCTT) volume 4 Issue 9 Sep 213 [14] L. Sweeney, K-Anonymity: A Model for Protecting Privacy, Int l J. Uncertainty, Fuzziness and Knowledge-Based Systems (IJUFKS), vol. 1, pp , 22. [15] A. Machanavajjhala, J. Gehrke, D. Kifer, and M. Venkitasubramaniam, L-Diversity: Privacy Beyond K- Anonymity, Proc. Int l Conf. Data Eng., 26. [16] D. Kifer and J.E. Gehrke, Injecting Utility Into Anonymized Datasets, Proc. ACM SIGMOD Int l Conf. Management of Data, 26. [17] E. Bertino, B.C. Ooi, Y. Yang, and R.H. Deng, Privacy and Ownership Preserving of Outsourced Medical Data, Proc. 21 st Int l Conf. Data Eng. (ICDE), 25. [18] R. Agrawal, R. Srikant, and D. Thomas, Privacy Preserving OLAP, Proc. ACM SIGMOD Int l Conf. Management of Data, 25. [19] W. Du and Z. Zhan, Using Randomized Response Techniques for Privacy-Preserving Data Mining, Proc. ACM SIGKDD Int l Conf. Knowledge Discovery and Data Mining, 23. [2] A. Evfimievski, R. Srikant, R. Agrawal, and J. Gehrke, Privacy Preserving Mining of Association Rules, Proc. ACM SIGKDD Int l Conf. Knowledge Discovery and Data Mining, 22. [21] H. Kargupta, S. Datta, Q. Wang, and K. Sivakumar, On the Privacy Preserving Properties of Random Data Perturbation Techniques, Proc. IEEE Third Int l Conf. Data Mining, 23. [22] K. Chen and L. Liu, Privacy Preserving Data Classification with Rotation Perturbation, Proc. IEEE Fifth Int l Conf. Data Mining, 25. [23] R. Agrawal, A. Evfimievski, and R. Srikant, Information Sharing across Private Databases, Proc. ACM SIGMOD Int l Conf. Management of Data, 23. [24] R. Agrawal, D. Asonov, M. Kantarcioglu, and Y. Li, Sovereign Joins, Proc. 22nd Int l Conf. Data Eng. (ICDE 6), 26. [25] L. Kissner and D. Song, Privacy-Preserving Set Operations, Proc. Int l Cryptology Conf. (CRYPTO), 25. [26] J. Byun, Y. Sohn, E. Bertino, and N. Li, Secure Anonymization for Incremental Datasets, Proc. Third VLDB Workshop Secure Data Management, 26. [27]. iao and Y. Tao, M-Invariance: Towards Privacy Preserving Re-Publication of Dynamic Datasets, Proc. ACM SIGMOD Int l Conf. Management of Data, 27. [28] G. Wang, Z. Zhu, W. Du, and Z. Teng, Inference Analysis in Privacy-Preserving Data Re-Publishing, Proc. Int l Conf. Data Mining, 28. [29] D. Knuth, The Art of Computer Programming: Seminumerical Algorithms, vol. 2, ch. 3, Addison-Wesley, AUTHORS Sailaja Returi She is pursuing M.Tech (CSE)in MLRIT, Hyderabad, AP, INDIA. She has received B.Tech Degree in Computer Science and Engineering. Her main research interest includes Datamining and Neworking. P.Dayaker He is currently with the Department of Computer Science and Engineering, MLRIT, Andhra Pradesh, India. He is having 7 years of teaching experience. His main research interest includes Cloud Computing and Data Mining. ISSN: Page3354
International Journal of Scientific & Engineering Research, Volume 4, Issue 10, October-2013 ISSN 2229-5518 1582
1582 AN EFFICIENT CRYPTOGRAPHIC APPROACH FOR PRESERVING PRIVACY IN DATA MINING T.Sujitha 1, V.Saravanakumar 2, C.Saravanabhavan 3 1. M.E. Student, Sujiraj.me@gmail.com 2. Assistant Professor, visaranams@yahoo.co.in
More informationInternational Journal of Advanced Computer Technology (IJACT) ISSN:2319-7900 PRIVACY PRESERVING DATA MINING IN HEALTH CARE APPLICATIONS
PRIVACY PRESERVING DATA MINING IN HEALTH CARE APPLICATIONS First A. Dr. D. Aruna Kumari, Ph.d, ; Second B. Ch.Mounika, Student, Department Of ECM, K L University, chittiprolumounika@gmail.com; Third C.
More informationHorizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis
IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661, ISBN: 2278-8727 Volume 6, Issue 5 (Nov. - Dec. 2012), PP 36-41 Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis
More informationA generalized Framework of Privacy Preservation in Distributed Data mining for Unstructured Data Environment
www.ijcsi.org 434 A generalized Framework of Privacy Preservation in Distributed Data mining for Unstructured Data Environment V.THAVAVEL and S.SIVAKUMAR* Department of Computer Applications, Karunya University,
More informationPrivacy Preserving Outsourcing for Frequent Itemset Mining
Privacy Preserving Outsourcing for Frequent Itemset Mining M. Arunadevi 1, R. Anuradha 2 PG Scholar, Department of Software Engineering, Sri Ramakrishna Engineering College, Coimbatore, India 1 Assistant
More informationOn the Performance Measurements for Privacy Preserving Data Mining
On the Performance Measurements for Privacy Preserving Data Mining Nan Zhang, Wei Zhao, and Jianer Chen Department of Computer Science, Texas A&M University College Station, TX 77843, USA {nzhang, zhao,
More informationPrivacy Preserved Association Rule Mining For Attack Detection and Prevention
Privacy Preserved Association Rule Mining For Attack Detection and Prevention V.Ragunath 1, C.R.Dhivya 2 P.G Scholar, Department of Computer Science and Engineering, Nandha College of Technology, Erode,
More informationISSN 2278-3091. Index Terms Cloud computing, outsourcing data, cloud storage security, public auditability
Outsourcing and Discovering Storage Inconsistencies in Cloud Through TPA Sumathi Karanam 1, GL Varaprasad 2 Student, Department of CSE, QIS College of Engineering and Technology, Ongole, AndhraPradesh,India
More informationData Outsourcing based on Secure Association Rule Mining Processes
, pp. 41-48 http://dx.doi.org/10.14257/ijsia.2015.9.3.05 Data Outsourcing based on Secure Association Rule Mining Processes V. Sujatha 1, Debnath Bhattacharyya 2, P. Silpa Chaitanya 3 and Tai-hoon Kim
More informationPrivacy Preserving Mining of Transaction Databases Sunil R 1 Dr. N P Kavya 2
IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 04, 2014 ISSN (online): 2321-0613 Privacy Preserving Mining of Transaction Databases Sunil R 1 Dr. N P Kavya 2 1 M.Tech
More informationPerforming Data Mining in (SRMS) through Vertical Approach with Association Rules
Performing Data Mining in (SRMS) through Vertical Approach with Association Rules Mr. Ambarish S. Durani 1 and Miss. Rashmi B. Sune 2 MTech (III rd Sem), Vidharbha Institute of Technology, Nagpur, Nagpur
More informationExperimental Analysis of Privacy-Preserving Statistics Computation
Experimental Analysis of Privacy-Preserving Statistics Computation Hiranmayee Subramaniam 1, Rebecca N. Wright 2, and Zhiqiang Yang 2 1 Stevens Institute of Technology graduate, hiran@polypaths.com. 2
More informationInternational Journal of Engineering Research ISSN: 2348-4039 & Management Technology November-2015 Volume 2, Issue-6
International Journal of Engineering Research ISSN: 2348-4039 & Management Technology Email: editor@ijermt.org November-2015 Volume 2, Issue-6 www.ijermt.org Modeling Big Data Characteristics for Discovering
More informationCREATING MINIMIZED DATA SETS BY USING HORIZONTAL AGGREGATIONS IN SQL FOR DATA MINING ANALYSIS
CREATING MINIMIZED DATA SETS BY USING HORIZONTAL AGGREGATIONS IN SQL FOR DATA MINING ANALYSIS Subbarao Jasti #1, Dr.D.Vasumathi *2 1 Student & Department of CS & JNTU, AP, India 2 Professor & Department
More informationHomomorphic Encryption Schema for Privacy Preserving Mining of Association Rules
Homomorphic Encryption Schema for Privacy Preserving Mining of Association Rules M.Sangeetha 1, P. Anishprabu 2, S. Shanmathi 3 Department of Computer Science and Engineering SriGuru Institute of Technology
More informationAN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION K.Anusha 1, K.Sudha 2 1 M.Tech Student, Dept of CSE, Aurora's Technological
More informationData attribute security and privacy in distributed database system
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 2, Ver. V (Mar-Apr. 2014), PP 27-33 Data attribute security and privacy in distributed database system
More informationExploring Resource Provisioning Cost Models in Cloud Computing
Exploring Resource Provisioning Cost Models in Cloud Computing P.Aradhya #1, K.Shivaranjani *2 #1 M.Tech, CSE, SR Engineering College, Warangal, Andhra Pradesh, India # Assistant Professor, Department
More informationProposing a Novel Synergized K-Degree L-Diversity T- Closeness Model for Graph Based Data Anonymization
Proposing a Novel Synergized K-Degree L-Diversity T- Closeness Model for Graph Based Data Anonymization S.Charanyaa 1, K.Sangeetha 2 M.Tech. Student, Dept of Information Technology, S.N.S. College of Technology,
More informationPRIVACY PRESERVING DATA MINING BY USING IMPLICIT FUNCTION THEOREM
PRIVACY PRESERVING DATA MINING BY USING IMPLICIT FUNCTION THEOREM Pasupuleti Rajesh 1 and Gugulothu Narsimha 2 1 Department of Computer Science and Engineering, VVIT College, Guntur, India rajesh.pleti@gmail.com
More informationInformation Security in Big Data using Encryption and Decryption
International Research Journal of Computer Science (IRJCS) ISSN: 2393-9842 Information Security in Big Data using Encryption and Decryption SHASHANK -PG Student II year MCA S.K.Saravanan, Assistant Professor
More informationCurrent Developments of k-anonymous Data Releasing
Current Developments of k-anonymous Data Releasing Jiuyong Li 1 Hua Wang 1 Huidong Jin 2 Jianming Yong 3 Abstract Disclosure-control is a traditional statistical methodology for protecting privacy when
More informationPRIVACY PRESERVING ASSOCIATION RULE MINING
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 10, October 2014,
More informationPrivacy-Preserving Mining of Association Rules On Cloud by improving Rob Frugal Algorithm
Privacy-Preserving Mining of Association Rules On Cloud by improving Rob Frugal Algorithm Mr.Vishal R. Redekar Department of Computer Engineering Smt.Kashibai Navale College of Engineering Pune-411041,
More informationEnhancement of Security in Distributed Data Mining
Enhancement of Security in Distributed Data Mining Sharda Darekar 1, Prof.D.K.Chitre, 2 1,2 Department Of Computer Engineering, Terna Engineering College,Nerul,Navi Mumbai. 1 sharda.darekar@gmail.com,
More informationSecure Personal Information by Analyzing Online Social Networks
Secure Personal Information by Analyzing Online Social Networks T. Satyendra kumar 1, C.Vijaya Rani 2 Assistant Professor, Dept. of C.S.E, S.V. Engineering College for Women, Tirupati, Chittoor, Andhra
More informationData mining successfully extracts knowledge to
C O V E R F E A T U R E Privacy-Preserving Data Mining Systems Nan Zhang University of Texas at Arlington Wei Zhao Rensselaer Polytechnic Institute Although successful in many applications, data mining
More informationPreserving Privacy in Supply Chain Management: a Challenge for Next Generation Data Mining 1
Preserving Privacy in Supply Chain Management: a Challenge for Next Generation Data Mining 1 Madhu Ahluwalia, Zhiyuan Chen, Aryya Gangopadhyay 2, Zhiling Guo {madhu.is, zhchen, gangopad, zgou}@umbc.edu
More informationCLOUD BASED STORAGE SERVICES FOR SECURITY FOLLOWED BY THE DATA AUTHENTICATION
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE CLOUD BASED STORAGE SERVICES FOR SECURITY FOLLOWED BY THE DATA AUTHENTICATION Akheel Mohammed 1, Dr.Vasumathi 2, Mir Ahmed Ali
More informationHow To Secure Cloud Computing, Public Auditing, Security, And Access Control In A Cloud Storage System
REVIEW ARTICAL A Novel Privacy-Preserving Public Auditing and Secure Searchable Data Cloud Storage Dumala Harisha 1, V.Gouthami 2 1 Student, Computer Science & Engineering-Department, JNTU Hyderabad India
More informationA Study of Data Perturbation Techniques For Privacy Preserving Data Mining
A Study of Data Perturbation Techniques For Privacy Preserving Data Mining Aniket Patel 1, HirvaDivecha 2 Assistant Professor Department of Computer Engineering U V Patel College of Engineering Kherva-Mehsana,
More informationMALLET-Privacy Preserving Influencer Mining in Social Media Networks via Hypergraph
MALLET-Privacy Preserving Influencer Mining in Social Media Networks via Hypergraph Janani K 1, Narmatha S 2 Assistant Professor, Department of Computer Science and Engineering, Sri Shakthi Institute of
More informationSelective dependable storage services for providing security in cloud computing
Selective dependable storage services for providing security in cloud computing Gade Lakshmi Thirupatamma*1, M.Jayaram*2, R.Pitchaiah*3 M.Tech Scholar, Dept of CSE, UCET, Medikondur, Dist: Guntur, AP,
More informationIs Privacy Still an Issue for Data Mining? (Extended Abstract)
Is Privacy Still an Issue for Data Mining? (Extended Abstract) Chris Clifton Wei Jiang Mummoorthy Muruguesan M. Ercan Nergiz Department of Computer Science Purdue University 305 North University Street
More informationInternational Journal of Advanced Research in Computer Science and Software Engineering
Volume, Issue, March 201 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Efficient Approach
More informationAccessing Private Network via Firewall Based On Preset Threshold Value
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 3, Ver. V (May-Jun. 2014), PP 55-60 Accessing Private Network via Firewall Based On Preset Threshold
More informationPrivacy-Preserving Data Mining through Knowledge Model Sharing
Privacy-Preserving Data Mining through Knowledge Model Sharing Patrick Sharkey, Hongwei Tian, Weining Zhang, and Shouhuai Xu Department of Computer Science, University of Texas at San Antonio {psharkey,htian,wzhang,shxu}@cs.utsa.edu
More informationA Survey of Quantification of Privacy Preserving Data Mining Algorithms
A Survey of Quantification of Privacy Preserving Data Mining Algorithms Elisa Bertino, Dan Lin, and Wei Jiang Abstract The aim of privacy preserving data mining (PPDM) algorithms is to extract relevant
More informationHow to Build a Private Data Classifier
Building Decision Tree Classifier on Private Data Wenliang Du Zhijun Zhan Center for Systems Assurance Department of Electrical Engineering and Computer Science Syracuse University, Syracuse, NY 13244,
More informationEFFECTIVE DATA RECOVERY FOR CONSTRUCTIVE CLOUD PLATFORM
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE EFFECTIVE DATA RECOVERY FOR CONSTRUCTIVE CLOUD PLATFORM Macha Arun 1, B.Ravi Kumar 2 1 M.Tech Student, Dept of CSE, Holy Mary
More informationEfficient Query Optimizing System for Searching Using Data Mining Technique
Vol.1, Issue.2, pp-347-351 ISSN: 2249-6645 Efficient Query Optimizing System for Searching Using Data Mining Technique Velmurugan.N Vijayaraj.A Assistant Professor, Department of MCA, Associate Professor,
More informationCOST EFFECTIVE PRIVACY PRESERVED INTERMEDIATE DATASETS FOR CLOUD DATA SERVICES
COST EFFECTIVE PRIVACY PRESERVED INTERMEDIATE DATASETS FOR CLOUD DATA SERVICES Chaya.Y.K 1, Bharathi V Kalmath 2 1 PG Student, Department of CSE, S.V.C.E,Bengaluru 2 Asst.Professor, Department of CSE,
More informationA Novel Technique of Privacy Protection. Mining of Association Rules from Outsourced. Transaction Databases
A Novel Technique of Privacy Protection Mining of Association Rules from Outsource Transaction Databases 1 Dhananjay D. Wadkar, 2 Santosh N. Shelke 1 Computer Engineering, Sinhgad Academy of Engineering
More informationSurvey on Data Privacy in Big Data with K- Anonymity
Survey on Data Privacy in Big Data with K- Anonymity Salini. S, Sreetha. V. Kumar, Neevan.R M.Tech Student, Dept of CSE, Marian Engineering College, Trivandrum, Kerala, India Asst. Professor, Dept of CSE,
More informationA Way to Understand Various Patterns of Data Mining Techniques for Selected Domains
A Way to Understand Various Patterns of Data Mining Techniques for Selected Domains Dr. Kanak Saxena Professor & Head, Computer Application SATI, Vidisha, kanak.saxena@gmail.com D.S. Rajpoot Registrar,
More informationAN INTELLIGENT ANALYSIS OF CRIME DATA USING DATA MINING & AUTO CORRELATION MODELS
AN INTELLIGENT ANALYSIS OF CRIME DATA USING DATA MINING & AUTO CORRELATION MODELS Uttam Mande Y.Srinivas J.V.R.Murthy Dept of CSE Dept of IT Dept of CSE GITAM University GITAM University J.N.T.University
More informationPBKM: A Secure Knowledge Management Framework
PBKM: A Secure Knowledge Management Framework (extended abstract) Shouhuai Xu and Weining Zhang Department of Computer Science, University of Texas at San Antonio {shxu,wzhang}@cs.utsa.edu Abstract In
More informationAn Attacker s View of Distance Preserving Maps For Privacy Preserving Data Mining
An Attacker s View of Distance Preserving Maps For Privacy Preserving Data Mining Kun Liu, Chris Giannella, and Hillol Kargupta Department of Computer Science and Electrical Engineering, University of
More informationVolume 2, Issue 2, February 2014 International Journal of Advance Research in Computer Science and Management Studies
Volume 2, Issue 2, February 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at: www.ijarcsms.com ISSN: 2321-7782
More informationA Three-Dimensional Conceptual Framework for Database Privacy
A Three-Dimensional Conceptual Framework for Database Privacy Josep Domingo-Ferrer Rovira i Virgili University UNESCO Chair in Data Privacy Department of Computer Engineering and Mathematics Av. Països
More informationData Mining and Sensitive Inferences
Template-Based Privacy Preservation in Classification Problems Ke Wang Simon Fraser University BC, Canada V5A S6 wangk@cs.sfu.ca Benjamin C. M. Fung Simon Fraser University BC, Canada V5A S6 bfung@cs.sfu.ca
More informationA Secure Decentralized Access Control Scheme for Data stored in Clouds
A Secure Decentralized Access Control Scheme for Data stored in Clouds Priyanka Palekar 1, Abhijeet Bharate 2, Nisar Anjum 3 1 SKNSITS, University of Pune 2 SKNSITS, University of Pune 3 SKNSITS, University
More informationPrivacy-Preserving in Outsourced Transaction Databases from Association Rules Mining
Privacy-Preserving in Outsourced Transaction Databases from Association Rules Mining Ms. Deokate Pallavi B., Prof. M.M. Waghmare 2 Student of ME (Information Technology), DGOFFE, University of Pune, Pune
More informationA Model For Revelation Of Data Leakage In Data Distribution
A Model For Revelation Of Data Leakage In Data Distribution Saranya.R Assistant Professor, Department Of Computer Science and Engineering Lord Jegannath college of Engineering and Technology Nagercoil,
More informationBarriers to Adopting Privacy-preserving Data Mining
Barriers to Adopting Privacy-preserving Data Mining Richard Huebner Norwich University ABSTRACT The primary issue examined in this research is that privacy-preserving data mining (PPDM) research has produced
More informationA Survey on Outlier Detection Techniques for Credit Card Fraud Detection
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 2, Ver. VI (Mar-Apr. 2014), PP 44-48 A Survey on Outlier Detection Techniques for Credit Card Fraud
More informationHorizontal Aggregations In SQL To Generate Data Sets For Data Mining Analysis In An Optimized Manner
24 Horizontal Aggregations In SQL To Generate Data Sets For Data Mining Analysis In An Optimized Manner Rekha S. Nyaykhor M. Tech, Dept. Of CSE, Priyadarshini Bhagwati College of Engineering, Nagpur, India
More informationAn Efficiency Keyword Search Scheme to improve user experience for Encrypted Data in Cloud
, pp.246-252 http://dx.doi.org/10.14257/astl.2014.49.45 An Efficiency Keyword Search Scheme to improve user experience for Encrypted Data in Cloud Jiangang Shu ab Xingming Sun ab Lu Zhou ab Jin Wang ab
More informationData Deduplication Scheme for Cloud Storage
26 Data Deduplication Scheme for Cloud Storage 1 Iuon-Chang Lin and 2 Po-Ching Chien Abstract Nowadays, the utilization of storage capacity becomes an important issue in cloud storage. In this paper, we
More informationSecure and Faster NN Queries on Outsourced Metric Data Assets Renuka Bandi #1, Madhu Babu Ch *2
Secure and Faster NN Queries on Outsourced Metric Data Assets Renuka Bandi #1, Madhu Babu Ch *2 #1 M.Tech, CSE, BVRIT, Hyderabad, Andhra Pradesh, India # Professor, Department of CSE, BVRIT, Hyderabad,
More informationPrivacy-Preserving Outsourcing Support Vector Machines with Random Transformation
Privacy-Preserving Outsourcing Support Vector Machines with Random Transformation Keng-Pei Lin Ming-Syan Chen Department of Electrical Engineering, National Taiwan University, Taipei, Taiwan Research Center
More informationSEARCH ENGINE WITH PARALLEL PROCESSING AND INCREMENTAL K-MEANS FOR FAST SEARCH AND RETRIEVAL
SEARCH ENGINE WITH PARALLEL PROCESSING AND INCREMENTAL K-MEANS FOR FAST SEARCH AND RETRIEVAL Krishna Kiran Kattamuri 1 and Rupa Chiramdasu 2 Department of Computer Science Engineering, VVIT, Guntur, India
More informationA Secure Model for Medical Data Sharing
International Journal of Database Theory and Application 45 A Secure Model for Medical Data Sharing Wong Kok Seng 1,1,Myung Ho Kim 1, Rosli Besar 2, Fazly Salleh 2 1 Department of Computer, Soongsil University,
More informationDATA MINING - 1DL360
DATA MINING - 1DL360 Fall 2013" An introductory class in data mining http://www.it.uu.se/edu/course/homepage/infoutv/per1ht13 Kjell Orsborn Uppsala Database Laboratory Department of Information Technology,
More informationAN APPROACH TO ANTICIPATE MISSING ITEMS IN SHOPPING CARTS
AN APPROACH TO ANTICIPATE MISSING ITEMS IN SHOPPING CARTS Maddela Pradeep 1, V. Nagi Reddy 2 1 M.Tech Scholar(CSE), 2 Assistant Professor, Nalanda Institute Of Technology(NIT), Siddharth Nagar, Guntur,
More informationEnhancing Data Security in Cloud Storage Auditing With Key Abstraction
Enhancing Data Security in Cloud Storage Auditing With Key Abstraction 1 Priyadharshni.A, 2 Geo Jenefer.G 1 Master of engineering in computer science, Ponjesly College of Engineering 2 Assistant Professor,
More informationAn Efficient Multi-Keyword Ranked Secure Search On Crypto Drive With Privacy Retaining
An Efficient Multi-Keyword Ranked Secure Search On Crypto Drive With Privacy Retaining 1 B.Sahaya Emelda and 2 Mrs. P. Maria Jesi M.E.,Ph.D., 1 PG Student and 2 Associate Professor, Department of Computer
More informationAccuracy in Privacy-Preserving Data Mining Using the Paradigm of Cryptographic Elections
Accuracy in Privacy-Preserving Data Mining Using the Paradigm of Cryptographic Elections Emmanouil Magkos 1, Manolis Maragoudakis 2, Vassilis Chrissikopoulos 1, and Stefanos Gridzalis 2 1 Department of
More informationAn Efficient Secure Multi Owner Data Sharing for Dynamic Groups in Cloud Computing
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 6, June 2014, pg.730
More informationPolicy-based Pre-Processing in Hadoop
Policy-based Pre-Processing in Hadoop Yi Cheng, Christian Schaefer Ericsson Research Stockholm, Sweden yi.cheng@ericsson.com, christian.schaefer@ericsson.com Abstract While big data analytics provides
More informationMANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE MANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS Kanchupati Kondaiah 1, B.Sudhakar 2 1 M.Tech Student, Dept of CSE,
More informationPreserving Privacy and Frequent Sharing Patterns for Social Network Data Publishing
Preserving Privacy and Frequent Sharing Patterns for Social Network Data Publishing Benjamin C. M. Fung CIISE, Concordia University Montreal, QC, Canada fung@ciise.concordia.ca Yan an Jin Huazhong University
More informationOLAP Online Privacy Control
OLAP Online Privacy Control M. Ragul Vignesh and C. Senthil Kumar Abstract--- The major issue related to the protection of private information in online analytical processing system (OLAP), is the privacy
More informationMINING THE DATA FROM DISTRIBUTED DATABASE USING AN IMPROVED MINING ALGORITHM
MINING THE DATA FROM DISTRIBUTED DATABASE USING AN IMPROVED MINING ALGORITHM J. Arokia Renjit Asst. Professor/ CSE Department, Jeppiaar Engineering College, Chennai, TamilNadu,India 600119. Dr.K.L.Shunmuganathan
More informationRanked Keyword Search Using RSE over Outsourced Cloud Data
Ranked Keyword Search Using RSE over Outsourced Cloud Data Payal Akriti 1, Ms. Preetha Mary Ann 2, D.Sarvanan 3 1 Final Year MCA, Sathyabama University, Tamilnadu, India 2&3 Assistant Professor, Sathyabama
More informationM. Nathiya 2 B.Tech. (IT), M.E. (CSE), Assistant Professor, Shivani Engineering College, Trichy, Tamilnadu, India.
ISSN: 2321-7782 (Online) Volume 2, Issue 5, May 2014 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com Robust Data
More informationA Data Mining Perspective in Privacy Preserving Data Mining Systems
Research Article International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347-5161 2014 INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Kumaraswamy
More informationCRYPTANALYSIS OF A MORE EFFICIENT AND SECURE DYNAMIC ID-BASED REMOTE USER AUTHENTICATION SCHEME
CRYPTANALYSIS OF A MORE EFFICIENT AND SECURE DYNAMIC ID-BASED REMOTE USER AUTHENTICATION SCHEME Mohammed Aijaz Ahmed 1, D. Rajya Lakshmi 2 and Sayed Abdul Sattar 3 1 Department of Computer Science and
More informationMulti-table Association Rules Hiding
Multi-table Association Rules Hiding Shyue-Liang Wang 1 and Tzung-Pei Hong 2 1 Department of Information Management 2 Department of Computer Science and Information Engineering National University of Kaohsiung
More informationInternational Journal of Engineering Research-Online A Peer Reviewed International Journal Articles available online http://www.ijoer.
REVIEW ARTICLE ISSN: 2321-7758 UPS EFFICIENT SEARCH ENGINE BASED ON WEB-SNIPPET HIERARCHICAL CLUSTERING MS.MANISHA DESHMUKH, PROF. UMESH KULKARNI Department of Computer Engineering, ARMIET, Department
More informationIMPLEMENTATION OF RESPONSIBLE DATA STORAGE IN CONSISTENT CLOUD ENVIRONMENT
IJRRECS/November 2014/Volume-2/Issue-11/3699-3703 ISSN 2321-5461 INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE IMPLEMENTATION OF RESPONSIBLE DATA STORAGE IN CONSISTENT CLOUD
More informationDELEGATING LOG MANAGEMENT TO THE CLOUD USING SECURE LOGGING
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IJCSMC, Vol. 3, Issue.
More informationA NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA
A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA U.Pandi Priya 1, R.Padma Priya 2 1 Research Scholar, Department of Computer Science and Information Technology,
More informationPrivacy-Preserving Data Visualization using Parallel Coordinates
Privacy-Preserving Data Visualization using Parallel Coordinates Aritra Dasgupta and Robert Kosara UNC Charlotte, USA ABSTRACT The proliferation of data in the past decade has created demand for innovative
More informationSECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD
Volume 1, Issue 7, PP:, JAN JUL 2015. SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD B ANNAPURNA 1*, G RAVI 2*, 1. II-M.Tech Student, MRCET 2. Assoc. Prof, Dept.
More informationAN APPROACH TOWARDS FUNCTIONING OF PUBLIC AUDITABILITY FOR CLOUD ENRICHMENT
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN APPROACH TOWARDS FUNCTIONING OF PUBLIC AUDITABILITY FOR CLOUD ENRICHMENT Mohd Abdul Shoaib 1, Akheel Mohammed 2, Ayesha 3
More informationAdaptive Privacy-Preserving Visualization Using Parallel Coordinates
Adaptive Privacy-Preserving Visualization Using Parallel Coordinates Aritra Dasgupta and Robert Kosara Abstract Current information visualization techniques assume unrestricted access to data. However,
More informationEFFICIENT DISCOVERY OF INTEGRITY AUTOMATION IN HYBRID CLOUD COMPUTING
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE EFFICIENT DISCOVERY OF INTEGRITY AUTOMATION IN HYBRID CLOUD COMPUTING K.Saipriya 1, A.Ravi Kumar 2 1 M.Tech Student, Dept of
More informationACL Based Dynamic Network Reachability in Cross Domain
South Asian Journal of Engineering and Technology Vol.2, No.15 (2016) 68 72 ISSN No: 2454-9614 ACL Based Dynamic Network Reachability in Cross Domain P. Nandhini a, K. Sankar a* a) Department Of Computer
More informationKeywords-- Cloud computing, Encryption, Data integrity, Third Party Auditor (TPA), RC5 Algorithm, privacypreserving,
Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Third Party
More informationA RESEARCH STUDY ON DATA MINING TECHNIQUES AND ALGORTHMS
A RESEARCH STUDY ON DATA MINING TECHNIQUES AND ALGORTHMS Nitin Trivedi, Research Scholar, Manav Bharti University, Solan HP ABSTRACT The purpose of this study is not to delve deeply into the technical
More informationSecuring Health Care Information by Using Two-Tier Cipher Cloud Technology
Securing Health Care Information by Using Two-Tier Cipher Cloud Technology M.Divya 1 J.Gayathri 2 A.Gladwin 3 1 B.TECH Information Technology, Jeppiaar Engineering College, Chennai 2 B.TECH Information
More informationSecure Data Sharing in Cloud Computing using Hybrid cloud
International Journal of Electronics and Computer Science Engineering 144 Available Online at www.ijecse.org ISSN: 2277-1956 Secure Data Sharing in Cloud Computing using Hybrid cloud Er. Inderdeep Singh
More informationStatic Data Mining Algorithm with Progressive Approach for Mining Knowledge
Global Journal of Business Management and Information Technology. Volume 1, Number 2 (2011), pp. 85-93 Research India Publications http://www.ripublication.com Static Data Mining Algorithm with Progressive
More informationA SECURE DECISION SUPPORT ESTIMATION USING GAUSSIAN BAYES CLASSIFICATION IN HEALTH CARE SERVICES
A SECURE DECISION SUPPORT ESTIMATION USING GAUSSIAN BAYES CLASSIFICATION IN HEALTH CARE SERVICES K.M.Ruba Malini #1 and R.Lakshmi *2 # P.G.Scholar, Computer Science and Engineering, K. L. N College Of
More informationA Privacy-preserving Approach for Records Management in Cloud Computing. Eun Park and Benjamin Fung. School of Information Studies McGill University
A Privacy-preserving Approach for Records Management in Cloud Computing Eun Park and Benjamin Fung School of Information Studies McGill University Digital transformation Privacy Conflict? Health service
More informationEFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY
EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY Siliveru Ashok kumar* S.G. Nawaz ## and M.Harathi # * Student of M.Tech, Sri Krishna Devaraya Engineering College, Gooty # Department
More informationPRIVACY PRESERVING AUTHENTICATION WITH SHARED AUTHORITY IN CLOUD
PRIVACY PRESERVING AUTHENTICATION WITH SHARED AUTHORITY IN CLOUD Kopparthi Lakshmi Narayana 1, M.Purushotham Reddy 2, G.Rama Subba Reddy 3 1 M.tech Scholar (CSE), 2 Asst.professor, Dept. of CSE, Vignana
More informationPreventing Denial-of-request Inference Attacks in Location-sharing Services
Preventing Denial-of-request Inference Attacks in Location-sharing Services Kazuhiro Minami Institute of Statistical Mathematics, Tokyo, Japan Email: kminami@ism.ac.jp Abstract Location-sharing services
More informationA Dynamic Approach to Extract Texts and Captions from Videos
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,
More information