Privacy-Preserving Mining of Association Rules On Cloud by improving Rob Frugal Algorithm
|
|
|
- Kelly Mathews
- 10 years ago
- Views:
Transcription
1 Privacy-Preserving Mining of Association Rules On Cloud by improving Rob Frugal Algorithm Mr.Vishal R. Redekar Department of Computer Engineering Smt.Kashibai Navale College of Engineering Pune , India Dr.Kishor N. Honwadkar Department of Computer Engineering Smt.Kashibai Navale College of Engineering Pune , India Abstract Cloud computing uses the ideal model of information mining-as-a service, Utilizing these it seems to be an obvious choice for companies saving on the cost of contributing to secure, manage and keep up an IT infrastructure. An organization/store lacking in mining ability can outsource its mining needs to service provider on a cloud server. However, both the association rules and item-set of the outsourced database are viewed as private property of the organization. The data owner encrypts the data and sends to the server to preserve the corporate privacy. Client sends mining queries to server, and then server conducts data mining and sends encrypted pattern to the client. To get true pattern client decrypts encrypted pattern. In this paper, we consider the issue of outsourcing the association rule mining task within a corporate privacypreserving system. Thus Privacy Preserving Data Mining is a examination area concerned with the security determined from personally identifiable information when considered for data mining. The Rob Frugal encryption strategy is introduced to overcome the security vulnerabilities of outsourced information, which is focused on one to one substitution ciphers for items and including fake patterns for database. However, it contains a various fake patterns which increase the capacity overhead. To overcome this issue, the proposed procedure includes addition of weighted support in original support of items so as to reduce the number of fake patterns and to enhance the security level for outsourced information with less complexity. The fake transaction table data is converted into matrix format to reduce the storage overhead. Also the guessing attack and man in the middle attack are possible on basic Rob frugal algorithm. To overcome these attack we utilize Elliptic Curve Diffie Hellman key exchange algorithm after Rob frugal encryption scheme in order to provide privacy preserving outsourced mining. In our proposed work we improved the security as item and item-set based attack are not possible on the system; also we reduce the processing time. Keywords: - Cloud Computing, Association rule mining, Privacy-preserving outsourcing, Elliptic Curve Diffie Hellman, Rob Frugal. I. INTRODUCTION Cloud computing is computing in which large groups of remote servers are networked to allow centralized data storage and online access to computer services or resources. With the arrival of cloud computing and its model for IT services based on the web and big data centers, the outsourcing of data and computing services is acquiring a novel relevance, which is certainly required to skyrocket in the near future. In business, outsourcing involves the contracting out of a business process to another party. Outsourcing aims to provide a service in a corporate privacy preserving framework. Privacy protection is the main issue in data mining. Organizations, generally, do not want to share their own private data with other companies. The idea is that data is published by Client for the benefit of allowing analysts to mine encrypted patterns from the encrypted database. As an illustration, the transactional database from different organizations can be transported to an outsider which gives mining services. The organization management would prefer not to utilize an in-house group of data mining specialists. Additionally, periodically data is sent to the server or service provider who is in charge of maintaining the encrypted data and conducting mining on it in response to requests from company analysts of the company management. The data owner is a client and the server is referred to as the service provider. One of the primary issues with this standard is that the server has entry to valuable information of the owner and may uncover sensitive information from the data. For example, by looking at the transaction database, the server can derive or uncover which products or items are co-purchased and thus, the mined encrypted patterns that describe the organization customers details. In this paper, we study the issue of outsourcing the association rule mining task inside a corporate security preserving structure [7]. Therefore, Privacy Preserving Data Mining is an exploration area concerned with the security determined from actually identifiable data when considered for data mining. In this context, both the sale transaction database and the mined encrypted patterns and all the details of the company that can be extracted from the data are the property of the company management and should remain safe from the server and any other attacker. In reality the knowledge mined from the data can be used from the company management in important marketing decisions to improve their services. A company or data owner wants their data to be secret but a company does not have sufficient mining expertise for data mining, for this we make the following , IJIRIS- All Rights Reserved Page -31
2 contributions. We develop an encryption scheme, called Improved RobFrugal in that the Encrypt/Decrypt module can employ to transform client data before it is shipped to the server. Second, to allow the E/D module to recover the true patterns and their correct support, we propose that it creates and keeps a compact structure, called synopsis. Third, we introduce addition of weighted support in original support of items and matrix formation of fake transaction to reduce the storage overhead. Fourth In order to provide privacy preserving outsourced mining, we utilize Elliptic Curve Diffie Hellman (ECDH) key exchange algorithm after Improve Rob Frugal encryption scheme. With use of ECDH algorithm guessing attack and man in the middle attack are not possible on our proposed system. Fifth, for better performance Enhance FP-Growth algorithm is used instead of Apriori algorithm [13] for association rule generation. At last, we direct test investigation of our pattern utilizing a large real dataset, our results demonstrate that our encryption schema is effective, scalable, and attain to the desired level of security. Literature Survey is described in the next section. Section III presents the Implementation Details; it includes Encryption Decryption module details, ECDH algorithm and Enhance FP-Growth algorithm. In Section IV, Experimental analysis and Result are discussed. Section V concludes the paper. A. Substitution cipher techniques: II. LITERATURE SURVEY W. K. Wong et al. [1] proposed substitution cipher techniques in the encryption of transactional data for outsourcing association rule mining. After recognizing the non-trivial dangers to the clear one-to-one item mapping substitution cipher, we propose a more secure encryption plan based on a one-to-n item mapping that transforms transactions non deterministically, yet guarantees correct decryption. They develop an effective and efficient encryption algorithm dependant on this method. B. Data Perturbation: There are two approaches that can protect sensitive information. Is to an encryption function that transforms the original data to a completely new format [4] [2]. The second could be to apply data perturbation, which modifies the original raw data randomly [3]. The perturbation approach is less attractive since it could only provide approximate results; nevertheless, the employment of encryption allows the same rules that they are recovered. C. k-support anonymity The background knowledge such as the supports of frequent item sets can be utilized to obtain privacy information in the outsourcing of frequent item set mining. In this paper [5], C. Tai, P. Yu proposed k-support anonymity to provide protection against a knowledgeable attacker with exact support information. To achieve k-support anonymity, they introduce a pseudo taxonomy tree and have the third party mine the generalized frequent item sets instead. The construct of the pseudo taxonomy tree facilitates hiding of the original items and limits the fake items introduced in the encrypted database. The experimental results showed that the methods of k-support anonymity achieve very good privacy insurance with moderate storage overhead. D. Corporate privacy preserving mining In this paper [6], F. Giannotti, A. Monreale studied the problem of privacy preserving mining of frequent patterns on an encrypted outsourced transaction database. We accept a progressive model where the adversary knows the domain of items and their exact frequency and can utilize this learning to identify cipher items and cipher item sets. We proposed an encryption scheme, called Rob Frugal that is based on 1-1 substitution ciphers for items and adding fake transactions to make each cipher item share the same frequency. It uses the compact synopsis of the fake transactions from which the true support of mined patterns from the server can be efficiently recovered. E. Association rule mining by Evmievski Evmievski et al. [8] proposed an approach, for conducting the privacy preserving association rule mining. Kargupta et al. [9] proposed a method based on random matrix spectral filtering to recover original data from the perturbed data. Huang et al. [10] proposed further, the two data reconstruction methods, first PCA-DR and second, MLE-DR. F. Randomized Response The first person to propose the Randomized Response (RR) was Warner [14].The RR scheme was initially developed in the statistics community. It used to collect the information from individuals such that, the survey interviewers and the data processors do not know which of the two alternative questions are respondent have answered. In data mining, the method of randomization is a simple technique, can be very easily applied at data collection time. It was a useful technique for hiding individual data in privacy reserving data mining. The randomization method is more efficient [11]. Though, it results in high information loss. The literature on Privacy-Preserving Mining of Association rules can be classified into Pattern mining task, privacy model, and finally Encryption/Decryption scheme , IJIRIS- All Rights Reserved Page -32
3 III. IMPLEMENTATION DETAILS In this paper, we propose improve security of Mining of Association Rules from Outsourced Transaction Databases using improved RobFrugal. We use Elliptic Curve Diffie Hellman (ECDH) after rob frugal encryption scheme. We further use Enhance FP-Growth algorithm, to generate association rules. The details of our improve schemes are presented, it includes following algorithms: Improved RobFrugal algorithm, ECDH algorithm, Enhance FP-Growth Algorithm. The System architecture behind our model is shown in Figure 1. The client/owner encrypts its data using encrypt / decrypt (E/D) module. A. Encryption: Figure 1.System Architecture The section represents the concept of encryption scheme it uses 1-1 substitution cipher method which transformed original transaction database D into its encrypted version D *. To improve the security fake transaction are added with encrypted database. The weight addition method was used for constructing fake transaction to be combined with encrypted database. Table 1(a) shows original transaction while Table 1(b) shows transaction after one to one substitution (encrypted) Table1 (a): TDB Table1 (b): TDB* TDB Soda Nuts Soda Milk Milk Soda Nuts Milk Soda Dates Nuts Soda Soda Egg Nuts Cake Cake TDB* e6 e5 e6 e4 e4 e6 e5 e4 e6 e2 e5 e6 e6 e3 e5 e1 e1 B. Fake Transaction Construction: The fake transaction was constructed based on the adding noise value to the original transaction database. Step 1: Weighted support construction- This approach was started with calculation of support of the items. Support count is the number of time the items occurred in the original transaction database. The weight value was generated randomly. The weights for every item were automated in irregular order. The weighted support was figured by adding the support of the item and the weight of the corresponding item shown in Table 2(a) and finally based on the weighted support the items has been arranged in descending order according to frugal grouping shown in Table 2(b). Step 2: k-grouping method- Given the items weighted support table, a few strategies were followed to group the items into groups of size k. We started from a basic grouping method. We assumed the item weighted support table was sorted in descending order of weighted support , IJIRIS- All Rights Reserved Page -33
4 Table 2(a): Addition of Weighted Support Item Support Weight Weighted support e e e e e e Table 2(b): Descending order of items based on their weighted item support Item Weighted Support e6 7 e4 6 e3 4 e1 3 e3 3 e2 2 Assume e1, e2,en is the list of cipher items as shown in table 2[b] in descending order of weighted support (with respect to D), the groups created are as {e1,..., ek-1}, {ek+1,..., en}. Based on the user specified threshold value the groups can be created. Table 3: Noise table construction Item Weighted Support Noise value Item Weighted support Noise value e6 7 0 e5 3 0 e5 6 1 e3 3 0 e4 4 3 e1 2 1 For example, consider Table3 the client specified threshold value is 4. The weighted support of the items which are more than or equivalent to 4 are considered as regular items and it can be assembled into one group. The weighted support of the items which is less than the specified threshold are considered as non frequent items and it can be grouped into alternate group. Step 3: Noise table construction- The yield of gathering apportioning technique can be spoken to as the clamor table. It extends the thing weighted help table with an additional segment "Commotion quality" speaking to, for each one figure thing e, the distinction among the weighted backing of the most successive figure thing in e's gathering and the weighted backing of e itself, as reported in the thing weighted help table. We indicate the commotion estimation of a figure thing e as N (e). Proceeding with the sample, the clamor table acquired with gathering allotment technique is accounted for in Table3. The commotion worth speaks to the apparatus for creating the fake exchanges to be included with encoded database. The output of group partitioning technique can be represented as the noise table. It expands the item weighted support table with an additional column Noise value representing, for each one cipher item e, the difference among the weighted support of the most successive cipher item in e s gathering and the weighted support of e itself, as reported in the item weighted support table. We indicate the noise value of a cipher item e as N (e). Proceeding with the example, the noise table obtained with k- grouping method is shown in Table3. The noise value represents the tool for generating the fake transactions to be added with encrypted database. Step 4: Fake transaction construction- Given a noise table specifying the noise N (e) needed for every cipher item e, we make the fake transactions as follows. First, we leave the rows with zero noise, connected with the most frequent items of every group or to other items with the weighted support equal to the maximum weighted support of a group. Second, we organize the remaining rows in descending order of noise value. The accompanying two fake transactions are produced: 1 instance of the transaction {e4}, 1 instance of the transaction {e4, e3, e1}. Finally, the following 3 fake transactions are produced: 1 instances of the transaction {e4}, 1 instance of the transaction {e4, e5}, and 1 instance of the transaction {e4, e2}. So, adding longer fake transactions technically does not form privacy protection. However, for added protection, we can decrease the lengths of the added fake transactions so that they are in line with the transaction lengths in transaction database D , IJIRIS- All Rights Reserved Page -34
5 Step 5: Matrix formation- The observation creates a compact diagram for the client of the constructed fake transactions. The reason for utilizing a compact outline is to decrease the storage overhead at the side of the data owner/client who may not be provided with sufficient computational resources, mining expertise, and capacity, which is common in the outsourcing data model framework. With a specific end goal to execute the outline efficiently, we use a matrix formation demonstrated in Table 4. Table 4: Matrix format Item e2 e4 e5 e e e C. Decryption When the client has requested the execution of a data mining query to the server, mentioning a user specified threshold value σ, the server responded the encrypted frequent patterns from encrypted database. Clearly, for every itemset S and its associated cipher itemset E, we have that wsupd(s) wsupd* (E). For each cipher pattern E returned by the server together with wsupd*(e), the E/D module obtained the corresponding plain pattern S. It required recreating the accurate support of S in D. To accomplish this objective, the E/D module adjusted the weighted support of E by removing the effect of the fake transactions. supd(s) = wsupd*(e) wsupd*\d(e). Note that after the data owner/client outsourced the encrypted database (including the fake transactions), there was not expected to preserve the fake transactions in its own storage. Instead the compact outline was maintained by the client side, which put away all the data needed on the fake transactions, for recovery of real support of item sets. The size of the outline was straight in the quantity of items and was much smaller than that of the fake transaction. D. Algorithm For securing shared secret between two devices A and B ( ECDH - Elliptic curve Diffie-Hellman )[14]: 1. Let da and db be the private key of device A and B respectively, Private keys are irregular number less than n, where n be the domain parameter. 2. Let QA = da*g and QB = db*g be the public key of device A and B individually, where G is a domain parameter 3. A and B exchanged their public keys 4. The end A computes K = (xk, yk) = da*qb 5. The end B computes L = (xl, yl) = db*qa 6. Since K=L, shared secret is chosen as xk To demonstrate the agreed shared secret K and L at both devices A and B are the same From 2, 4 and 5 K = da*qb = da*(db*g) = (db*da)*g = db*(da*g) = db*qa = L Hence K = L, therefore xk = xl Since it is practically impossible to find the private key da or db from the public key QA or QB, it is not possible to obtain the shared secret for a third party. E. Algorithm ( Enhance FP-Growth ): FP-Growth methodology is based on divide and conquers strategy for creating the frequent item sets. FP-growth is basically utilized for mining frequent item sets without candidate generation. Significant steps in FP -growth is- Step1- It firstly compresses the database indicating frequent item set into FP-tree. FP-tree is built utilizing 2 passes over the dataset. Step2: It partitions the FP-tree into a set of conditional database and mines every database independently, thus extract frequent item sets from FP-tree straightforwardly. It comprise of one root labeled as invalid, a set of item prefix sub trees as the offspring of the root, and a frequent item header table. Every node in the item prefix sub tree comprises of three fields: item-name, count and node link where the item-name registers which item the node represents; count registers the number of transactions represented by the portion of path reaching this node, node link links to the next node in the FP- tree. Every item in the header table comprises of two fields---item name and head of node connection, which indicates the first node in the FP-tree carrying the item name , IJIRIS- All Rights Reserved Page -35
6 Input: Built FP-tree Output: complete set of frequent patterns Method: Call FP-growth (FP-tree, null). Procedure FP-growth (Tree, α) { 1) If the event that Tree contains a single path P then 2) For every combination do generate pattern β U α with support = minimum support of nodes in β. 3) Else For every header ai in the header of Tree do { 4) Generate pattern β = ai U α with support = ai.support; 5) Construct β.s restrictive example base and after that β.s conditional FP-tree Tree β 6) If Tree β = null 7) Then call FP-growth (Tree β, β)} } F. Mathematical Model Mathematical Model(I) Let S be the system such that, S=fIS,FS,X,Y,IT,TD,,DD,ND,ST,SMEM,CPUCT,ESg Where, Let IT = fi1, i2, i3...ing be the set of items. Let TD = ft1, t2, t3... tmg be the set of transaction database. Each transaction (TID) in TD has a unique transaction ID and contains a subset of the items in IT. TID 1 = fsoda Nutsg TID 2 = fsoda Milkg TID 3 = fmilk Sodag TID 4 = fnuts Milkg TID 5 = fsoda Datesg TID 6 = fnuts Sodag TID 7 = fsoda Eggg TID 8 = fnuts Cakeg TID 9 = fcakeg Where, I = fsoda, Nuts, Milk, Dates, Egg, Cakeg IS=Be the Initial State which provides list of transactions. FS=Be the Final State Which gives the Rules. X=Set Of Inputs (Transactions) Y=Set of Output (Association Rules) DD=Deterministic Data, it helps identifying the load-store function or assignment function. ND=Non Deterministic Data of the system to be solved. ST= Set Of Transactions. SMEM= Memory required to process all these operations, CPUCT= more the number of count double the speed and performance. ES = Null value. The support supp(x) of an Itemset X is defined as the proportion of transactions in the data set which contain the Itemset. For ex, the Itemset = Soda Nuts has a support of 2/9= 0.2 The confidence of a rule is defined conf(x ) Y) = supp(x U Y) / supp(x) Supp(X U Y) =0.2, where X and Y are Soda and Nuts respectively. Supp(X) =6/9=0.6 Conf(X ) Y) =supp(x U Y) / supp(x) =0.2/0.6 = 0.33= 33% Mathematical Model(II) , IJIRIS- All Rights Reserved Page -36
7 IV. RESULT AND DISCUSSION In this section, we compare the performance between Enhance FP-Growth, and Apriori Algorithm. Graphs show the execution time of implementations over the various instances.figure 2 shows the comparison graph between Apriori algorithm and Enhance FP-Growth algorithm based on Table 5. Table 5. Time required to rules for different instances in the data set. Number of Instances Apriori (time in ms) Enhance FP growth (time in ms) Figure 2. Comparison between Enhance FP-Growth and Apriori The comparison between improved robs frugal and Rob frugal algorithm was shown in the figure 3. Table 6.Average Accuracy of a Query Result Number of Improved Rob frugal transaction RobFrugal Figure 3. Comparison between Enhance FP-Growth and Apriori , IJIRIS- All Rights Reserved Page -37
8 V. CONCLUSION AND FUTURE WORK We studied the problem of privacy-preserving mining of frequent patterns from which association rules can easily be computed on an encrypted outsourced Transitional database. We assumed that a conservative model where the adversary knows the domain of items and their exact frequency and can use this knowledge to identify cipher items and cipher item sets. We proposed an encryption plan; called improved Rob Frugal That is based on adding weighted support in original item support transactions to reduce the fake transaction table data also the matrix is generated to reduce the storage overhead. We also proposed Elliptic Curve Diffie Hellman key exchange algorithm after Rob frugal encryption scheme to overcome the guessing attack and man in the middle attack. Unlike previous works, we formally proved that our method is robust against an adversarial attack based on the original items and their exact support. In future the Privacy-preserving tools for individuals and incorporating privacy protection in engineering process can be generated. 1) Privacy-preserving tools for individuals: The privacy preserving techniques in research is proposed only for information holders; however individual record owners should additionally have the rights and obligations to ensure their own particular private information. 2) Incorporating security assurance in engineering process: The privacy issue should be considered as a essential necessity in the engineering process of creating new technology. This includes formal detail of protection prerequisites and formal confirmation devices to demonstrate the rightness of a privacy-preserving framework. REFERENCES [1] W. K. Wong, D. W. Cheung, E. Hung, B. Kao, and N. Mamoulis, Security in outsourcing of association rule mining, in Proc. Int. Conf. Very Large Data Bases, 2007, pp [2] G. I. Davida, D. L. Wells, and J. B. Kam. A database encryption system with sub keys. ACM TODS, 6(2): , [3] J. He and M. Wang. Cryptography and relational database management systems. In IDEAS, [4] B. Iyer, S. Mehrotra, E. Mykletun, G. Tsudik, and Y. Wu. A framework for efficient storage security in RDBMS. In EDBT, [5] C. Tai, P. S. Yu, and M. Chen, K-support anonymity based on pseudo taxonomy for outsourcing of frequent item set mining, in Proc. Int. Knowledge Discovery Data Mining, 2010, pp [6] F. Giannotti, L. V. Lakshmanan, A. Monreale, D. Pedreschi, and H.Wang, Privacy preserving data mining from outsourced databases, in Proc. SPCC2010 Conjunction with CPDP, 2010, pp [7] M. Kantarcioglu and C. Clifton, Privacy-preserving distributed mining of association rules on horizontally partitioned data, IEEE Trans. Knowledge Data Eng., vol. 16, no. 9, pp , Sep [8] S. J. Rizvi and J. R. Haritsa, Maintaining data privacy in association rule mining, in Proc. Int. Conf. Very Large Data Bases, [9] A. Evfimievski, R. Srikant, R. Agrawal, J. Gehrke, Privacy Preserving Mining of Association Rules, Information System, [10] H. Kargupta, S. Datta, Q. Wang, K. Sivakumar, On the Privacy Preserving Properties of Random Data Perturbation Techniques, In Proceedings of the 3rd International Conference on Data Mining, [11] Z. Huang, W. Du, B. Chen, Deriving Private Information from Randomized Data, In Proceedings of the ACM SIGMOD Conference on Management of Data, [12] S. L. Warner, Randomized Response: A Survey Technique for Eliminating Evasive Answer Bias, J. Am. Stat. Assoc., [13] A. Evfimievski, R. Srikant, R. Agrawal, J. Gehrk, Privacy Preserving Mining of Association Rules, In Proceedings the 8th ACM SIGKDD International Conference on Knowledge Discovery in Databases and Data Mining, [14] Ram Ratan Ahirwal, Manoj Ahke Samrat Ashok, Elliptic Curve Diffie- Hellman Key Exchange Algorithm for Securing Hypertext Information on Wide Area Network et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 4 (2), 2013, , IJIRIS- All Rights Reserved Page -38
Privacy-Preserving in Outsourced Transaction Databases from Association Rules Mining
Privacy-Preserving in Outsourced Transaction Databases from Association Rules Mining Ms. Deokate Pallavi B., Prof. M.M. Waghmare 2 Student of ME (Information Technology), DGOFFE, University of Pune, Pune
Homomorphic Encryption Schema for Privacy Preserving Mining of Association Rules
Homomorphic Encryption Schema for Privacy Preserving Mining of Association Rules M.Sangeetha 1, P. Anishprabu 2, S. Shanmathi 3 Department of Computer Science and Engineering SriGuru Institute of Technology
International Journal of Scientific & Engineering Research, Volume 4, Issue 10, October-2013 ISSN 2229-5518 1582
1582 AN EFFICIENT CRYPTOGRAPHIC APPROACH FOR PRESERVING PRIVACY IN DATA MINING T.Sujitha 1, V.Saravanakumar 2, C.Saravanabhavan 3 1. M.E. Student, [email protected] 2. Assistant Professor, [email protected]
A Novel Technique of Privacy Protection. Mining of Association Rules from Outsourced. Transaction Databases
A Novel Technique of Privacy Protection Mining of Association Rules from Outsource Transaction Databases 1 Dhananjay D. Wadkar, 2 Santosh N. Shelke 1 Computer Engineering, Sinhgad Academy of Engineering
PRIVACY PRESERVING ASSOCIATION RULE MINING
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 10, October 2014,
Hui(Wendy) Wang Stevens Institute of Technology New Jersey, USA. VLDB Cloud Intelligence workshop, 2012
Integrity Verification of Cloud-hosted Data Analytics Computations (Position paper) Hui(Wendy) Wang Stevens Institute of Technology New Jersey, USA 9/4/ 1 Data-Analytics-as-a- Service (DAaS) Outsource:
Multi-table Association Rules Hiding
Multi-table Association Rules Hiding Shyue-Liang Wang 1 and Tzung-Pei Hong 2 1 Department of Information Management 2 Department of Computer Science and Information Engineering National University of Kaohsiung
IMPROVED BYZANTINE FAULT TOLERANCE TWO PHASE COMMIT PROTOCOL
IMPROVED BYZANTINE FAULT TOLERANCE TWO PHASE COMMIT PROTOCOL Robert Benny.B 1, Saravanan.M.C 2 1 PG Scholar, Dhanalakshmi Srinivasan College of Engineering, Coimbatore. 2 Asstistant Professor, Dhanalakshmi
International Journal of Advanced Computer Technology (IJACT) ISSN:2319-7900 PRIVACY PRESERVING DATA MINING IN HEALTH CARE APPLICATIONS
PRIVACY PRESERVING DATA MINING IN HEALTH CARE APPLICATIONS First A. Dr. D. Aruna Kumari, Ph.d, ; Second B. Ch.Mounika, Student, Department Of ECM, K L University, [email protected]; Third C.
Finding Frequent Patterns Based On Quantitative Binary Attributes Using FP-Growth Algorithm
R. Sridevi et al Int. Journal of Engineering Research and Applications RESEARCH ARTICLE OPEN ACCESS Finding Frequent Patterns Based On Quantitative Binary Attributes Using FP-Growth Algorithm R. Sridevi,*
Performing Data Mining in (SRMS) through Vertical Approach with Association Rules
Performing Data Mining in (SRMS) through Vertical Approach with Association Rules Mr. Ambarish S. Durani 1 and Miss. Rashmi B. Sune 2 MTech (III rd Sem), Vidharbha Institute of Technology, Nagpur, Nagpur
Data Outsourcing based on Secure Association Rule Mining Processes
, pp. 41-48 http://dx.doi.org/10.14257/ijsia.2015.9.3.05 Data Outsourcing based on Secure Association Rule Mining Processes V. Sujatha 1, Debnath Bhattacharyya 2, P. Silpa Chaitanya 3 and Tai-hoon Kim
Security in Outsourcing of Association Rule Mining
Security in Outsourcing of Association Rule Mining W. K. Wong The University of Hong Kong [email protected] David W. Cheung The University of Hong Kong [email protected] Ben Kao The University of Hong
Enhancement of Security in Distributed Data Mining
Enhancement of Security in Distributed Data Mining Sharda Darekar 1, Prof.D.K.Chitre, 2 1,2 Department Of Computer Engineering, Terna Engineering College,Nerul,Navi Mumbai. 1 [email protected],
Knowledge Based Context Awareness Network Security For Wireless Networks
Knowledge Based Context Awareness Network Security For Wireless Networks Deepa U. Mishra Department of Computer Engineering Smt. Kashibai Navale College of Engineering Pune, India Abstract - Context awareness
MINING THE DATA FROM DISTRIBUTED DATABASE USING AN IMPROVED MINING ALGORITHM
MINING THE DATA FROM DISTRIBUTED DATABASE USING AN IMPROVED MINING ALGORITHM J. Arokia Renjit Asst. Professor/ CSE Department, Jeppiaar Engineering College, Chennai, TamilNadu,India 600119. Dr.K.L.Shunmuganathan
A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA
A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA U.Pandi Priya 1, R.Padma Priya 2 1 Research Scholar, Department of Computer Science and Information Technology,
A Secure Model for Medical Data Sharing
International Journal of Database Theory and Application 45 A Secure Model for Medical Data Sharing Wong Kok Seng 1,1,Myung Ho Kim 1, Rosli Besar 2, Fazly Salleh 2 1 Department of Computer, Soongsil University,
Comparison of Data Mining Techniques for Money Laundering Detection System
Comparison of Data Mining Techniques for Money Laundering Detection System Rafał Dreżewski, Grzegorz Dziuban, Łukasz Hernik, Michał Pączek AGH University of Science and Technology, Department of Computer
131-1. Adding New Level in KDD to Make the Web Usage Mining More Efficient. Abstract. 1. Introduction [1]. 1/10
1/10 131-1 Adding New Level in KDD to Make the Web Usage Mining More Efficient Mohammad Ala a AL_Hamami PHD Student, Lecturer m_ah_1@yahoocom Soukaena Hassan Hashem PHD Student, Lecturer soukaena_hassan@yahoocom
Privacy-preserving Analysis Technique for Secure, Cloud-based Big Data Analytics
577 Hitachi Review Vol. 63 (2014),. 9 Featured Articles Privacy-preserving Analysis Technique for Secure, Cloud-based Big Data Analytics Ken Naganuma Masayuki Yoshino, Ph.D. Hisayoshi Sato, Ph.D. Yoshinori
MUTI-KEYWORD SEARCH WITH PRESERVING PRIVACY OVER ENCRYPTED DATA IN THE CLOUD
MUTI-KEYWORD SEARCH WITH PRESERVING PRIVACY OVER ENCRYPTED DATA IN THE CLOUD A.Shanthi 1, M. Purushotham Reddy 2, G.Rama Subba Reddy 3 1 M.tech Scholar (CSE), 2 Asst.professor, Dept. of CSE, Vignana Bharathi
An Efficient Frequent Item Mining using Various Hybrid Data Mining Techniques in Super Market Dataset
An Efficient Frequent Item Mining using Various Hybrid Data Mining Techniques in Super Market Dataset P.Abinaya 1, Dr. (Mrs) D.Suganyadevi 2 M.Phil. Scholar 1, Department of Computer Science,STC,Pollachi
Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption
Partitioning Data and Domain Integrity Checking for Storage - Improving Cloud Storage Security Using Data Partitioning Technique Santosh Jogade *, Ravi Sharma, Prof. Rajani Kadam Department Of Computer
Association Rule Mining
Association Rule Mining Association Rules and Frequent Patterns Frequent Pattern Mining Algorithms Apriori FP-growth Correlation Analysis Constraint-based Mining Using Frequent Patterns for Classification
Horizontal Aggregations In SQL To Generate Data Sets For Data Mining Analysis In An Optimized Manner
24 Horizontal Aggregations In SQL To Generate Data Sets For Data Mining Analysis In An Optimized Manner Rekha S. Nyaykhor M. Tech, Dept. Of CSE, Priyadarshini Bhagwati College of Engineering, Nagpur, India
A Comprehensive Data Forwarding Technique under Cloud with Dynamic Notification
Research Journal of Applied Sciences, Engineering and Technology 7(14): 2946-2953, 2014 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2014 Submitted: July 7, 2013 Accepted: August
Binary Coded Web Access Pattern Tree in Education Domain
Binary Coded Web Access Pattern Tree in Education Domain C. Gomathi P.G. Department of Computer Science Kongu Arts and Science College Erode-638-107, Tamil Nadu, India E-mail: [email protected] M. Moorthi
EFFECTIVE DATA RECOVERY FOR CONSTRUCTIVE CLOUD PLATFORM
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE EFFECTIVE DATA RECOVERY FOR CONSTRUCTIVE CLOUD PLATFORM Macha Arun 1, B.Ravi Kumar 2 1 M.Tech Student, Dept of CSE, Holy Mary
An Efficient Data Security in Cloud Computing Using the RSA Encryption Process Algorithm
An Efficient Data Security in Cloud Computing Using the RSA Encryption Process Algorithm V.Masthanamma 1,G.Lakshmi Preya 2 UG Scholar, Department of Information Technology, Saveetha School of Engineering
An Efficient Multi-Keyword Ranked Secure Search On Crypto Drive With Privacy Retaining
An Efficient Multi-Keyword Ranked Secure Search On Crypto Drive With Privacy Retaining 1 B.Sahaya Emelda and 2 Mrs. P. Maria Jesi M.E.,Ph.D., 1 PG Student and 2 Associate Professor, Department of Computer
How To Create A Privacy Preserving And Dynamic Load Balancing System In A Distributed System
Enforcing Secure and Privacy-Preserving Information Brokering with Dynamic Load Balancing in Distributed Information Sharing. 1 M.E. Computer Engineering Department GHRCEM, Wagholi, Pune. [email protected]
Static Data Mining Algorithm with Progressive Approach for Mining Knowledge
Global Journal of Business Management and Information Technology. Volume 1, Number 2 (2011), pp. 85-93 Research India Publications http://www.ripublication.com Static Data Mining Algorithm with Progressive
A hybrid algorithm combining weighted and hasht apriori algorithms in Map Reduce model using Eucalyptus cloud platform
A hybrid algorithm combining weighted and hasht apriori algorithms in Map Reduce model using Eucalyptus cloud platform 1 R. SUMITHRA, 2 SUJNI PAUL AND 3 D. PONMARY PUSHPA LATHA 1 School of Computer Science,
Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis
IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661, ISBN: 2278-8727 Volume 6, Issue 5 (Nov. - Dec. 2012), PP 36-41 Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis
Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks
Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks Prashil S. Waghmare PG student, Sinhgad College of Engineering, Vadgaon, Pune University, Maharashtra, India. [email protected]
Privacy-Preserving Outsourcing Support Vector Machines with Random Transformation
Privacy-Preserving Outsourcing Support Vector Machines with Random Transformation Keng-Pei Lin Ming-Syan Chen Department of Electrical Engineering, National Taiwan University, Taipei, Taiwan Research Center
Selection of Optimal Discount of Retail Assortments with Data Mining Approach
Available online at www.interscience.in Selection of Optimal Discount of Retail Assortments with Data Mining Approach Padmalatha Eddla, Ravinder Reddy, Mamatha Computer Science Department,CBIT, Gandipet,Hyderabad,A.P,India.
K-NN CLASSIFICATION OVER SECURE ENCRYPTED RELATIONAL DATA IN OUTSOURCED ENVIRONMENT
Journal homepage: www.mjret.in K-NN CLASSIFICATION OVER SECURE ENCRYPTED RELATIONAL DATA IN OUTSOURCED ENVIRONMENT Akshay Dabi, Arslan Shaikh, Pranay Bamane, Vivek Thorat, Prof.Popat Borse. Computer Engineering.
Building A Smart Academic Advising System Using Association Rule Mining
Building A Smart Academic Advising System Using Association Rule Mining Raed Shatnawi +962795285056 [email protected] Qutaibah Althebyan +962796536277 [email protected] Baraq Ghalib & Mohammed
The basic data mining algorithms introduced may be enhanced in a number of ways.
DATA MINING TECHNOLOGIES AND IMPLEMENTATIONS The basic data mining algorithms introduced may be enhanced in a number of ways. Data mining algorithms have traditionally assumed data is memory resident,
MAXIMAL FREQUENT ITEMSET GENERATION USING SEGMENTATION APPROACH
MAXIMAL FREQUENT ITEMSET GENERATION USING SEGMENTATION APPROACH M.Rajalakshmi 1, Dr.T.Purusothaman 2, Dr.R.Nedunchezhian 3 1 Assistant Professor (SG), Coimbatore Institute of Technology, India, [email protected]
Information Security in Big Data using Encryption and Decryption
International Research Journal of Computer Science (IRJCS) ISSN: 2393-9842 Information Security in Big Data using Encryption and Decryption SHASHANK -PG Student II year MCA S.K.Saravanan, Assistant Professor
IMPLEMENTATION OF RESPONSIBLE DATA STORAGE IN CONSISTENT CLOUD ENVIRONMENT
IJRRECS/November 2014/Volume-2/Issue-11/3699-3703 ISSN 2321-5461 INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE IMPLEMENTATION OF RESPONSIBLE DATA STORAGE IN CONSISTENT CLOUD
A New Digital Encryption Scheme: Binary Matrix Rotations Encryption Algorithm
International Journal of Research Studies in Computer Science and Engineering (IJRSCSE) Volume 2, Issue 2, February 2015, PP 18-27 ISSN 2349-4840 (Print) & ISSN 2349-4859 (Online) www.arcjournals.org A
A UPS Framework for Providing Privacy Protection in Personalized Web Search
A UPS Framework for Providing Privacy Protection in Personalized Web Search V. Sai kumar 1, P.N.V.S. Pavan Kumar 2 PG Scholar, Dept. of CSE, G Pulla Reddy Engineering College, Kurnool, Andhra Pradesh,
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
ADVANCE SECURITY TO CLOUD DATA STORAGE
Journal homepage: www.mjret.in ADVANCE SECURITY TO CLOUD DATA STORAGE ISSN:2348-6953 Yogesh Bhapkar, Mitali Patil, Kishor Kale,Rakesh Gaikwad ISB&M, SOT, Pune, India Abstract: Cloud Computing is the next
Survey on Efficient Information Retrieval for Ranked Query in Cost-Efficient Clouds
Survey on Efficient Information Retrieval for Ranked Query in Cost-Efficient Clouds Ms. Jyotsna T. Kumbhar 1 ME Student, Department of Computer Engineering, TSSM S, P.V.P.I.T., Bavdhan, Pune University,
IMPLEMENTATION OF NETWORK SECURITY MODEL IN CLOUD COMPUTING USING ENCRYPTION TECHNIQUE
IMPLEMENTATION OF NETWORK SECURITY MODEL IN CLOUD COMPUTING USING ENCRYPTION TECHNIQUE 1 Rajesh L Gaikwad, 2 Dhananjay M Dakhane, 3 Ravindra L Pardhi M.E Student, Associate Professor, Assistant Professor,
Improving data integrity on cloud storage services
International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 2 ǁ February. 2013 ǁ PP.49-55 Improving data integrity on cloud storage services
Private Record Linkage with Bloom Filters
To appear in: Proceedings of Statistics Canada Symposium 2010 Social Statistics: The Interplay among Censuses, Surveys and Administrative Data Private Record Linkage with Bloom Filters Rainer Schnell,
Secure Authentication of Distributed Networks by Single Sign-On Mechanism
Secure Authentication of Distributed Networks by Single Sign-On Mechanism Swati Sinha 1, Prof. Sheerin Zadoo 2 P.G.Student, Department of Computer Application, TOCE, Bangalore, Karnataka, India 1 Asst.Professor,
Ranked Keyword Search Using RSE over Outsourced Cloud Data
Ranked Keyword Search Using RSE over Outsourced Cloud Data Payal Akriti 1, Ms. Preetha Mary Ann 2, D.Sarvanan 3 1 Final Year MCA, Sathyabama University, Tamilnadu, India 2&3 Assistant Professor, Sathyabama
Index Terms Domain name, Firewall, Packet, Phishing, URL.
BDD for Implementation of Packet Filter Firewall and Detecting Phishing Websites Naresh Shende Vidyalankar Institute of Technology Prof. S. K. Shinde Lokmanya Tilak College of Engineering Abstract Packet
Single Sign-On Secure Authentication Password Mechanism
Single Sign-On Secure Authentication Password Mechanism Deepali M. Devkate, N.D.Kale ME Student, Department of CE, PVPIT, Bavdhan, SavitribaiPhule University Pune, Maharashtra,India. Assistant Professor,
Secure Way of Storing Data in Cloud Using Third Party Auditor
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 12, Issue 4 (Jul. - Aug. 2013), PP 69-74 Secure Way of Storing Data in Cloud Using Third Party Auditor 1 Miss.
Sustaining Privacy Protection in Personalized Web Search with Temporal Behavior
Sustaining Privacy Protection in Personalized Web Search with Temporal Behavior N.Jagatheshwaran 1 R.Menaka 2 1 Final B.Tech (IT), [email protected], Velalar College of Engineering and Technology,
A SECURE DECISION SUPPORT ESTIMATION USING GAUSSIAN BAYES CLASSIFICATION IN HEALTH CARE SERVICES
A SECURE DECISION SUPPORT ESTIMATION USING GAUSSIAN BAYES CLASSIFICATION IN HEALTH CARE SERVICES K.M.Ruba Malini #1 and R.Lakshmi *2 # P.G.Scholar, Computer Science and Engineering, K. L. N College Of
New Matrix Approach to Improve Apriori Algorithm
New Matrix Approach to Improve Apriori Algorithm A. Rehab H. Alwa, B. Anasuya V Patil Associate Prof., IT Faculty, Majan College-University College Muscat, Oman, [email protected] Associate
Image Compression through DCT and Huffman Coding Technique
International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347 5161 2015 INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Research Article Rahul
A Factoring and Discrete Logarithm based Cryptosystem
Int. J. Contemp. Math. Sciences, Vol. 8, 2013, no. 11, 511-517 HIKARI Ltd, www.m-hikari.com A Factoring and Discrete Logarithm based Cryptosystem Abdoul Aziz Ciss and Ahmed Youssef Ecole doctorale de Mathematiques
An Efficient Security Based Multi Owner Data Sharing for Un-Trusted Groups Using Broadcast Encryption Techniques in Cloud
An Efficient Security Based Multi Owner Data Sharing for Un-Trusted Groups Using Broadcast Encryption Techniques in Cloud T.Vijayalakshmi 1, Balika J Chelliah 2,S.Alagumani 3 and Dr.J.Jagadeesan 4 1 PG
Secure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment
Secure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment Chih Hung Wang Computer Science and Information Engineering National Chiayi University Chiayi City 60004,
Secure Collaborative Privacy In Cloud Data With Advanced Symmetric Key Block Algorithm
Secure Collaborative Privacy In Cloud Data With Advanced Symmetric Key Block Algorithm Twinkle Graf.F 1, Mrs.Prema.P 2 1 (M.E- CSE, Dhanalakshmi College of Engineering, Chennai, India) 2 (Asst. Professor
Security over Cloud Data through Encryption Standards
Security over Cloud Data through Encryption Standards Santhi Baskaran 1, Surya A 2, Stephen Pius C 3, Sudesh Goud G 4 1 Professor, 2,3,4 Student, Department of Information Technology, Pondicherry Engineering
A Serial Partitioning Approach to Scaling Graph-Based Knowledge Discovery
A Serial Partitioning Approach to Scaling Graph-Based Knowledge Discovery Runu Rathi, Diane J. Cook, Lawrence B. Holder Department of Computer Science and Engineering The University of Texas at Arlington
A Novel Cloud Computing Data Fragmentation Service Design for Distributed Systems
A Novel Cloud Computing Data Fragmentation Service Design for Distributed Systems Ismail Hababeh School of Computer Engineering and Information Technology, German-Jordanian University Amman, Jordan Abstract-
Ranked Search over Encrypted Cloud Data using Multiple Keywords
Ranked Search over Encrypted Cloud Data using Multiple Keywords [1] Nita Elizabeth Samuel, [2] Revathi B. R, [3] Sangeetha.M, [4] SreelekshmySelvin, [5] Dileep.V.K [1][2][3][4] LBS Institute of Technology
Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment
Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment Deepa Noorandevarmath 1, Rameshkumar H.K 2, C M Parameshwarappa 3 1 PG Student, Dept of CS&E, STJIT, Ranebennur. Karnataka, India
SURVEY ON: CLOUD DATA RETRIEVAL FOR MULTIKEYWORD BASED ON DATA MINING TECHNOLOGY
SURVEY ON: CLOUD DATA RETRIEVAL FOR MULTIKEYWORD BASED ON DATA MINING TECHNOLOGY 1 Kavya G, 2 K.S. Rajesh 1 P.G Scholar, Dept. of Computer Science & Engineering RajaRajeswari College of Engineering, Bangalore,
IMPROVED SECURITY MEASURES FOR DATA IN KEY EXCHANGES IN CLOUD ENVIRONMENT
INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 IMPROVED SECURITY MEASURES FOR DATA IN KEY EXCHANGES IN CLOUD ENVIRONMENT Merlin Shirly T 1, Margret Johnson 2 1 PG
15-2394-3696 RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM
RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM Dhanashri Bamane Vinayak Pottigar Subhash Pingale Department of Computer Science and Engineering SKN
Analysis on Secure Data sharing using ELGamal s Cryptosystem in Cloud
Analysis on Secure Data sharing using ELGamal s Cryptosystem in Cloud M.Jayanthi, Assistant Professor, Hod of MCA.E mail: [email protected] MahatmaGandhi University,Nalgonda, INDIA. B.Ranganatha
Secure Role-Based Access Control on Encrypted Data in Cloud Storage using Raspberry PI
Volume: 2, Issue: 7, 20-27 July 2015 www.allsubjectjournal.com e-issn: 2349-4182 p-issn: 2349-5979 Impact Factor: 3.762 Miss Rohini Vidhate Savitribai Phule Pune University. Mr. V. D. Shinde Savitribai
Enabling Public Auditing for Secured Data Storage in Cloud Computing
IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 5 (May. 2013), V3 PP 01-05 Enabling Public Auditing for Secured Data Storage in Cloud Computing 1 Er.Amandeep Kaur,
Development of enhanced Third party Auditing Scheme for Secure Cloud Storage
Development of enhanced Third party Auditing Scheme for Secure Cloud Storage Bhanu Prakash Chamakuri*1, D. Srikar*2, Dr. M.Suresh Babu*3 M.Tech Scholar, Dept of CSE, Grandhi Varalakshmi Institute Of Technology,
Database Migration over Network
Database Migration over Network Kanimozhi N 1, Thresphine J. R 2 1 M.TECH (Computer Science & Eng), PRIST University, Pondicherry India 2 Assistant Professor (Computer Science & Eng), PRIST University,
