Preventing Diversity Attacks in Privacy Preserving Data Mining Sailaja.R.J.L #1, P.Dayaker *2

Size: px
Start display at page:

Download "Preventing Diversity Attacks in Privacy Preserving Data Mining Sailaja.R.J.L #1, P.Dayaker *2"

Transcription

1 International Journal of Computer Trends and Technology (IJCTT) volume 4 Issue 9 Sep 213 Preventing Diversity Attacks in Privacy Preserving Data Mining Sailaja.R.J.L #1, P.Dayaker *2 #1 M.Tech, Computer Science Engineering, MLRIT, Hyderabad, Andhra Pradesh, India # Assistant Professor, Department of CSE, MLRIT, Hyderabad, Andhra Pradesh, India Abstract -- Data mining exposes dataset to the researchers. However, it is possible to establish sensitive information from the given dataset. To overcome this problem Privacy Preserving Data Mining (PPDM) came into existence. PPDM ensures that the datasets are generated in such a way that they can not disclose identity of the entities present in the dataset. Before data is published, perturbation of data is made in order to preserve privacy in the data. Existing PPDM systems assumed single level trust on data miners. Recently Li et al. relaxed this by introducing Multilevel Trust in PPDM. They believe that if the data miner is more trusted less perturbation is required. However, malicious data miners can establish identity information by combining multiple perturbed copies. It prevents malicious attacks and it is a true PPDM. In this paper we implement that multilevel trust based PPDM which enables data owners to have freedom to choose the level of privacy needed. Based on this trust level perturbations are made. We built a prototype application that demonstrates the proof of concept. The empirical results revealed that the proposed approach is effective and offers flexibility to data owners. Index Terms -- Data mining, privacy preserving data mining, random perturbation, multilevel trust I. INTRODUCTION Data mining is a process of extracting trends in the historical data. In other words it provides business intelligence that helps in taking good decisions which will lead to profits. However, data owner is supposed to give his data to data miner for the purpose of extracting business intelligence or discovering actionable knowledge from the data. When data miner has malicious intentions, he can use the data for knowing sensitive information and take advantage of it for monetary gains. To avoid this problem before giving data to data miner, it is perturbed in such a way that sensitive information is encoded or altered in order to ensure that the privacy of data is preserved. This feature is known as Privacy Preserving Data Mining (PPDM). There were many researches on the PPDM [1], [2], [3], [4], [5]. All these existing PPDM schemes assume single level trust on data miner. It does mean that the data owner generates only one perturbed copy. However, in the real world different trust levels might be required. It is the motivation behind exploring multilevel trust. For instance a government organization might have internal and external miners. Moreover, it also wants to give data to public. In this case obviously it needs to generate multiple copies of data with different perturbation applied based on the trust level of the data miners and general public. There is a problem in this approach too. When adversaries are able to get internal and external miner copies, they can establish the identity information from the data. Therefore it is very challenging to implement multiple level trust based PPDM. When compared to single level trust scenario, many perturbed copies are required by the data owner to ensure non-disclosure of sensitive details. The number of perturbed copies depend on the trust level of the data miner. If the miner is trusted more, then it is likely that the number of perturbations of data to be published is less. However, from multiple diverse and perturbed copies the miner might produce original information accurately. This is the problem with the approach. Preventing such diversity attacks is a challenging task in multi-level trust based PPDM. Random Gaussian noise is added to overcome this problem. Recently Li et al. [6] proposed a multi-level trust based PPDM that solves the problem of diversity attacks. The key challenge in the construction of the scheme is to ensure that the adversaries can t establish original data from diversity of multiple perturbed copies. This problem is overcome by properly correlating perturbed copies with different trust levels. In this paper we implement the scheme proposed by Li et al. [6] and make a provision to end users to choose levels trust and number of perturbed copies required which do not allow diversity attacks. The reminder of the paper is structured as follows. Section II reviews related literature. Section III describes the proposed multilevel truest based PPDM. Section IV presents experimental results while section V concludes the paper. II. PRIOR WORKS ISSN: Page3349

2 International Journal of Computer Trends and Technology (IJCTT) volume 4 Issue 9 Sep 213 Privacy preserving data mining has been around for many years. First of all it was introduced in [7] and [8]. The problem of PPDM has attracted many researchers. The existing work on this concept is categorized into two types. The first one is SMC (Secure Multiparty Computation) which can provide highest level of privacy to data. It enables data miners to perform mining operations on data without disclosing sensitive information to data miners [7], [9]. This is achieved by implementing algorithms using genetic algorithms pertaining to SMC [1]. However, in practice, these algorithms are very expensive and not feasible. To overcome this drawback many solutions came into existence that are more efficient than SMC. The solutions are nothing but data mining techniques such as building decision trees [7], association rule mining [9], clustering through K-means algorithm [11] and other data mining algorithms like frequent pattern mining [12]. For privacy preserving data mining in collaborative fashion secure coprocessor was used for privacy preserving. The second category is the approach known as partial information hiding which ensures good privacy and also performance. Many solutions came into this category. For instance k-anonymity [13], [14], [15], [16], [17], retention replacement [18], [19], [2] and perturbation of data [4], [3], [2], [1], [21] are some of the examples. The data perturbation methods are of two classes. Thy are known as additive [5], [1], [3], [8] and other scheme is known as matrix multiplicative schemes [2], [22]. These methods are suitable for numeric data. To solve the problem of PPDM, in [23] a new adversary model is proposed. Some of the existing protocols have drawback of leaking information [24]. Private and threshold set is introduced in [25] and they are algorithms that are equity based. Reanonymization is the concept studied to solve the problem of PPDM. This Study is made in [26], [27], and [28]. IN this paper we study the anonymization of data many times for privacy preserving data mining with multiple levels of trust computations. Our multilevel trust based approach is effective as it relaxes the assumption of single level trust on data miners. III. MULTILEVEL TRUST BASED PPDM This section provides details about the PPDM scheme which will support multi-level trust to protect privacy of data which is given to data miners for discovering knowledge. The existing solutions use single level trust on data miners. It does mean that those systems use a single perturbed copy of data. In this paper we support multilevel trust based PPDM that helps data owners to make multiple perturbed copies of the data. For each data miner based on the trust level the data owner generates different perturbed copy. Privacy Goal The design goal of the multilevel trust based PPDM is that the data owner should be allowed to built distinct perturbed data for each data miner. The data owner distributes such copies to data miners. M is assumed to be the number of copies generated by data owner for ease of analysis. Based on the trust level of data miner, the privacy of perturbed copy can be computed as follows. This will help data owner to control the data easily. This is achieved by setting the privacy of perturbed copies. However, this has a drawback when adversaries launch attack by combining multiple perturbed copies and generate the original data. To overcome this problem Noise concept is introduced. With this data owner produces another copy of perturbed copy which will ensure more security. The adversaries can t have diversified attacks. To achieve this noise covariance matrix as part of corner-wave property is used. Batch Generation When the data owner knows the number of data miners, trust levels he generates corresponding number of perturbed copies with privacy goal in mind. This process is known as batch generation. Two algorithms are proposed for noise generation in parallel and sequentially. The parallel generation algorithm is as shown in fig. 1. ISSN: Page335

3 International Journal of Computer Trends and Technology (IJCTT) volume 4 Issue 9 Sep 213 Fig. 1 Parallel generation algorithm This algorithm generates noise components simultaneously. The algorithm 2 is presented in figure 2 which generates noise sequentially. Fig. 3 On demand noise generation algorithm This algorithm provides flexibility to data owner as it can generate perturbed copies of data on demand. This will achieve privacy goal specified and also based on multilevel trust based. More details about the technical details of multi-level trust based PPDM can be found in [29]. IV. EPERIMENTAL RESULTS Fig. 2 Sequential Generation of Noise This algorithm generates noise components sequentially. It is a memory efficient solution. The drawback of the parallel generation is that the data owner should have known all the possible trust levels required by all data miners priori. Therefore this is not flexible. For on demand requirement, another algorithm is proposed as presented in figure 3. In the first set of experiments, algorithm 3 is used as it gives flexibility to data owner. The experiments are made on multiple perturbed copies which is the best case attack scenario. We assume that all perturbed copies are accessible to data miners to have such scenario. The perturbed copies are releases one by one therefore their availability also is influenced by this. Experiments are made based on two sensitive columns such as Age and Income. The experimental results are compared with that of IN (independent noise scheme). Normalized Estimation Error IN K=1 OURS K=1 IN K=2 OURS K=2 IN K=3 OURS K=3 Number of Perturbed Copies IN WITH PERFECT KNOELEDGE OURS WITH PERFECT KNOWLEDGE OUR LEAST PERTUBRED ISSN: Page3351

4 International Journal of Computer Trends and Technology (IJCTT) volume 4 Issue 9 Sep 213 Fig.4 Comparisons of average normalized estimation error of the independent noise scheme (denoted as IN) and our scheme (denoted as Ours) on the data Age As shown in the above figure represents horizontal axis represents number of perturbed copies while vertical axis represents normalized estimation error. Normalized Estimation Error Fig. 5. Comparisons of average normalized estimation error of the independent noise scheme (denoted as IN) and our scheme (denoted as Ours) on the data Income As shown in the above figure represents horizontal axis represents number of perturbed copies while vertical axis represents normalized estimation error IN K=1 OURS K=2 IN K=2 OURS K=2 IN K=3 OURS K=3 IN WITH PERFECT KNOELEDGE Number of perturbed copies Our Independen t Noise Fig. 7. The cumulative histogram of the estimation error when M =5 As shown in the above figure 7 represents the Our Independe nt Noise Our Independent Noise Fig. 8. The corresponding histogram of the estimation error when M =1 As shown in the above figure 8 represents the Fig. 6. The corresponding histogram of the estimation error when M =5 As shown in the above figure 6 represents the ISSN: Page3352

5 International Journal of Computer Trends and Technology (IJCTT) volume 4 Issue 9 Sep 213 Cumulative Fig. 9. The cumulative histogram of the estimation error when M =1 As shown in the above figure 9 represents the Fig. 1. The corresponding histogram of the estimation error when M =2 As shown in the above figure 1 represents the V. CONCLUSION Indepen dent Noise Our Our Independe nt Noise In this paper we proposed a new approach for privacy preserving data mining. The existing perturbation based PPDM models assume single level trust on data miners. In this work we focus on multilevel trust based PPDM which provides more flexibility to data owner in choosing the level of privacy to data. A challenge in doing so is that malicious data miners can use multiple copies of perturbed data in order to establish the original data. This kind of attack is prevented by using noise correlation matrix acrossthe copies to deny the attackers not to have diversity option. We build a prototype application that demonstrates the proof of concept pertaining to multi-level trust based PPDM. The empirical results revealed that the proposed solution is robust and effective. REFERENCES [1] S. Papadimitriou, F. Li, G. Kollios, and P.S. Yu, Time Series Compressibility and Privacy, Proc. 33rd Int l Conf. Very Large Data Bases (VLDB 7), 27. [2] K. Liu, H. Kargupta, and J. Ryan, Random Projection-Based Multiplicative Data Perturbation for Privacy Preserving Distributed Data Mining, IEEE Trans. Knowledge and Data Eng., vol. 18, no. 1, pp , Jan. 26. [3] F. Li, J. Sun, S. Papadimitriou, G. Mihaila, and I. Stanoi, Hiding in the Crowd: Privacy Preservation on Evolving Streams Through Correlation Tracking, Proc. IEEE 23rd Int l Conf. Data Eng. (ICDE), 27. [4] Z. Huang, W. Du, and B. Chen, Deriving Private Information From Randomized Data, Proc. ACM SIGMOD Int l Conf. Management of Data (SIGMOD), 25. [5] D. Agrawal and C.C. Aggarwal, On the Design and Quantification of Privacy Preserving Data Mining Algorithms, Proc. 2 th ACM SIGMOD-SIGACT-SIGART Symp. Principles of Database Systems (PODS 1), pp , May 21. [6] Enabling Multilevel Trust in Privacy Preserving Data Mining, Yaping Li, Minghua Chen, Qiwei Li, and Wei Zhang. [7] Y. Lindell and B. Pinkas, Privacy Preserving Data Mining, Proc. Int l Cryptology Conf. (CRYPTO), 2. [8] R. Agrawal and R. Srikant, Privacy Preserving Data Mining, Proc. ACM SIGMOD Int l Conf. Management of Data (SIGMOD ), 2. [9] J. Vaidya and C.W. Clifton, Privacy Preserving Association Rule Mining in Vertically Partitioned Data, Proc. ACM SIGKDD Int l Conf. Knowledge Discovery and Data Mining, 22. [1] O. Goldreich, Secure Multi-Party Computation, Final (incomplete) draft, version 1.4, 22. [11] J. Vaidya and C. Clifton, Privacy-Preserving K-Means Clustering over Vertically Partitioned Data, Proc. ACM SIGKDD Int l Conf. Knowledge Discovery and Data Mining, 23. [12] A.W.-C. Fu, R.C.-W. Wong, and K. Wang, Privacy- Preserving Frequent Pattern Mining across Private Databases, Proc. IEEE Fifth Int l Conf. Data Mining, 25. [13] C.C. Aggarwal and P.S. Yu, A Condensation Approach to Privacy Preserving Data Mining, Proc. Int l Conf. Extending Database Technology (EDBT), 24. ISSN: Page3353

6 International Journal of Computer Trends and Technology (IJCTT) volume 4 Issue 9 Sep 213 [14] L. Sweeney, K-Anonymity: A Model for Protecting Privacy, Int l J. Uncertainty, Fuzziness and Knowledge-Based Systems (IJUFKS), vol. 1, pp , 22. [15] A. Machanavajjhala, J. Gehrke, D. Kifer, and M. Venkitasubramaniam, L-Diversity: Privacy Beyond K- Anonymity, Proc. Int l Conf. Data Eng., 26. [16] D. Kifer and J.E. Gehrke, Injecting Utility Into Anonymized Datasets, Proc. ACM SIGMOD Int l Conf. Management of Data, 26. [17] E. Bertino, B.C. Ooi, Y. Yang, and R.H. Deng, Privacy and Ownership Preserving of Outsourced Medical Data, Proc. 21 st Int l Conf. Data Eng. (ICDE), 25. [18] R. Agrawal, R. Srikant, and D. Thomas, Privacy Preserving OLAP, Proc. ACM SIGMOD Int l Conf. Management of Data, 25. [19] W. Du and Z. Zhan, Using Randomized Response Techniques for Privacy-Preserving Data Mining, Proc. ACM SIGKDD Int l Conf. Knowledge Discovery and Data Mining, 23. [2] A. Evfimievski, R. Srikant, R. Agrawal, and J. Gehrke, Privacy Preserving Mining of Association Rules, Proc. ACM SIGKDD Int l Conf. Knowledge Discovery and Data Mining, 22. [21] H. Kargupta, S. Datta, Q. Wang, and K. Sivakumar, On the Privacy Preserving Properties of Random Data Perturbation Techniques, Proc. IEEE Third Int l Conf. Data Mining, 23. [22] K. Chen and L. Liu, Privacy Preserving Data Classification with Rotation Perturbation, Proc. IEEE Fifth Int l Conf. Data Mining, 25. [23] R. Agrawal, A. Evfimievski, and R. Srikant, Information Sharing across Private Databases, Proc. ACM SIGMOD Int l Conf. Management of Data, 23. [24] R. Agrawal, D. Asonov, M. Kantarcioglu, and Y. Li, Sovereign Joins, Proc. 22nd Int l Conf. Data Eng. (ICDE 6), 26. [25] L. Kissner and D. Song, Privacy-Preserving Set Operations, Proc. Int l Cryptology Conf. (CRYPTO), 25. [26] J. Byun, Y. Sohn, E. Bertino, and N. Li, Secure Anonymization for Incremental Datasets, Proc. Third VLDB Workshop Secure Data Management, 26. [27]. iao and Y. Tao, M-Invariance: Towards Privacy Preserving Re-Publication of Dynamic Datasets, Proc. ACM SIGMOD Int l Conf. Management of Data, 27. [28] G. Wang, Z. Zhu, W. Du, and Z. Teng, Inference Analysis in Privacy-Preserving Data Re-Publishing, Proc. Int l Conf. Data Mining, 28. [29] D. Knuth, The Art of Computer Programming: Seminumerical Algorithms, vol. 2, ch. 3, Addison-Wesley, AUTHORS Sailaja Returi She is pursuing M.Tech (CSE)in MLRIT, Hyderabad, AP, INDIA. She has received B.Tech Degree in Computer Science and Engineering. Her main research interest includes Datamining and Neworking. P.Dayaker He is currently with the Department of Computer Science and Engineering, MLRIT, Andhra Pradesh, India. He is having 7 years of teaching experience. His main research interest includes Cloud Computing and Data Mining. ISSN: Page3354

International Journal of Scientific & Engineering Research, Volume 4, Issue 10, October-2013 ISSN 2229-5518 1582

International Journal of Scientific & Engineering Research, Volume 4, Issue 10, October-2013 ISSN 2229-5518 1582 1582 AN EFFICIENT CRYPTOGRAPHIC APPROACH FOR PRESERVING PRIVACY IN DATA MINING T.Sujitha 1, V.Saravanakumar 2, C.Saravanabhavan 3 1. M.E. Student, Sujiraj.me@gmail.com 2. Assistant Professor, visaranams@yahoo.co.in

More information

International Journal of Advanced Computer Technology (IJACT) ISSN:2319-7900 PRIVACY PRESERVING DATA MINING IN HEALTH CARE APPLICATIONS

International Journal of Advanced Computer Technology (IJACT) ISSN:2319-7900 PRIVACY PRESERVING DATA MINING IN HEALTH CARE APPLICATIONS PRIVACY PRESERVING DATA MINING IN HEALTH CARE APPLICATIONS First A. Dr. D. Aruna Kumari, Ph.d, ; Second B. Ch.Mounika, Student, Department Of ECM, K L University, chittiprolumounika@gmail.com; Third C.

More information

Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis

Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661, ISBN: 2278-8727 Volume 6, Issue 5 (Nov. - Dec. 2012), PP 36-41 Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis

More information

A generalized Framework of Privacy Preservation in Distributed Data mining for Unstructured Data Environment

A generalized Framework of Privacy Preservation in Distributed Data mining for Unstructured Data Environment www.ijcsi.org 434 A generalized Framework of Privacy Preservation in Distributed Data mining for Unstructured Data Environment V.THAVAVEL and S.SIVAKUMAR* Department of Computer Applications, Karunya University,

More information

Privacy Preserving Outsourcing for Frequent Itemset Mining

Privacy Preserving Outsourcing for Frequent Itemset Mining Privacy Preserving Outsourcing for Frequent Itemset Mining M. Arunadevi 1, R. Anuradha 2 PG Scholar, Department of Software Engineering, Sri Ramakrishna Engineering College, Coimbatore, India 1 Assistant

More information

On the Performance Measurements for Privacy Preserving Data Mining

On the Performance Measurements for Privacy Preserving Data Mining On the Performance Measurements for Privacy Preserving Data Mining Nan Zhang, Wei Zhao, and Jianer Chen Department of Computer Science, Texas A&M University College Station, TX 77843, USA {nzhang, zhao,

More information

Privacy Preserved Association Rule Mining For Attack Detection and Prevention

Privacy Preserved Association Rule Mining For Attack Detection and Prevention Privacy Preserved Association Rule Mining For Attack Detection and Prevention V.Ragunath 1, C.R.Dhivya 2 P.G Scholar, Department of Computer Science and Engineering, Nandha College of Technology, Erode,

More information

ISSN 2278-3091. Index Terms Cloud computing, outsourcing data, cloud storage security, public auditability

ISSN 2278-3091. Index Terms Cloud computing, outsourcing data, cloud storage security, public auditability Outsourcing and Discovering Storage Inconsistencies in Cloud Through TPA Sumathi Karanam 1, GL Varaprasad 2 Student, Department of CSE, QIS College of Engineering and Technology, Ongole, AndhraPradesh,India

More information

Data Outsourcing based on Secure Association Rule Mining Processes

Data Outsourcing based on Secure Association Rule Mining Processes , pp. 41-48 http://dx.doi.org/10.14257/ijsia.2015.9.3.05 Data Outsourcing based on Secure Association Rule Mining Processes V. Sujatha 1, Debnath Bhattacharyya 2, P. Silpa Chaitanya 3 and Tai-hoon Kim

More information

Privacy Preserving Mining of Transaction Databases Sunil R 1 Dr. N P Kavya 2

Privacy Preserving Mining of Transaction Databases Sunil R 1 Dr. N P Kavya 2 IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 04, 2014 ISSN (online): 2321-0613 Privacy Preserving Mining of Transaction Databases Sunil R 1 Dr. N P Kavya 2 1 M.Tech

More information

Performing Data Mining in (SRMS) through Vertical Approach with Association Rules

Performing Data Mining in (SRMS) through Vertical Approach with Association Rules Performing Data Mining in (SRMS) through Vertical Approach with Association Rules Mr. Ambarish S. Durani 1 and Miss. Rashmi B. Sune 2 MTech (III rd Sem), Vidharbha Institute of Technology, Nagpur, Nagpur

More information

Experimental Analysis of Privacy-Preserving Statistics Computation

Experimental Analysis of Privacy-Preserving Statistics Computation Experimental Analysis of Privacy-Preserving Statistics Computation Hiranmayee Subramaniam 1, Rebecca N. Wright 2, and Zhiqiang Yang 2 1 Stevens Institute of Technology graduate, hiran@polypaths.com. 2

More information

International Journal of Engineering Research ISSN: 2348-4039 & Management Technology November-2015 Volume 2, Issue-6

International Journal of Engineering Research ISSN: 2348-4039 & Management Technology November-2015 Volume 2, Issue-6 International Journal of Engineering Research ISSN: 2348-4039 & Management Technology Email: editor@ijermt.org November-2015 Volume 2, Issue-6 www.ijermt.org Modeling Big Data Characteristics for Discovering

More information

CREATING MINIMIZED DATA SETS BY USING HORIZONTAL AGGREGATIONS IN SQL FOR DATA MINING ANALYSIS

CREATING MINIMIZED DATA SETS BY USING HORIZONTAL AGGREGATIONS IN SQL FOR DATA MINING ANALYSIS CREATING MINIMIZED DATA SETS BY USING HORIZONTAL AGGREGATIONS IN SQL FOR DATA MINING ANALYSIS Subbarao Jasti #1, Dr.D.Vasumathi *2 1 Student & Department of CS & JNTU, AP, India 2 Professor & Department

More information

Homomorphic Encryption Schema for Privacy Preserving Mining of Association Rules

Homomorphic Encryption Schema for Privacy Preserving Mining of Association Rules Homomorphic Encryption Schema for Privacy Preserving Mining of Association Rules M.Sangeetha 1, P. Anishprabu 2, S. Shanmathi 3 Department of Computer Science and Engineering SriGuru Institute of Technology

More information

AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION

AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION K.Anusha 1, K.Sudha 2 1 M.Tech Student, Dept of CSE, Aurora's Technological

More information

Data attribute security and privacy in distributed database system

Data attribute security and privacy in distributed database system IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 2, Ver. V (Mar-Apr. 2014), PP 27-33 Data attribute security and privacy in distributed database system

More information

Exploring Resource Provisioning Cost Models in Cloud Computing

Exploring Resource Provisioning Cost Models in Cloud Computing Exploring Resource Provisioning Cost Models in Cloud Computing P.Aradhya #1, K.Shivaranjani *2 #1 M.Tech, CSE, SR Engineering College, Warangal, Andhra Pradesh, India # Assistant Professor, Department

More information

Proposing a Novel Synergized K-Degree L-Diversity T- Closeness Model for Graph Based Data Anonymization

Proposing a Novel Synergized K-Degree L-Diversity T- Closeness Model for Graph Based Data Anonymization Proposing a Novel Synergized K-Degree L-Diversity T- Closeness Model for Graph Based Data Anonymization S.Charanyaa 1, K.Sangeetha 2 M.Tech. Student, Dept of Information Technology, S.N.S. College of Technology,

More information

PRIVACY PRESERVING DATA MINING BY USING IMPLICIT FUNCTION THEOREM

PRIVACY PRESERVING DATA MINING BY USING IMPLICIT FUNCTION THEOREM PRIVACY PRESERVING DATA MINING BY USING IMPLICIT FUNCTION THEOREM Pasupuleti Rajesh 1 and Gugulothu Narsimha 2 1 Department of Computer Science and Engineering, VVIT College, Guntur, India rajesh.pleti@gmail.com

More information

Information Security in Big Data using Encryption and Decryption

Information Security in Big Data using Encryption and Decryption International Research Journal of Computer Science (IRJCS) ISSN: 2393-9842 Information Security in Big Data using Encryption and Decryption SHASHANK -PG Student II year MCA S.K.Saravanan, Assistant Professor

More information

Current Developments of k-anonymous Data Releasing

Current Developments of k-anonymous Data Releasing Current Developments of k-anonymous Data Releasing Jiuyong Li 1 Hua Wang 1 Huidong Jin 2 Jianming Yong 3 Abstract Disclosure-control is a traditional statistical methodology for protecting privacy when

More information

PRIVACY PRESERVING ASSOCIATION RULE MINING

PRIVACY PRESERVING ASSOCIATION RULE MINING Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 10, October 2014,

More information

Privacy-Preserving Mining of Association Rules On Cloud by improving Rob Frugal Algorithm

Privacy-Preserving Mining of Association Rules On Cloud by improving Rob Frugal Algorithm Privacy-Preserving Mining of Association Rules On Cloud by improving Rob Frugal Algorithm Mr.Vishal R. Redekar Department of Computer Engineering Smt.Kashibai Navale College of Engineering Pune-411041,

More information

Enhancement of Security in Distributed Data Mining

Enhancement of Security in Distributed Data Mining Enhancement of Security in Distributed Data Mining Sharda Darekar 1, Prof.D.K.Chitre, 2 1,2 Department Of Computer Engineering, Terna Engineering College,Nerul,Navi Mumbai. 1 sharda.darekar@gmail.com,

More information

Secure Personal Information by Analyzing Online Social Networks

Secure Personal Information by Analyzing Online Social Networks Secure Personal Information by Analyzing Online Social Networks T. Satyendra kumar 1, C.Vijaya Rani 2 Assistant Professor, Dept. of C.S.E, S.V. Engineering College for Women, Tirupati, Chittoor, Andhra

More information

Data mining successfully extracts knowledge to

Data mining successfully extracts knowledge to C O V E R F E A T U R E Privacy-Preserving Data Mining Systems Nan Zhang University of Texas at Arlington Wei Zhao Rensselaer Polytechnic Institute Although successful in many applications, data mining

More information

Preserving Privacy in Supply Chain Management: a Challenge for Next Generation Data Mining 1

Preserving Privacy in Supply Chain Management: a Challenge for Next Generation Data Mining 1 Preserving Privacy in Supply Chain Management: a Challenge for Next Generation Data Mining 1 Madhu Ahluwalia, Zhiyuan Chen, Aryya Gangopadhyay 2, Zhiling Guo {madhu.is, zhchen, gangopad, zgou}@umbc.edu

More information

CLOUD BASED STORAGE SERVICES FOR SECURITY FOLLOWED BY THE DATA AUTHENTICATION

CLOUD BASED STORAGE SERVICES FOR SECURITY FOLLOWED BY THE DATA AUTHENTICATION INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE CLOUD BASED STORAGE SERVICES FOR SECURITY FOLLOWED BY THE DATA AUTHENTICATION Akheel Mohammed 1, Dr.Vasumathi 2, Mir Ahmed Ali

More information

How To Secure Cloud Computing, Public Auditing, Security, And Access Control In A Cloud Storage System

How To Secure Cloud Computing, Public Auditing, Security, And Access Control In A Cloud Storage System REVIEW ARTICAL A Novel Privacy-Preserving Public Auditing and Secure Searchable Data Cloud Storage Dumala Harisha 1, V.Gouthami 2 1 Student, Computer Science & Engineering-Department, JNTU Hyderabad India

More information

A Study of Data Perturbation Techniques For Privacy Preserving Data Mining

A Study of Data Perturbation Techniques For Privacy Preserving Data Mining A Study of Data Perturbation Techniques For Privacy Preserving Data Mining Aniket Patel 1, HirvaDivecha 2 Assistant Professor Department of Computer Engineering U V Patel College of Engineering Kherva-Mehsana,

More information

MALLET-Privacy Preserving Influencer Mining in Social Media Networks via Hypergraph

MALLET-Privacy Preserving Influencer Mining in Social Media Networks via Hypergraph MALLET-Privacy Preserving Influencer Mining in Social Media Networks via Hypergraph Janani K 1, Narmatha S 2 Assistant Professor, Department of Computer Science and Engineering, Sri Shakthi Institute of

More information

Selective dependable storage services for providing security in cloud computing

Selective dependable storage services for providing security in cloud computing Selective dependable storage services for providing security in cloud computing Gade Lakshmi Thirupatamma*1, M.Jayaram*2, R.Pitchaiah*3 M.Tech Scholar, Dept of CSE, UCET, Medikondur, Dist: Guntur, AP,

More information

Is Privacy Still an Issue for Data Mining? (Extended Abstract)

Is Privacy Still an Issue for Data Mining? (Extended Abstract) Is Privacy Still an Issue for Data Mining? (Extended Abstract) Chris Clifton Wei Jiang Mummoorthy Muruguesan M. Ercan Nergiz Department of Computer Science Purdue University 305 North University Street

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume, Issue, March 201 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Efficient Approach

More information

Accessing Private Network via Firewall Based On Preset Threshold Value

Accessing Private Network via Firewall Based On Preset Threshold Value IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 3, Ver. V (May-Jun. 2014), PP 55-60 Accessing Private Network via Firewall Based On Preset Threshold

More information

Privacy-Preserving Data Mining through Knowledge Model Sharing

Privacy-Preserving Data Mining through Knowledge Model Sharing Privacy-Preserving Data Mining through Knowledge Model Sharing Patrick Sharkey, Hongwei Tian, Weining Zhang, and Shouhuai Xu Department of Computer Science, University of Texas at San Antonio {psharkey,htian,wzhang,shxu}@cs.utsa.edu

More information

A Survey of Quantification of Privacy Preserving Data Mining Algorithms

A Survey of Quantification of Privacy Preserving Data Mining Algorithms A Survey of Quantification of Privacy Preserving Data Mining Algorithms Elisa Bertino, Dan Lin, and Wei Jiang Abstract The aim of privacy preserving data mining (PPDM) algorithms is to extract relevant

More information

How to Build a Private Data Classifier

How to Build a Private Data Classifier Building Decision Tree Classifier on Private Data Wenliang Du Zhijun Zhan Center for Systems Assurance Department of Electrical Engineering and Computer Science Syracuse University, Syracuse, NY 13244,

More information

EFFECTIVE DATA RECOVERY FOR CONSTRUCTIVE CLOUD PLATFORM

EFFECTIVE DATA RECOVERY FOR CONSTRUCTIVE CLOUD PLATFORM INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE EFFECTIVE DATA RECOVERY FOR CONSTRUCTIVE CLOUD PLATFORM Macha Arun 1, B.Ravi Kumar 2 1 M.Tech Student, Dept of CSE, Holy Mary

More information

Efficient Query Optimizing System for Searching Using Data Mining Technique

Efficient Query Optimizing System for Searching Using Data Mining Technique Vol.1, Issue.2, pp-347-351 ISSN: 2249-6645 Efficient Query Optimizing System for Searching Using Data Mining Technique Velmurugan.N Vijayaraj.A Assistant Professor, Department of MCA, Associate Professor,

More information

COST EFFECTIVE PRIVACY PRESERVED INTERMEDIATE DATASETS FOR CLOUD DATA SERVICES

COST EFFECTIVE PRIVACY PRESERVED INTERMEDIATE DATASETS FOR CLOUD DATA SERVICES COST EFFECTIVE PRIVACY PRESERVED INTERMEDIATE DATASETS FOR CLOUD DATA SERVICES Chaya.Y.K 1, Bharathi V Kalmath 2 1 PG Student, Department of CSE, S.V.C.E,Bengaluru 2 Asst.Professor, Department of CSE,

More information

A Novel Technique of Privacy Protection. Mining of Association Rules from Outsourced. Transaction Databases

A Novel Technique of Privacy Protection. Mining of Association Rules from Outsourced. Transaction Databases A Novel Technique of Privacy Protection Mining of Association Rules from Outsource Transaction Databases 1 Dhananjay D. Wadkar, 2 Santosh N. Shelke 1 Computer Engineering, Sinhgad Academy of Engineering

More information

Survey on Data Privacy in Big Data with K- Anonymity

Survey on Data Privacy in Big Data with K- Anonymity Survey on Data Privacy in Big Data with K- Anonymity Salini. S, Sreetha. V. Kumar, Neevan.R M.Tech Student, Dept of CSE, Marian Engineering College, Trivandrum, Kerala, India Asst. Professor, Dept of CSE,

More information

A Way to Understand Various Patterns of Data Mining Techniques for Selected Domains

A Way to Understand Various Patterns of Data Mining Techniques for Selected Domains A Way to Understand Various Patterns of Data Mining Techniques for Selected Domains Dr. Kanak Saxena Professor & Head, Computer Application SATI, Vidisha, kanak.saxena@gmail.com D.S. Rajpoot Registrar,

More information

AN INTELLIGENT ANALYSIS OF CRIME DATA USING DATA MINING & AUTO CORRELATION MODELS

AN INTELLIGENT ANALYSIS OF CRIME DATA USING DATA MINING & AUTO CORRELATION MODELS AN INTELLIGENT ANALYSIS OF CRIME DATA USING DATA MINING & AUTO CORRELATION MODELS Uttam Mande Y.Srinivas J.V.R.Murthy Dept of CSE Dept of IT Dept of CSE GITAM University GITAM University J.N.T.University

More information

PBKM: A Secure Knowledge Management Framework

PBKM: A Secure Knowledge Management Framework PBKM: A Secure Knowledge Management Framework (extended abstract) Shouhuai Xu and Weining Zhang Department of Computer Science, University of Texas at San Antonio {shxu,wzhang}@cs.utsa.edu Abstract In

More information

An Attacker s View of Distance Preserving Maps For Privacy Preserving Data Mining

An Attacker s View of Distance Preserving Maps For Privacy Preserving Data Mining An Attacker s View of Distance Preserving Maps For Privacy Preserving Data Mining Kun Liu, Chris Giannella, and Hillol Kargupta Department of Computer Science and Electrical Engineering, University of

More information

Volume 2, Issue 2, February 2014 International Journal of Advance Research in Computer Science and Management Studies

Volume 2, Issue 2, February 2014 International Journal of Advance Research in Computer Science and Management Studies Volume 2, Issue 2, February 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at: www.ijarcsms.com ISSN: 2321-7782

More information

A Three-Dimensional Conceptual Framework for Database Privacy

A Three-Dimensional Conceptual Framework for Database Privacy A Three-Dimensional Conceptual Framework for Database Privacy Josep Domingo-Ferrer Rovira i Virgili University UNESCO Chair in Data Privacy Department of Computer Engineering and Mathematics Av. Països

More information

Data Mining and Sensitive Inferences

Data Mining and Sensitive Inferences Template-Based Privacy Preservation in Classification Problems Ke Wang Simon Fraser University BC, Canada V5A S6 wangk@cs.sfu.ca Benjamin C. M. Fung Simon Fraser University BC, Canada V5A S6 bfung@cs.sfu.ca

More information

A Secure Decentralized Access Control Scheme for Data stored in Clouds

A Secure Decentralized Access Control Scheme for Data stored in Clouds A Secure Decentralized Access Control Scheme for Data stored in Clouds Priyanka Palekar 1, Abhijeet Bharate 2, Nisar Anjum 3 1 SKNSITS, University of Pune 2 SKNSITS, University of Pune 3 SKNSITS, University

More information

Privacy-Preserving in Outsourced Transaction Databases from Association Rules Mining

Privacy-Preserving in Outsourced Transaction Databases from Association Rules Mining Privacy-Preserving in Outsourced Transaction Databases from Association Rules Mining Ms. Deokate Pallavi B., Prof. M.M. Waghmare 2 Student of ME (Information Technology), DGOFFE, University of Pune, Pune

More information

A Model For Revelation Of Data Leakage In Data Distribution

A Model For Revelation Of Data Leakage In Data Distribution A Model For Revelation Of Data Leakage In Data Distribution Saranya.R Assistant Professor, Department Of Computer Science and Engineering Lord Jegannath college of Engineering and Technology Nagercoil,

More information

Barriers to Adopting Privacy-preserving Data Mining

Barriers to Adopting Privacy-preserving Data Mining Barriers to Adopting Privacy-preserving Data Mining Richard Huebner Norwich University ABSTRACT The primary issue examined in this research is that privacy-preserving data mining (PPDM) research has produced

More information

A Survey on Outlier Detection Techniques for Credit Card Fraud Detection

A Survey on Outlier Detection Techniques for Credit Card Fraud Detection IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 2, Ver. VI (Mar-Apr. 2014), PP 44-48 A Survey on Outlier Detection Techniques for Credit Card Fraud

More information

Horizontal Aggregations In SQL To Generate Data Sets For Data Mining Analysis In An Optimized Manner

Horizontal Aggregations In SQL To Generate Data Sets For Data Mining Analysis In An Optimized Manner 24 Horizontal Aggregations In SQL To Generate Data Sets For Data Mining Analysis In An Optimized Manner Rekha S. Nyaykhor M. Tech, Dept. Of CSE, Priyadarshini Bhagwati College of Engineering, Nagpur, India

More information

An Efficiency Keyword Search Scheme to improve user experience for Encrypted Data in Cloud

An Efficiency Keyword Search Scheme to improve user experience for Encrypted Data in Cloud , pp.246-252 http://dx.doi.org/10.14257/astl.2014.49.45 An Efficiency Keyword Search Scheme to improve user experience for Encrypted Data in Cloud Jiangang Shu ab Xingming Sun ab Lu Zhou ab Jin Wang ab

More information

Data Deduplication Scheme for Cloud Storage

Data Deduplication Scheme for Cloud Storage 26 Data Deduplication Scheme for Cloud Storage 1 Iuon-Chang Lin and 2 Po-Ching Chien Abstract Nowadays, the utilization of storage capacity becomes an important issue in cloud storage. In this paper, we

More information

Secure and Faster NN Queries on Outsourced Metric Data Assets Renuka Bandi #1, Madhu Babu Ch *2

Secure and Faster NN Queries on Outsourced Metric Data Assets Renuka Bandi #1, Madhu Babu Ch *2 Secure and Faster NN Queries on Outsourced Metric Data Assets Renuka Bandi #1, Madhu Babu Ch *2 #1 M.Tech, CSE, BVRIT, Hyderabad, Andhra Pradesh, India # Professor, Department of CSE, BVRIT, Hyderabad,

More information

Privacy-Preserving Outsourcing Support Vector Machines with Random Transformation

Privacy-Preserving Outsourcing Support Vector Machines with Random Transformation Privacy-Preserving Outsourcing Support Vector Machines with Random Transformation Keng-Pei Lin Ming-Syan Chen Department of Electrical Engineering, National Taiwan University, Taipei, Taiwan Research Center

More information

SEARCH ENGINE WITH PARALLEL PROCESSING AND INCREMENTAL K-MEANS FOR FAST SEARCH AND RETRIEVAL

SEARCH ENGINE WITH PARALLEL PROCESSING AND INCREMENTAL K-MEANS FOR FAST SEARCH AND RETRIEVAL SEARCH ENGINE WITH PARALLEL PROCESSING AND INCREMENTAL K-MEANS FOR FAST SEARCH AND RETRIEVAL Krishna Kiran Kattamuri 1 and Rupa Chiramdasu 2 Department of Computer Science Engineering, VVIT, Guntur, India

More information

A Secure Model for Medical Data Sharing

A Secure Model for Medical Data Sharing International Journal of Database Theory and Application 45 A Secure Model for Medical Data Sharing Wong Kok Seng 1,1,Myung Ho Kim 1, Rosli Besar 2, Fazly Salleh 2 1 Department of Computer, Soongsil University,

More information

DATA MINING - 1DL360

DATA MINING - 1DL360 DATA MINING - 1DL360 Fall 2013" An introductory class in data mining http://www.it.uu.se/edu/course/homepage/infoutv/per1ht13 Kjell Orsborn Uppsala Database Laboratory Department of Information Technology,

More information

AN APPROACH TO ANTICIPATE MISSING ITEMS IN SHOPPING CARTS

AN APPROACH TO ANTICIPATE MISSING ITEMS IN SHOPPING CARTS AN APPROACH TO ANTICIPATE MISSING ITEMS IN SHOPPING CARTS Maddela Pradeep 1, V. Nagi Reddy 2 1 M.Tech Scholar(CSE), 2 Assistant Professor, Nalanda Institute Of Technology(NIT), Siddharth Nagar, Guntur,

More information

Enhancing Data Security in Cloud Storage Auditing With Key Abstraction

Enhancing Data Security in Cloud Storage Auditing With Key Abstraction Enhancing Data Security in Cloud Storage Auditing With Key Abstraction 1 Priyadharshni.A, 2 Geo Jenefer.G 1 Master of engineering in computer science, Ponjesly College of Engineering 2 Assistant Professor,

More information

An Efficient Multi-Keyword Ranked Secure Search On Crypto Drive With Privacy Retaining

An Efficient Multi-Keyword Ranked Secure Search On Crypto Drive With Privacy Retaining An Efficient Multi-Keyword Ranked Secure Search On Crypto Drive With Privacy Retaining 1 B.Sahaya Emelda and 2 Mrs. P. Maria Jesi M.E.,Ph.D., 1 PG Student and 2 Associate Professor, Department of Computer

More information

Accuracy in Privacy-Preserving Data Mining Using the Paradigm of Cryptographic Elections

Accuracy in Privacy-Preserving Data Mining Using the Paradigm of Cryptographic Elections Accuracy in Privacy-Preserving Data Mining Using the Paradigm of Cryptographic Elections Emmanouil Magkos 1, Manolis Maragoudakis 2, Vassilis Chrissikopoulos 1, and Stefanos Gridzalis 2 1 Department of

More information

An Efficient Secure Multi Owner Data Sharing for Dynamic Groups in Cloud Computing

An Efficient Secure Multi Owner Data Sharing for Dynamic Groups in Cloud Computing Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 6, June 2014, pg.730

More information

Policy-based Pre-Processing in Hadoop

Policy-based Pre-Processing in Hadoop Policy-based Pre-Processing in Hadoop Yi Cheng, Christian Schaefer Ericsson Research Stockholm, Sweden yi.cheng@ericsson.com, christian.schaefer@ericsson.com Abstract While big data analytics provides

More information

MANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS

MANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE MANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS Kanchupati Kondaiah 1, B.Sudhakar 2 1 M.Tech Student, Dept of CSE,

More information

Preserving Privacy and Frequent Sharing Patterns for Social Network Data Publishing

Preserving Privacy and Frequent Sharing Patterns for Social Network Data Publishing Preserving Privacy and Frequent Sharing Patterns for Social Network Data Publishing Benjamin C. M. Fung CIISE, Concordia University Montreal, QC, Canada fung@ciise.concordia.ca Yan an Jin Huazhong University

More information

OLAP Online Privacy Control

OLAP Online Privacy Control OLAP Online Privacy Control M. Ragul Vignesh and C. Senthil Kumar Abstract--- The major issue related to the protection of private information in online analytical processing system (OLAP), is the privacy

More information

MINING THE DATA FROM DISTRIBUTED DATABASE USING AN IMPROVED MINING ALGORITHM

MINING THE DATA FROM DISTRIBUTED DATABASE USING AN IMPROVED MINING ALGORITHM MINING THE DATA FROM DISTRIBUTED DATABASE USING AN IMPROVED MINING ALGORITHM J. Arokia Renjit Asst. Professor/ CSE Department, Jeppiaar Engineering College, Chennai, TamilNadu,India 600119. Dr.K.L.Shunmuganathan

More information

Ranked Keyword Search Using RSE over Outsourced Cloud Data

Ranked Keyword Search Using RSE over Outsourced Cloud Data Ranked Keyword Search Using RSE over Outsourced Cloud Data Payal Akriti 1, Ms. Preetha Mary Ann 2, D.Sarvanan 3 1 Final Year MCA, Sathyabama University, Tamilnadu, India 2&3 Assistant Professor, Sathyabama

More information

M. Nathiya 2 B.Tech. (IT), M.E. (CSE), Assistant Professor, Shivani Engineering College, Trichy, Tamilnadu, India.

M. Nathiya 2 B.Tech. (IT), M.E. (CSE), Assistant Professor, Shivani Engineering College, Trichy, Tamilnadu, India. ISSN: 2321-7782 (Online) Volume 2, Issue 5, May 2014 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com Robust Data

More information

A Data Mining Perspective in Privacy Preserving Data Mining Systems

A Data Mining Perspective in Privacy Preserving Data Mining Systems Research Article International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347-5161 2014 INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Kumaraswamy

More information

CRYPTANALYSIS OF A MORE EFFICIENT AND SECURE DYNAMIC ID-BASED REMOTE USER AUTHENTICATION SCHEME

CRYPTANALYSIS OF A MORE EFFICIENT AND SECURE DYNAMIC ID-BASED REMOTE USER AUTHENTICATION SCHEME CRYPTANALYSIS OF A MORE EFFICIENT AND SECURE DYNAMIC ID-BASED REMOTE USER AUTHENTICATION SCHEME Mohammed Aijaz Ahmed 1, D. Rajya Lakshmi 2 and Sayed Abdul Sattar 3 1 Department of Computer Science and

More information

Multi-table Association Rules Hiding

Multi-table Association Rules Hiding Multi-table Association Rules Hiding Shyue-Liang Wang 1 and Tzung-Pei Hong 2 1 Department of Information Management 2 Department of Computer Science and Information Engineering National University of Kaohsiung

More information

International Journal of Engineering Research-Online A Peer Reviewed International Journal Articles available online http://www.ijoer.

International Journal of Engineering Research-Online A Peer Reviewed International Journal Articles available online http://www.ijoer. REVIEW ARTICLE ISSN: 2321-7758 UPS EFFICIENT SEARCH ENGINE BASED ON WEB-SNIPPET HIERARCHICAL CLUSTERING MS.MANISHA DESHMUKH, PROF. UMESH KULKARNI Department of Computer Engineering, ARMIET, Department

More information

IMPLEMENTATION OF RESPONSIBLE DATA STORAGE IN CONSISTENT CLOUD ENVIRONMENT

IMPLEMENTATION OF RESPONSIBLE DATA STORAGE IN CONSISTENT CLOUD ENVIRONMENT IJRRECS/November 2014/Volume-2/Issue-11/3699-3703 ISSN 2321-5461 INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE IMPLEMENTATION OF RESPONSIBLE DATA STORAGE IN CONSISTENT CLOUD

More information

DELEGATING LOG MANAGEMENT TO THE CLOUD USING SECURE LOGGING

DELEGATING LOG MANAGEMENT TO THE CLOUD USING SECURE LOGGING Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IJCSMC, Vol. 3, Issue.

More information

A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA

A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA U.Pandi Priya 1, R.Padma Priya 2 1 Research Scholar, Department of Computer Science and Information Technology,

More information

Privacy-Preserving Data Visualization using Parallel Coordinates

Privacy-Preserving Data Visualization using Parallel Coordinates Privacy-Preserving Data Visualization using Parallel Coordinates Aritra Dasgupta and Robert Kosara UNC Charlotte, USA ABSTRACT The proliferation of data in the past decade has created demand for innovative

More information

SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD

SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD Volume 1, Issue 7, PP:, JAN JUL 2015. SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD B ANNAPURNA 1*, G RAVI 2*, 1. II-M.Tech Student, MRCET 2. Assoc. Prof, Dept.

More information

AN APPROACH TOWARDS FUNCTIONING OF PUBLIC AUDITABILITY FOR CLOUD ENRICHMENT

AN APPROACH TOWARDS FUNCTIONING OF PUBLIC AUDITABILITY FOR CLOUD ENRICHMENT INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN APPROACH TOWARDS FUNCTIONING OF PUBLIC AUDITABILITY FOR CLOUD ENRICHMENT Mohd Abdul Shoaib 1, Akheel Mohammed 2, Ayesha 3

More information

Adaptive Privacy-Preserving Visualization Using Parallel Coordinates

Adaptive Privacy-Preserving Visualization Using Parallel Coordinates Adaptive Privacy-Preserving Visualization Using Parallel Coordinates Aritra Dasgupta and Robert Kosara Abstract Current information visualization techniques assume unrestricted access to data. However,

More information

EFFICIENT DISCOVERY OF INTEGRITY AUTOMATION IN HYBRID CLOUD COMPUTING

EFFICIENT DISCOVERY OF INTEGRITY AUTOMATION IN HYBRID CLOUD COMPUTING INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE EFFICIENT DISCOVERY OF INTEGRITY AUTOMATION IN HYBRID CLOUD COMPUTING K.Saipriya 1, A.Ravi Kumar 2 1 M.Tech Student, Dept of

More information

ACL Based Dynamic Network Reachability in Cross Domain

ACL Based Dynamic Network Reachability in Cross Domain South Asian Journal of Engineering and Technology Vol.2, No.15 (2016) 68 72 ISSN No: 2454-9614 ACL Based Dynamic Network Reachability in Cross Domain P. Nandhini a, K. Sankar a* a) Department Of Computer

More information

Keywords-- Cloud computing, Encryption, Data integrity, Third Party Auditor (TPA), RC5 Algorithm, privacypreserving,

Keywords-- Cloud computing, Encryption, Data integrity, Third Party Auditor (TPA), RC5 Algorithm, privacypreserving, Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Third Party

More information

A RESEARCH STUDY ON DATA MINING TECHNIQUES AND ALGORTHMS

A RESEARCH STUDY ON DATA MINING TECHNIQUES AND ALGORTHMS A RESEARCH STUDY ON DATA MINING TECHNIQUES AND ALGORTHMS Nitin Trivedi, Research Scholar, Manav Bharti University, Solan HP ABSTRACT The purpose of this study is not to delve deeply into the technical

More information

Securing Health Care Information by Using Two-Tier Cipher Cloud Technology

Securing Health Care Information by Using Two-Tier Cipher Cloud Technology Securing Health Care Information by Using Two-Tier Cipher Cloud Technology M.Divya 1 J.Gayathri 2 A.Gladwin 3 1 B.TECH Information Technology, Jeppiaar Engineering College, Chennai 2 B.TECH Information

More information

Secure Data Sharing in Cloud Computing using Hybrid cloud

Secure Data Sharing in Cloud Computing using Hybrid cloud International Journal of Electronics and Computer Science Engineering 144 Available Online at www.ijecse.org ISSN: 2277-1956 Secure Data Sharing in Cloud Computing using Hybrid cloud Er. Inderdeep Singh

More information

Static Data Mining Algorithm with Progressive Approach for Mining Knowledge

Static Data Mining Algorithm with Progressive Approach for Mining Knowledge Global Journal of Business Management and Information Technology. Volume 1, Number 2 (2011), pp. 85-93 Research India Publications http://www.ripublication.com Static Data Mining Algorithm with Progressive

More information

A SECURE DECISION SUPPORT ESTIMATION USING GAUSSIAN BAYES CLASSIFICATION IN HEALTH CARE SERVICES

A SECURE DECISION SUPPORT ESTIMATION USING GAUSSIAN BAYES CLASSIFICATION IN HEALTH CARE SERVICES A SECURE DECISION SUPPORT ESTIMATION USING GAUSSIAN BAYES CLASSIFICATION IN HEALTH CARE SERVICES K.M.Ruba Malini #1 and R.Lakshmi *2 # P.G.Scholar, Computer Science and Engineering, K. L. N College Of

More information

A Privacy-preserving Approach for Records Management in Cloud Computing. Eun Park and Benjamin Fung. School of Information Studies McGill University

A Privacy-preserving Approach for Records Management in Cloud Computing. Eun Park and Benjamin Fung. School of Information Studies McGill University A Privacy-preserving Approach for Records Management in Cloud Computing Eun Park and Benjamin Fung School of Information Studies McGill University Digital transformation Privacy Conflict? Health service

More information

EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY

EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY Siliveru Ashok kumar* S.G. Nawaz ## and M.Harathi # * Student of M.Tech, Sri Krishna Devaraya Engineering College, Gooty # Department

More information

PRIVACY PRESERVING AUTHENTICATION WITH SHARED AUTHORITY IN CLOUD

PRIVACY PRESERVING AUTHENTICATION WITH SHARED AUTHORITY IN CLOUD PRIVACY PRESERVING AUTHENTICATION WITH SHARED AUTHORITY IN CLOUD Kopparthi Lakshmi Narayana 1, M.Purushotham Reddy 2, G.Rama Subba Reddy 3 1 M.tech Scholar (CSE), 2 Asst.professor, Dept. of CSE, Vignana

More information

Preventing Denial-of-request Inference Attacks in Location-sharing Services

Preventing Denial-of-request Inference Attacks in Location-sharing Services Preventing Denial-of-request Inference Attacks in Location-sharing Services Kazuhiro Minami Institute of Statistical Mathematics, Tokyo, Japan Email: kminami@ism.ac.jp Abstract Location-sharing services

More information

A Dynamic Approach to Extract Texts and Captions from Videos

A Dynamic Approach to Extract Texts and Captions from Videos Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,

More information