Privacy-Preserving in Outsourced Transaction Databases from Association Rules Mining
|
|
|
- Jemimah Anderson
- 10 years ago
- Views:
Transcription
1 Privacy-Preserving in Outsourced Transaction Databases from Association Rules Mining Ms. Deokate Pallavi B., Prof. M.M. Waghmare 2 Student of ME (Information Technology), DGOFFE, University of Pune, Pune 2 Asst. Professors, Department of Computer Engineering, DGOIFE, Bhigwan University of Pune, Pune Abstract Data mining-as-a-service has been selected as considerable research issue by researchers. An organization (data owner) can outsource its mining needs like resources or expertise to a third party service provider (server). However, both the association rules and the items of the outsourced transaction database are private property of data owner. The data owner encrypts its data, send data and mining queries to the server, and accepts the true patterns from the encrypted patterns received from the server to protect the privacy. The problem of outsourcing transaction database within a corporate privacy framework is studied in this paper. We propose an attack model based on previous knowledge and devise a scheme for privacy preserving outsourced data mining. Our scheme ensures that each transformed data is different with respect to the attacker s previous information. The experimental results on real transaction database prove that our techniques are scalable, efficient and protect privacy. Index Terms Privacy-preserving outsourcing, Association rule mining Introduction With the arrival of cloud computing and its model for IT services supported the net and large knowledge centers, the outsourcing of knowledge and computing services is getting a completely unique connation, that is predicted to skyrocket within the close to future. Business intelligence and data discovery services, square measure expected to be among the services amenable to be externalized on the cloud, thanks to their knowledge intensive nature, further because the complexness of knowledge mining algorithms. Thus, the paradigm of mining and management of knowledge as service can presumptively grow as quality of cloud computing grows []. This can be the information mining-as-a-service paradigm, geared toward sanctionative organizations with restricted process resources and/or data processing experience to source their data processing has to a 3rd party service supplier [2], [3]. We adopt a conservative frequency-based attack model within which the server is aware of the precise set of things within the owner s knowledge and to boot, it conjointly is aware of the precise support of each item within the original knowledge. In this paper, our goal is to plan encryption scheme that permits formal privacy guarantees to be well-tried, and to validate this model over large-scale real-life dealing databases (TDB) Fig.. Architecture of mining-as-service paradigm 82
2 The design behind our model is illustrated in Fig..The client/owner encrypts its information victimisation associate degree encrypt/decrypt (E/D) module. Whereas the main points of this module are going to be explained in Encryption/Decryption Section. The server conducts data processing and sends the (encrypted) patterns to the owner. Our coding theme has the property that came supports aren't true supports. The E/D module recovers truth identity of the came patterns additionally their true supports Contributions: First, associate attack model is outlined for attacker and makes the background the attacker might possess precise. Our notion of privacy needs that, for every cipher text item, there area unit a minimum of k distinct cipher things that area unit indistinguishable from the item relating to their supports. Second, we have developed an encryption scheme, known as RobFrugal. The E/D module will use to remodel consumer information before it s shipped to the server. Third, to permit the E/D module to recover verity patterns and their correct support, we have a tendency to propose that it creates and keeps a compact structure, referred to as synopsis. We have a tendency to additionally offer the E/D module with an economical strategy for incrementally maintaining the abstract against updates within the type of appends. Related work is represented within the next section. The pattern mining task is reviewed then. Our privacy model is given in next section. Then next section develops the encryption/decryption theme we tend to use. Finally, we conclude this paper and discuss directions for future analysis in last Section. Related Work The particular drawback attacked in our paper is outsourcing of pattern mining inside company privacy. Not only the underlying knowledge however conjointly the mined results don't seem to be meant for sharing. Once the server possesses background and conducts attacks thereon basis, it is unable to guess the proper candidate item or itemset equivalent to a given cipher item or item set. Another issue is secure multiparty mining over distributed datasets. Knowledge on that mining is to be performed is partitioned and distributed among many parties. This body of labor was pioneered by [7] and has been followed up by many papers since [8]. The partitioned off knowledge can't be shared and should stay personal however the results of mining on the union of the information are shared among the participants, by means that of multiparty secure protocols [9] []. They don't think about third parties. This approach partly implements company privacy; however it's too weak for our outsourcing problem, because the ensuing patterns are disclosed to multiple parties. The works that are most associated with ours are [2] and [2]. A recent paper [5] has formally evidenced that the encryption system in [2] are often broken while not victimization context-specific info. The success of the attacks in recent paper [5] the main depends on the existence of distinctive, common, and faux things, outlined in [2]; our theme doesn't produce any such things. Tai et al. [2] assumed the wrongdoer is aware of actual frequency of single things, equally to United States of America. Compared with these 2 works, our theme will invariably bring home the bacon obvious privacy guarantee with regard to the background of attacker. Pattern Mining Task TDB Apple Orange Apple Apple Orange Banana Orange Apple Milk Apple Chocolate Banana (a) (b) Fig.2. Example of TDB and its support table. (a) TDB. (b) Item support table. We let I = i,, in be the set of things and D = t,...,tm a TDB of transactions, every of that could be a set of things. We tend to denote the support of associate itemset S I as suppd(s) and also the frequency by freqd(s). Recall that freqd(s) = Item Apple Orange Banana Milk Chocolate Sup 5 3 2
3 suppd(s)/ D. For every item i, suppd(i) and freqd(i) denote, severally, the individual support and frequency of i. The perform suppd(.), projected over things, is additionally known as the item support table of D described in tabular kind [Fig. 2(b)]. The wellknown frequent pattern mining downside [3] is: given a TDB D and a support threshold σ, notice all itemsets whose support in D is a minimum of σ. Privacy Model We let D denote the initial TDB that the owner has. to safeguard the identification of individual things, the owner applies AN cryptography perform to D and transforms it to D*, the encrypted info. We tend to discuss with things in D as plain things the encrypted info. We tend to discuss with things in D as plain things and things in D* as cipher things. A. Adversary Knowledge The server in Nursing trespasser who gains access to that might possess some information victimization that they'll conduct attacks on the encrypted information D*. We tend to generically sit down with Associate in Nursingy of those agents as a wrongdoer. We tend to adopt a conservative model and assume that the wrongdoer is aware of precisely the set of (plain) things I within the original TDB D and their true supports in D, i.e., suppd(i), i I. The wrongdoer might have access to similar information from a competitory company, might scan printed reports, etc. B. Attack Model The data owner (i.e., the corporate) considers actuality identity of: ) each cipher item; 2) each cipher transaction; and 3) each cipher frequent pattern because the material possession that ought to be protected. We take into account the subsequent attack model. ) Item-based attack: cipher item e E, the offender constructs a collection of candidate plain things Cand(e) I. The likelihood that the cipher item e may be broken prob(e) = / Cand(e). 2) Set-based attack: Given a cipher itemset E, the offender constructs a collection of candidate plain itemsets Cand(E), wherever X Cand(E), X I, and X = E. The likelihood that the cipher itemset E may be broken prob(e) = / Cand(E). Encryption/Decryption Scheme A. Encryption In this section, we have introduced the cryptography theme, referred to as RobFrugal that transforms a TDB D into its encrypted version D*. Our theme is constant with reference to k > zero and consists of 3 main steps: ) Using substitution ciphers for every plain item; 2) Using a selected item kgrouping method; and 3)Using a way for adding new pretend transactions for achieving k- privacy. The made pretend transactions area unit else to D to make D*, and transmitted to the server. A record of pretend transactions, i.e., DF = D*\D, is hold on by the E/D module within the variety of a compact precis, as mentioned in Sections C and D. B. Decryption When the consumer requests the execution of a pattern mining question to the server, specifying a minimum support threshold σ, the server returns the computed frequent patterns from D *. Clearly, for each itemset S and its corresponding cipher itemset E, we've that suppd(s) suppd* (E). For every cipher pattern E came back by the server beside suppd* (E), the E/D module recovers the corresponding plain pattern S. It must reconstruct the precise support of S in D and choose on this basis if S may be a frequent pattern. to attain this goal, the E/D module adjusts the support of E by removing the result of the faux transactions. suppd(s) = suppd* (E) suppd*\d(e). This follows from the very fact that support of Associate in Nursing itemset is additive over a disjoint union of dealing sets. Finally, the pattern S with adjusted support is unbroken within the output if suppd(s) σ. The calculation of suppd*\d(e) is performed by the E/D module victimisation the precis of the faux transactions in D* \D. C. Grouping Items for k-privacy Given the things support table, many ways will be adopted to cluster the things into teams of size k. We tend to begin from an easy grouping methodology known as sparing. The item support table is sorted in descendant order of support and check with cipher things during this order as e, e2, etc. Assume e, e2... en is that the list of cipher things in descendant order of support (with reference to D), the teams created by sparing square measure. The last cluster, if but k in size, is united with its previous cluster. We tend to denote the grouping obtained mistreatment the on top of definition as Gfrug. For instance, contemplate the instance TDB and its associated (cipher) item support shown in Fig. 2. For k = 2, Gfrug has 2 groups. This corresponds to the partitioning teams shown in Table I(a). Thus, in D* the support of e4 are delivered to that of e2; and also the support of e and e3 delivered to that of e5. For example, given the item support table in Fig. 2, the grouping illustrated in Table I(b), obtained by exchanging e4 and e5 within the 2 teams of stinting, and is currently robust: none of the 2 teams, thought of as itemsets, is supported by any dealings in D. TABLE I Groping With k =
4 (a) Frugal Item Support e2 5 e4 3 e5 2 e e3 (b) RobFrugal Item Support e2 5 e5 2 e4 3 e e3 TABLE II Noise Table and Its Hash Table (a) Noise table For k = 2 Item Support Noise e2 5 0 e5 2 3 e4 3 0 e 2 e3 2 (b) Hash tables Table < e5,,2> < e3,2,0> Table 2 < e,2,0> D. Constructing Fake Transactions Given a noise table specifying the noise N(e) required for every cipher item e, we have a tendency to generate the pretend transactions as follows. First, we have a tendency to drop the rows with zero noise, admire the foremost frequent things of every cluster or to different things with support capable the most support of a bunch. Second, we have a tendency to kind the remaining rows in descendent order of noise.continuing the instance, think about cipher things of nonzero noise in Table II(a). The subsequent 2 pretend dealings square measure generated: 2 instances of the transaction and one instance of the dealing. ACKNOWLEDGMENT I wish to express my sincere thanks to our Principal, HOD and Professors and staff members of Computer Engineering Department at Dattakala faculty of Engineering, Swami Chincholi, Bhigawan. Last but not the least, I would like to thank all my Friends and Family members who have always been there to support and helped me to complete this research work. CONCLUSION In this paper, we studied the problem of (corporate) privacy-preserving mining of frequent patterns on an encrypted outsourced transaction database. We have considered that the attacker knows the domain of items and their exact frequency and can use this knowledge to identify cipher items and cipher itemsets. An encryption scheme, called RobFrugal, is proposed that is based on substitution ciphers for items and adding fake transactions. It makes use of a compact synopsis of the fake transactions from which the true support of mined patterns from the server can be efficiently recovered. We also proposed a strategy for incremental maintenance of the synopsis against updates. This method is robust against an adversarial attack based on the original items and their exact support. Currently, our privacy analysis is based on the assumption of equal likelihood of candidates. It would be interesting to enhance the framework and the analysis by appealing to cryptographic notions such as perfect secrecy [4]. Moreover, our work considers the ciphertext-only attack model, in which the attacker has access only to the encrypted items. It could be interesting to consider other attack models where the attacker knows some pairs of items and their cipher values. We will investigate encryption 824
5 schemes that can resist such privacy vulnerabilities. We are also interested in exploring how to improve the RobFrugal algorithm to minimize the number of spurious patterns. REFERENCES: [] Fosca Giannotti, Laks V. S. Lakshmanan, Anna Monreale, Dino Pedreschi, and Hui (Wendy) Wang, Privacy-Preserving Mining of Association Rules From Outsourced Transaction Databases, in IEEE SYSTEMS JOURNAL, VOL. 7, NO. 3, SEPTEMBER 203. [2] W. K. Wong, D. W. Cheung, E. Hung, B. Kao, and N. Mamoulis, Security in outsourcing of association rule mining, in Proc. Int. Conf. Very Large Data Bases, 2007, pp. 22. [3] L. Qiu, Y. Li, and X. Wu, Protecting business intelligence and customer privacy while outsourcing data mining tasks, Knowledge Inform. Syst., vol. 7, no., pp , [4] C. Clifton, M. Kantarcioglu, and J. Vaidya, Defining privacy for data mining, in Proc. Nat. Sci. Found. Workshop Next Generation Data Mining, 2002, pp [5] I. Molloy, N. Li, and T. Li, On the (in)security and (im)practicality of outsourcing precise association rule mining, in Proc. IEEE Int. Conf. Data Mining, Dec. 2009, pp [6] F. Giannotti, L. V. Lakshmanan, A. Monreale, D. Pedreschi, and H. Wang, Privacy-preserving data mining from outsourced databases, in Proc. SPCC200 Conjunction with CPDP, 200, pp [7] R. Agrawal and R. Srikant, Privacy-preserving data mining, in Proc. ACM SIGMOD Int. Conf. Manage. Data, 2000, pp [8] S. J. Rizvi and J. R. Haritsa, Maintaining data privacy in association rule mining, in Proc. Int. Conf. Very Large Data Bases, 2002, pp [9] M. Kantarcioglu and C. Clifton, Privacy-preserving distributed mining of association rules on horizontally partitioned data, IEEE Trans. Knowledge Data Eng., vol. 6, no. 9, pp , Sep [0] B. Gilburd, A. Schuster, and R. Wolff, k-ttp: A new privacy model for large scale distributed environments, in Proc. Int. Conf. Very Large Data Bases, 2005, pp [] P. K. Prasad and C. P. Rangan, Privacy preserving birch algorithm for clustering over arbitrarily partitioned databases, in Proc. Adv. Data Mining Appl., 2007, pp [2] C. Tai, P. S. Yu, and M. Chen, K-support anonymity based on pseudo taxonomy for outsourcing of frequent itemset mining, in Proc. Int. Knowledge Discovery Data Mining, 200, pp [3] R. Agrawal and R. Srikant, Fast algorithms for mining association rules, in Proc. Int. Conf. Very Large Data Bases, 994, pp [4] C. E. Shannon, Communication theory of secrecy systems, Bell Syst.Tech. J., vol. 28, pp ,
Homomorphic Encryption Schema for Privacy Preserving Mining of Association Rules
Homomorphic Encryption Schema for Privacy Preserving Mining of Association Rules M.Sangeetha 1, P. Anishprabu 2, S. Shanmathi 3 Department of Computer Science and Engineering SriGuru Institute of Technology
A Novel Technique of Privacy Protection. Mining of Association Rules from Outsourced. Transaction Databases
A Novel Technique of Privacy Protection Mining of Association Rules from Outsource Transaction Databases 1 Dhananjay D. Wadkar, 2 Santosh N. Shelke 1 Computer Engineering, Sinhgad Academy of Engineering
International Journal of Scientific & Engineering Research, Volume 4, Issue 10, October-2013 ISSN 2229-5518 1582
1582 AN EFFICIENT CRYPTOGRAPHIC APPROACH FOR PRESERVING PRIVACY IN DATA MINING T.Sujitha 1, V.Saravanakumar 2, C.Saravanabhavan 3 1. M.E. Student, [email protected] 2. Assistant Professor, [email protected]
PRIVACY PRESERVING ASSOCIATION RULE MINING
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 10, October 2014,
Privacy-Preserving Mining of Association Rules On Cloud by improving Rob Frugal Algorithm
Privacy-Preserving Mining of Association Rules On Cloud by improving Rob Frugal Algorithm Mr.Vishal R. Redekar Department of Computer Engineering Smt.Kashibai Navale College of Engineering Pune-411041,
IMPROVED BYZANTINE FAULT TOLERANCE TWO PHASE COMMIT PROTOCOL
IMPROVED BYZANTINE FAULT TOLERANCE TWO PHASE COMMIT PROTOCOL Robert Benny.B 1, Saravanan.M.C 2 1 PG Scholar, Dhanalakshmi Srinivasan College of Engineering, Coimbatore. 2 Asstistant Professor, Dhanalakshmi
Enhancement of Security in Distributed Data Mining
Enhancement of Security in Distributed Data Mining Sharda Darekar 1, Prof.D.K.Chitre, 2 1,2 Department Of Computer Engineering, Terna Engineering College,Nerul,Navi Mumbai. 1 [email protected],
Hui(Wendy) Wang Stevens Institute of Technology New Jersey, USA. VLDB Cloud Intelligence workshop, 2012
Integrity Verification of Cloud-hosted Data Analytics Computations (Position paper) Hui(Wendy) Wang Stevens Institute of Technology New Jersey, USA 9/4/ 1 Data-Analytics-as-a- Service (DAaS) Outsource:
Multi-table Association Rules Hiding
Multi-table Association Rules Hiding Shyue-Liang Wang 1 and Tzung-Pei Hong 2 1 Department of Information Management 2 Department of Computer Science and Information Engineering National University of Kaohsiung
Performing Data Mining in (SRMS) through Vertical Approach with Association Rules
Performing Data Mining in (SRMS) through Vertical Approach with Association Rules Mr. Ambarish S. Durani 1 and Miss. Rashmi B. Sune 2 MTech (III rd Sem), Vidharbha Institute of Technology, Nagpur, Nagpur
Data Outsourcing based on Secure Association Rule Mining Processes
, pp. 41-48 http://dx.doi.org/10.14257/ijsia.2015.9.3.05 Data Outsourcing based on Secure Association Rule Mining Processes V. Sujatha 1, Debnath Bhattacharyya 2, P. Silpa Chaitanya 3 and Tai-hoon Kim
A Secure Model for Medical Data Sharing
International Journal of Database Theory and Application 45 A Secure Model for Medical Data Sharing Wong Kok Seng 1,1,Myung Ho Kim 1, Rosli Besar 2, Fazly Salleh 2 1 Department of Computer, Soongsil University,
Secure Authentication of Distributed Networks by Single Sign-On Mechanism
Secure Authentication of Distributed Networks by Single Sign-On Mechanism Swati Sinha 1, Prof. Sheerin Zadoo 2 P.G.Student, Department of Computer Application, TOCE, Bangalore, Karnataka, India 1 Asst.Professor,
A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA
A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA U.Pandi Priya 1, R.Padma Priya 2 1 Research Scholar, Department of Computer Science and Information Technology,
15-2394-3696 RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM
RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM Dhanashri Bamane Vinayak Pottigar Subhash Pingale Department of Computer Science and Engineering SKN
SURVEY ON: CLOUD DATA RETRIEVAL FOR MULTIKEYWORD BASED ON DATA MINING TECHNOLOGY
SURVEY ON: CLOUD DATA RETRIEVAL FOR MULTIKEYWORD BASED ON DATA MINING TECHNOLOGY 1 Kavya G, 2 K.S. Rajesh 1 P.G Scholar, Dept. of Computer Science & Engineering RajaRajeswari College of Engineering, Bangalore,
A FRAMEWORK FOR SECURITY IN DATA MINING USING INTELLIGENT AGENTS
A FRAMEWORK FOR SECURITY IN DATA MINING USING INTELLIGENT AGENTS Sharath Kumar J. and Maheswari N. School of Computing Science and Engineering, VIT University Chennai, Vandalur, Kelambakkam Road, Tamil
An Efficient Multi-Keyword Ranked Secure Search On Crypto Drive With Privacy Retaining
An Efficient Multi-Keyword Ranked Secure Search On Crypto Drive With Privacy Retaining 1 B.Sahaya Emelda and 2 Mrs. P. Maria Jesi M.E.,Ph.D., 1 PG Student and 2 Associate Professor, Department of Computer
MINING THE DATA FROM DISTRIBUTED DATABASE USING AN IMPROVED MINING ALGORITHM
MINING THE DATA FROM DISTRIBUTED DATABASE USING AN IMPROVED MINING ALGORITHM J. Arokia Renjit Asst. Professor/ CSE Department, Jeppiaar Engineering College, Chennai, TamilNadu,India 600119. Dr.K.L.Shunmuganathan
International Journal of Advanced Computer Technology (IJACT) ISSN:2319-7900 PRIVACY PRESERVING DATA MINING IN HEALTH CARE APPLICATIONS
PRIVACY PRESERVING DATA MINING IN HEALTH CARE APPLICATIONS First A. Dr. D. Aruna Kumari, Ph.d, ; Second B. Ch.Mounika, Student, Department Of ECM, K L University, [email protected]; Third C.
Enhancing Data Security in Cloud Storage Auditing With Key Abstraction
Enhancing Data Security in Cloud Storage Auditing With Key Abstraction 1 Priyadharshni.A, 2 Geo Jenefer.G 1 Master of engineering in computer science, Ponjesly College of Engineering 2 Assistant Professor,
COMPUSOFT, An international journal of advanced computer technology, 4 (4), April-2015 (Volume-IV, Issue-IV)
ISSN:2320-0790 Secured Data on Cloud Environment by SAPA Protocol with Auto-renewal K. Prashanthi 1, P. Sangamithirai 2, S.Pothumani 3 1,2 B.Tech Student(CSE), Bharath University, Chennai-73. 3, Assistant
SPACK FIREWALL RESTRICTION WITH SECURITY IN CLOUD OVER THE VIRTUAL ENVIRONMENT
SPACK FIREWALL RESTRICTION WITH SECURITY IN CLOUD OVER THE VIRTUAL ENVIRONMENT V. Devi PG Scholar, Department of CSE, Indira Institute of Engineering & Technology, India. J. Chenni Kumaran Associate Professor,
Secure Collaborative Privacy In Cloud Data With Advanced Symmetric Key Block Algorithm
Secure Collaborative Privacy In Cloud Data With Advanced Symmetric Key Block Algorithm Twinkle Graf.F 1, Mrs.Prema.P 2 1 (M.E- CSE, Dhanalakshmi College of Engineering, Chennai, India) 2 (Asst. Professor
EFFECTIVE DATA RECOVERY FOR CONSTRUCTIVE CLOUD PLATFORM
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE EFFECTIVE DATA RECOVERY FOR CONSTRUCTIVE CLOUD PLATFORM Macha Arun 1, B.Ravi Kumar 2 1 M.Tech Student, Dept of CSE, Holy Mary
Security in Outsourcing of Association Rule Mining
Security in Outsourcing of Association Rule Mining W. K. Wong The University of Hong Kong [email protected] David W. Cheung The University of Hong Kong [email protected] Ben Kao The University of Hong
An Efficient Data Correctness Approach over Cloud Architectures
International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 8, Issue 12 (October 2013), PP. 33-37 An Efficient Data Correctness Approach over
Near Sheltered and Loyal storage Space Navigating in Cloud
IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 8 (August. 2013), V2 PP 01-05 Near Sheltered and Loyal storage Space Navigating in Cloud N.Venkata Krishna, M.Venkata
Information Security in Big Data using Encryption and Decryption
International Research Journal of Computer Science (IRJCS) ISSN: 2393-9842 Information Security in Big Data using Encryption and Decryption SHASHANK -PG Student II year MCA S.K.Saravanan, Assistant Professor
SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTING SECURITY ENVIRONMENT
SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTING SECURITY ENVIRONMENT K.karthika 1, M. Daya kanimozhi Rani 2 1 K.karthika, Assistant professor, Department of IT, Adhiyamaan College of Engineering, Hosur
Signature Amortization Technique for Authenticating Delay Sensitive Stream
Signature Amortization Technique for Authenticating Delay Sensitive Stream M Bruntha 1, Dr J. Premalatha Ph.D. 2 1 M.E., 2 Professor, Department of Information Technology, Kongu Engineering College, Perundurai,
Ranked Keyword Search Using RSE over Outsourced Cloud Data
Ranked Keyword Search Using RSE over Outsourced Cloud Data Payal Akriti 1, Ms. Preetha Mary Ann 2, D.Sarvanan 3 1 Final Year MCA, Sathyabama University, Tamilnadu, India 2&3 Assistant Professor, Sathyabama
IMPLEMENTATION OF RESPONSIBLE DATA STORAGE IN CONSISTENT CLOUD ENVIRONMENT
IJRRECS/November 2014/Volume-2/Issue-11/3699-3703 ISSN 2321-5461 INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE IMPLEMENTATION OF RESPONSIBLE DATA STORAGE IN CONSISTENT CLOUD
Secure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment
Secure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment Chih Hung Wang Computer Science and Information Engineering National Chiayi University Chiayi City 60004,
How To Make A Secure Storage On A Mobile Device Secure
Outsourcing with secure accessibility in mobile cloud computing Monika Waghmare 1, Prof T.A.Chavan 2 Department of Information technology, Smt.Kashibai Navale College of Engineering, Pune, India. Abstract
Efficient and Secure Dynamic Auditing Protocol for Integrity Verification In Cloud Storage
Efficient and Secure Dynamic Auditing Protocol for Integrity Verification In Cloud Storage Priyanga.R 1, Maheswari.B 2, Karthik.S 3 PG Scholar, Department of CSE, SNS College of technology, Coimbatore-35,
Finding Frequent Patterns Based On Quantitative Binary Attributes Using FP-Growth Algorithm
R. Sridevi et al Int. Journal of Engineering Research and Applications RESEARCH ARTICLE OPEN ACCESS Finding Frequent Patterns Based On Quantitative Binary Attributes Using FP-Growth Algorithm R. Sridevi,*
Survey on Efficient Information Retrieval for Ranked Query in Cost-Efficient Clouds
Survey on Efficient Information Retrieval for Ranked Query in Cost-Efficient Clouds Ms. Jyotsna T. Kumbhar 1 ME Student, Department of Computer Engineering, TSSM S, P.V.P.I.T., Bavdhan, Pune University,
Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption
Partitioning Data and Domain Integrity Checking for Storage - Improving Cloud Storage Security Using Data Partitioning Technique Santosh Jogade *, Ravi Sharma, Prof. Rajani Kadam Department Of Computer
DELEGATING LOG MANAGEMENT TO THE CLOUD USING SECURE LOGGING
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IJCSMC, Vol. 3, Issue.
International Journal of Engineering Research ISSN: 2348-4039 & Management Technology November-2015 Volume 2, Issue-6
International Journal of Engineering Research ISSN: 2348-4039 & Management Technology Email: [email protected] November-2015 Volume 2, Issue-6 www.ijermt.org Modeling Big Data Characteristics for Discovering
Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks
Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks Prashil S. Waghmare PG student, Sinhgad College of Engineering, Vadgaon, Pune University, Maharashtra, India. [email protected]
Enabling Public Auditing for Secured Data Storage in Cloud Computing
IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 5 (May. 2013), V3 PP 01-05 Enabling Public Auditing for Secured Data Storage in Cloud Computing 1 Er.Amandeep Kaur,
Index Terms: Cloud Computing, Third Party Auditor, Threats In Cloud Computing, Dynamic Encryption.
Secure Privacy-Preserving Cloud Services. Abhaya Ghatkar, Reena Jadhav, Renju Georgekutty, Avriel William, Amita Jajoo DYPCOE, Akurdi, Pune [email protected], [email protected], [email protected],
Keywords: Authentication, Third party audit, cloud storage, cloud service provider, Access control.
Volume 5, Issue 3, March 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Identity Based
Mining various patterns in sequential data in an SQL-like manner *
Mining various patterns in sequential data in an SQL-like manner * Marek Wojciechowski Poznan University of Technology, Institute of Computing Science, ul. Piotrowo 3a, 60-965 Poznan, Poland [email protected]
Secure Multi Authority Cloud Storage Based on CP- ABE and Data Access Control
Secure Multi Authority Cloud Storage Based on CP- ABE and Data Access Control Shivarathri Ravinder M. Tech Student, Dept. of CSE, CMR College of Engineering and Technology, Kandlakoya Village, Medchal
Single Sign-On Secure Authentication Password Mechanism
Single Sign-On Secure Authentication Password Mechanism Deepali M. Devkate, N.D.Kale ME Student, Department of CE, PVPIT, Bavdhan, SavitribaiPhule University Pune, Maharashtra,India. Assistant Professor,
PUBLIC ANALYZING FOR SHARED AND SECURE INFORMATION STORAGE IN CLOUD USING STEGANOGRAPHY
PUBLIC ANALYZING FOR SHARED AND SECURE INFORMATION STORAGE IN CLOUD USING STEGANOGRAPHY G.SHAIK ABDULLAH 1, B.MUTHULAKSHMI 2 1 2 Post Graduate Student, Assistant Professor 1&2 Department of Computer Science
Sustaining Privacy Protection in Personalized Web Search with Temporal Behavior
Sustaining Privacy Protection in Personalized Web Search with Temporal Behavior N.Jagatheshwaran 1 R.Menaka 2 1 Final B.Tech (IT), [email protected], Velalar College of Engineering and Technology,
An Efficiency Keyword Search Scheme to improve user experience for Encrypted Data in Cloud
, pp.246-252 http://dx.doi.org/10.14257/astl.2014.49.45 An Efficiency Keyword Search Scheme to improve user experience for Encrypted Data in Cloud Jiangang Shu ab Xingming Sun ab Lu Zhou ab Jin Wang ab
ADVANCE SECURITY TO CLOUD DATA STORAGE
Journal homepage: www.mjret.in ADVANCE SECURITY TO CLOUD DATA STORAGE ISSN:2348-6953 Yogesh Bhapkar, Mitali Patil, Kishor Kale,Rakesh Gaikwad ISB&M, SOT, Pune, India Abstract: Cloud Computing is the next
SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD
Volume 1, Issue 7, PP:, JAN JUL 2015. SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD B ANNAPURNA 1*, G RAVI 2*, 1. II-M.Tech Student, MRCET 2. Assoc. Prof, Dept.
SECURITY ANALYSIS OF PASSWORD BASED MUTUAL AUTHENTICATION METHOD FOR REMOTE USER
SECURITY ANALYSIS OF PASSWORD BASED MUTUAL AUTHENTICATION METHOD FOR REMOTE USER Mrs. P.Venkateswari Assistant Professor / CSE Erode Sengunthar Engineering College, Thudupathi ABSTRACT Nowadays Communication
ISSN 2278-3091. Index Terms Cloud computing, outsourcing data, cloud storage security, public auditability
Outsourcing and Discovering Storage Inconsistencies in Cloud Through TPA Sumathi Karanam 1, GL Varaprasad 2 Student, Department of CSE, QIS College of Engineering and Technology, Ongole, AndhraPradesh,India
IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD
IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD 1 Ms.Nita R. Mhaske, 2 Prof. S.M.Rokade 1 student, Master of Engineering, Dept. of Computer Engineering Sir Visvesvaraya
Data management using Virtualization in Cloud Computing
Data management using Virtualization in Cloud Computing A.S.R. Krishna Kanth M.Tech (CST), Department of Computer Science & Systems Engineering, Andhra University, India. M.Sitha Ram Research Scholar Department
A Secure Decentralized Access Control Scheme for Data stored in Clouds
A Secure Decentralized Access Control Scheme for Data stored in Clouds Priyanka Palekar 1, Abhijeet Bharate 2, Nisar Anjum 3 1 SKNSITS, University of Pune 2 SKNSITS, University of Pune 3 SKNSITS, University
Third Party Auditing For Secure Data Storage in Cloud through Trusted Third Party Auditor Using RC5
Third Party Auditing For Secure Data Storage in Cloud through Trusted Third Party Auditor Using RC5 Miss. Nupoor M. Yawale 1, Prof. V. B. Gadicha 2 1 Student, M.E. Second year CSE, P R Patil COET, Amravati.INDIA.
Implementation of Role Based Access Control on Encrypted Data in Hybrid Cloud
Implementation of Role Based Access Control on Encrypted Data in Hybrid Cloud Gajanan Ganorkar, Prof. A.B. Deshmukh, Prof M.D.Tambhakhe Information Technology Email:[email protected] Contact: 8600200142
A Comprehensive Data Forwarding Technique under Cloud with Dynamic Notification
Research Journal of Applied Sciences, Engineering and Technology 7(14): 2946-2953, 2014 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2014 Submitted: July 7, 2013 Accepted: August
Capture Resilient ElGamal Signature Protocols
Capture Resilient ElGamal Signature Protocols Hüseyin Acan 1, Kamer Kaya 2,, and Ali Aydın Selçuk 2 1 Bilkent University, Department of Mathematics [email protected] 2 Bilkent University, Department
AN ENHANCED ATTRIBUTE BASED ENCRYPTION WITH MULTI PARTIES ACCESS IN CLOUD AREA
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,
Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis
IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661, ISBN: 2278-8727 Volume 6, Issue 5 (Nov. - Dec. 2012), PP 36-41 Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis
Implementation of P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains
Implementation of P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains P.Satheesh Associate professor Dept of Computer Science and Engineering MVGR college of
Privacy-preserving Analysis Technique for Secure, Cloud-based Big Data Analytics
577 Hitachi Review Vol. 63 (2014),. 9 Featured Articles Privacy-preserving Analysis Technique for Secure, Cloud-based Big Data Analytics Ken Naganuma Masayuki Yoshino, Ph.D. Hisayoshi Sato, Ph.D. Yoshinori
MANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE MANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS Kanchupati Kondaiah 1, B.Sudhakar 2 1 M.Tech Student, Dept of CSE,
Performance Evaluation Panda for Data Storage and Sharing Services in Cloud Computing
Performance Evaluation Panda for Data Storage and Sharing Services in Cloud Computing Gunnala Ajay Kumar M.Tech Student Department of CSE Global Group Of Institutions Batasingaram, Ranga Reddy (Dist),
Associate Prof. Dr. Victor Onomza Waziri
BIG DATA ANALYTICS AND DATA SECURITY IN THE CLOUD VIA FULLY HOMOMORPHIC ENCRYPTION Associate Prof. Dr. Victor Onomza Waziri Department of Cyber Security Science, School of ICT, Federal University of Technology,
Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment
Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment Deepa Noorandevarmath 1, Rameshkumar H.K 2, C M Parameshwarappa 3 1 PG Student, Dept of CS&E, STJIT, Ranebennur. Karnataka, India
Type Ahead Search in Database using SQL
Type Ahead Search in Database using SQL Salunke Shrikant Dadasaheb Dattakala Group of Institutions, Faculty of Engineering University of Pune [email protected] Prof. Bere Sachin Sukhadeo Dattakala
Keywords-- Cloud computing, Encryption, Data integrity, Third Party Auditor (TPA), RC5 Algorithm, privacypreserving,
Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Third Party
Data attribute security and privacy in distributed database system
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 2, Ver. V (Mar-Apr. 2014), PP 27-33 Data attribute security and privacy in distributed database system
Security System in Cloud Computing for Medical Data Usage
, pp.27-31 http://dx.doi.org/10.14257/astl.2013.38.06 Security System in Cloud Computing for Medical Data Usage Maya Louk 1, Hyotaek Lim 2, Hoon Jae Lee 3 1 Department of Ubiquitous IT, Graduate School
EFFICIENT AND SECURE ATTRIBUTE REVOCATION OF DATA IN MULTI-AUTHORITY CLOUD STORAGE
EFFICIENT AND SECURE ATTRIBUTE REVOCATION OF DATA IN MULTI-AUTHORITY CLOUD STORAGE Reshma Mary Abraham and P. Sriramya Computer Science Engineering, Saveetha University, Chennai, India E-Mail: [email protected]
AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION K.Anusha 1, K.Sudha 2 1 M.Tech Student, Dept of CSE, Aurora's Technological
Distributed file system in cloud based on load rebalancing algorithm
Distributed file system in cloud based on load rebalancing algorithm B.Mamatha(M.Tech) Computer Science & Engineering [email protected] K Sandeep(M.Tech) Assistant Professor PRRM Engineering College
PRIVACY ASSURED IMAGE STACK MANAGEMENT SERVICE IN CLOUD
PRIVACY ASSURED IMAGE STACK MANAGEMENT SERVICE IN CLOUD Ms. Shubhangi Edake 1, Prof. Sunil Rathod 2 1 PG Student, Computer Engineering, Dr.D.Y.Patil School of Engineering, Lohgaon,Pune,India 2 Assistant
Preserving Data Integrity and Public Auditing for Data Storage in Cloud Computing
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume - 3 Issue - 8 August, 2014 Page No. 7829-7833 Preserving Data Integrity and Public Auditing for Data Storage
ACL Based Dynamic Network Reachability in Cross Domain
South Asian Journal of Engineering and Technology Vol.2, No.15 (2016) 68 72 ISSN No: 2454-9614 ACL Based Dynamic Network Reachability in Cross Domain P. Nandhini a, K. Sankar a* a) Department Of Computer
