Data attribute security and privacy in distributed database system
|
|
|
- Alfred Ray
- 10 years ago
- Views:
Transcription
1 IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: , p- ISSN: Volume 16, Issue 2, Ver. V (Mar-Apr. 2014), PP Data attribute security and privacy in distributed database system Ms. Pragati J. Mokadam 1 (PKTC, Department of computer science and engineering, Pune university) Abstract: Now a days there are a need of data attribute security in distributed database while preserving privacy. In the proposed work, we consider problem related in publishing collaborative data for anonymizing vertically and horizontally partitioned data. We consider the attack which may use a subset of the overall data. After in view of entire research work we make the distributed database system in which first, we introduce the notion of data privacy which guarantees the privacy of anonymized data for different data provider. Second, we present algorithms for exploiting the monotonicity of privacy constraints for checking data privacy efficiently with the encryption schema using encryption algorithm. Third, we distribute the data to end user with the anonymization as well as security algorithm, and checking the authentication schema with TTP, which will give the assurance to provide high level security to database. Experiments we use the hospital patient datasets suggest that our approach achieves better or comparable utility and efficiency than existing and baseline algorithms while satisfying of proposed security work. Keywords: Distributed database, privacy, protection, security, SMC, TTP I. INTRODUCTION Privacy preservation techniques are mainly used to reduce the leakage of formation about the particular individual while the data are shared and released to public. For this, the sensitive information should not disclose. Data is getting modified first and then published for further process. For this various anonymization techniques are followed and they are generalization, suppression, permutation and perturbation. By various anonymization techniques data is modified which retains sufficient utility and that can be released to other parties safely. Single organization does not hold the complete data. Organizations need to share data for mutual benefits or for publishing to a third party. For banking sector want to integrate their customer data for developing a system to provide better services for its customers. However, the banks do not want to indiscriminately disclose their data to each other for reasons such as privacy protection and business competitiveness. Main goal is to publish an anonymized view of integrated data, T, which will be immune to attacks(fig1). Attacker runs the attack, i.e. a single or a group of external or internal entities that wants to breach privacy of data using background knowledge. Collaborative data publishing is carried out successfully with the help of trusted third party (TTP) or Secure Multi Party Computation (SMC) protocols, which guarantees that information or data about particular individual is not disclosed anywhere, that means it maintains privacy. Here it is assumed that the data providers are semi honest. A more desirable approach for collaborative data publishing is, first aggregate then anonymize (fig 1)[1]. In above diagram, T1,T2,T3 and T4 are databases for which data is provided by provider like provider P1 provides data for database T1. These distributed data coming from different providers get aggregate by TTP(trusted third party) or using SMC protocol. Then these aggregated data anonymized further by any anonimization technique. P0 is the authenticate user and P1 trying to breach privacy of data which is provided by other users with the help of BK(Background knowledge). This type of attack we can call as a insider attack. We have to protect our system from such a type of attacks Fig1: Aggregate and Anonymize 27 Page
2 We are studying different methods which are previously used for anonymization. We study privacy preserving data publishing (PPDP) [2]and LKC[3] model gives better result than traditional k anonymization model. And also Two party protocol DPP2GA[4], It is only privacy preserving protocol not SMC because it introduce certain inference problem. Many systems use k anonymization for providing privacy. Attacker can attack on anonymized system with the help of BK(background knowledge). L diversity helps to overcome this problem. In current research paper [1], authors introduce a m privacy algorithm which verify anonymization and L diversity. For this they consider generalization and bucketization techniques for maintaining anonimized view of data and also provide L diversity which help to increase privacy of data. This paper proposed a system in which we used a new technology i.e slicing algorithm with which we also used encrypted data which improves security. Slicing is the process which gives better result than typical generalization and bucketization technique. It gives better results for high dimentional data. It can perform permutation within bucket. In slicing we can collaborate sensitive attribute with any quasi identifier. On this sliced data we use verification algorithms[1] which verifies that whether data is secured or not. II. ATTACKS ON PRIVACY 1. Background knowledge In real-life application, privacy protection is impossible due to the presence of the adversary s background knowledge [6]. Suppose the age is sensitive information. Assume an adversary knows that Alina age is 10 years younger than the average age of Indian women, but does not know the average age of Indian women. If the adversary has access to a statistical database that discloses the average age of Indian women, then Alina s privacy is considered to be compromised according to Dalenius definition, regardless of the presence of Alina s record in the database. 2. Linkage models When an adversary is able to link a record owner to a record in a published data table called record linkage, to a sensitive attribute in a published data table called attribute linkage, or to the published data table itself called table linkage. We assume that the adversary knows the QID(quasi identifier) of the victim. In record and attribute linkages, we further assume that the adversary knows the victim s record is in the released table, and seeks to identify the victim s record and/or sensitive information from the table. In table linkage, the attacker seeks to determine the presence or absence of the victim s record in the released table. A data table is considered to be privacy-preserving if it can effectively prevent the adversary from successfully performing these linkages. Example: A Record Linkage Model In the attack of record linkage, some value qid on QID identifies a small number of records in the released table T, called a group. If the victim s QID matches the value qid, the victim is vulnerable to being linked to the small number of records in the group. In this case, the adversary faces only a small number of possibilities for the victim s record, and with the help of additional knowledge, there is a chance that the adversary could uniquely identify the victim s record from the group. 3. Attacks by External Data Recipient Using Anonymized Data: Each data provider, such as P1 in Table 1[1], can also use anonymized data T and his own data (T1) to infer additional information about other records. Compared to the attack by the external recipient in the first attack scenario, each provider has additional data knowledge of their own records, which can help with the attack. TABLE I 28 Page
3 Table II gives result of anonymization with QID {Age, Zip} and 3- diversity on sensitive attribute disease by using generalization and bucketization technique. To overcome above type of attacks we proposed a system which discussed further. III. PRIVACY PRESERVATION OF DATA We first formally describe our problem setting. Then, we present our data-privacy definition with respect to a privacy constraint to prevent inference attacks by data-adversary, followed by properties of this new privacy notion. Let T = {t1, t2,...} be a set of records with the same attributes gathered from n data providers P ={P1, P2,..., Pn}, such that Ti are records provided by Pi. Let AS be a sensitive attribute with a domain DS. If the records contain multiple sensitive attributes then, we treat each of them as the sole sensitive attribute, while remaining ones we include to the quasi-identifier [10]. However, for our scenarios we use an approach, which preserves more utility without sacrificing privacy [11]. Our goal is to publish an anonymized T* while preventing any data-adversary from inferring AS for any single record. An data-adversary is a coalition of data users with n data providers cooperating to breach privacy of anonymized records. When data are gathered and combined from different data providers, mainly two things are done, for anonymization process. To protect data from external recipients with certain background knowledge BK, we assume a given privacy requirement C is defined as a conjunction of privacy constraints: C1 C2... Cw. If a group of anonymized records T* satisfies C, we say C(T*)=true. By definition C(Ø) is true and Ø is private. Any of the existing privacy principles can be used as a component constraint Ci. We now formally define a notion of dataprivacy with respect to a privacy constraint C, to protect the anonymized data against data-adversaries. The notion explicitly models the inherent data knowledge of an data-adversary, the data records they jointly contribute, and requires that each QI group, excluding any of those records owned by an data-adversary, still satisfies C. Fig 2: Proposed system Fig.2 shows our proposed system in which input data is given in encrypted format( attribute name will be in encrypted format). Select point for slicing[12]. Check that input data against privacy constraint C for data privacy. Check further is slicing is possible or not. If slicing possible then do it and if not then decrypt data. Our final output T* are anonymized data which will seen only by authenticate user. Any adversary can not breach privacy of data. In this system we are using horizontal as well as vertical partitioning over database. Slicing algorithm provide better column partitioning. To understand this properly lets consider hospital management system for experiment. Let different departments are the providers who provides data from different sources. We consider disease as a AS (sensitive attribute) and age and zipcode are QI(quasi identifier). We can increase QI and AS also. This will our input data. We can take it in table form as in Table II. 29 Page
4 TABLE II Name Age Zip code Disease Gender Password Alice Cancer Female Mark Epilepsy Male Sara Flu Female Bob High BP Male Marry High Bp Female Frank Cancer Male * John Flu Male * Siyara Epilepsy Female * On this input data slicing algorithm will apply. Anonymization done on QI and also mantaines diversity for AS. We are using RSA algorithm for encryption. Our anather important attribute is name. we are using encryption on name. When it will save in database, it will in encrypted form. Without key or authentication no one can decrypt it. When any data adversary try to breach data, it will get anonymized sliced data where sensitive attribute maintains diversity and name is in encrypted form. IV. 1. Mathematical flow of proposed system: FLOW OF SYSTEM Let, S={s,e,P,T*,F} Where S is a system of collaborative data publishing consist of database with certain attributes related to patient data for hospital management system. S consist of s = distinct start of system e = distinct end of system P = Input of system from providers T* = output of system F = algorithms or functions having certain computation time Let, s = {Ru} // request from user e.g doctor (There can be more than one authenticated user) P= {DBp1,DBp2.DBpn} // database i.e data provided by providers // Apply F on it. F = {encryption algorithm(ea), slicing algorithm(sa), binary algorithm(ba), privacy verification algorithm(pa)} T* = {RuˆDBpn} // collaborative data according to user request and database which we have. F provides privacy and security to input data. e = output in table format according to user authentication. Success condition, Ru[i] NULL, DBpn NULL Failure condition, Ru[i] = = NULL, DBpn = = NULL 2. Algorithms: 2.1 Slicing Algorithm: Definition 1: (Attribute separation and Columns). In attribute separation, D(database) consists of several subsets, such that each attribute belongs to exactly one subset. Each subset of attributes is called a column. Specifically, let there be C columns C1; C2;... Cc, then U(c)i=1,C=D; and for any 1 iı i2 c, Ciı Ci2 = Ө. For simplicity of discussion, we consider only one sensitive attribute S. If the data contain multiple sensitive attributes, one can either consider them separately or consider their joint distribution [25]. Exactly one of the c columns contains S. Without loss of generality, let the column that contains S be the last column C. This column is also called the sensitive column. All other columns{c1,c2 Cc-1} contain only QI attributes. Definition 2 : (Tuple Partition and Buckets). In tuple partition, T consist of several subsets, such that each tuple belongs to exactly one subset. This tuples subset is called a bucket. Specifically, let there be b buckets. B1,B2 Bb then Uᵇᵢ ıbᵢ=t and for any 1 iı i2 b, Biı Bi2= Ө 30 Page
5 Definition 3 (Slicing): Given a microdata table T, a slicing of T is given by an attribute partition and a tuple partition. For example, suppose tables a and b are two sliced tables. In Table a, the attribute partition is {{Age}, {Gender}, {Zipcode}, {Disease}} and the tuple partition is {{t1; t2; t3; t4}, {t5; t6; t7; t8}}. In Table b, the attribute partition is {{Age, Gender}, {Zipcode, Disease}} and the tuple partition is {{t1; t2; t3; t4}, {t5; t6; t7; t8}}. Definition 4 (Column Generalization) Given a microdata table T and a column Ci = (Xi1,Xi2,Xi3.Xij) where Xi1,Xi2..Xij are attributes, a column generalization for Ci is defined as a set of non overlapping j-dimensional regions that completely cover D[Xi1]* [Xi2] *.. D[Xij]. A column generalization maps each value of Ci to the region in which the value is contained. Column generalization ensures that one column satisfies the k-anonymity requirement. It is a multidimensional encoding and can be used as an additional step in slicing. Specifically, a general slicing algorithm consists of the following three phases: attribute partition, column generalization, and tuple partition. Because each column contains much fewer attributes than the whole table, attribute partition enables slicing to handle high-dimensional data. A key notion of slicing is that of matching buckets. Definition 5 (Matching Buckets) Consider sliced data and let (C1; C2;... ; Cc) be the columns. Let t be a tuple, and t[ci] be the value of Ci of t. Let B be a bucket in the sliced table, and B[Ci] be the multiset of Ci values in B. We say that B is a matching bucket of t if for all T[C(i)]==B[C(i)] and 1 set if I set of C, 1 i c,t[ci]єb[ci] By using above slicing algorithm we can obtain anonymization and l diversity both. This two technique maintains the privacy of data. 2.2 Binary algorithm: Data: Anonymize records DATA from providers P, an EG monotonic C, a fitness scoring function score F, and the n. Result: if DATA is private secure C then True, else false 1. sites = sort_sites(p, increasing order, scoref ) 2. Apply slicing 3. while verify data-privacy(data, n, C) = 0 do 4. super = next_instance size(n 1)&& (size_of_tupples ( ) // identification of column 5. if privacy breached_by(psuper, C) = 0 then 6. prune_all_sub-instances_downwards(psuper) 7. continue 8. Psub = next_sub-instance_of(psuper,n) 9. if privacy_is_breached_by(psub, C) = 1 then 10. return 0 // early stop 11. while instance_between(psub, Psuper) do 12.I = next_instance between(psub, Psuper) 13. if privacy breached_by(p,c) = 1 then 14.Psuper = P 15. else 16. Psub = P 17. prune_all_sub-instances_downwards(psub) 18. prune_all_super-instances_upwards(psuper) 19.return 1 Monotonicity of privacy constraints is defined for a single equivalence group of records, i.e., a group of records that QI attributes share the same generalized values. Let A be a mechanism that anonymizes a group of records T into a single equivalence group, T*=A1(T). A privacy constraint C is EG monotonic if and only if, for a group of records T such that its equivalence group A satisfies C, and any group of records T', their anonymized union satisfies C, C(A1(T)) = true T',C(A1(T T')) = true. Before using above binary algorithm we have to check for EG monotonic constraint. First, it starts with (n 1) adversaries, finds the first coalition of attackers that violates privacy, and assigns it to Psuper (lines from 4 to 7). Then, it finds an Psub, i.e., a sub-coalition of Psuper, which does not breach privacy (line 8). At each step, a new coalition P : Psub P Psuper (such that P = Psuper + Psub /2 line 12) is checked (line 13). If P can breach privacy, then Psuper is updated to P (line 14). Otherwise, Psub is updated to P (line 16). The algorithm continues until the direct parent child pairs Psuper and Psub are found (line 11). Then pruning[1] 31 Page
6 is performed (lines 17 and 18), and the algorithm starts the next iteration. The algorithm stops when dataprivacy can be determined (line 3). 2.3 EG monotonic algorithm: Data: List of providers P, an EG monotonic C, and the n. Result: true if A1 (T) is data-private w.r.t. C, false otherwise. 1 sites = apply slicing algorithm(p, increasing order, score F ) 2 use_adaptive_order_generator(sites, n) 3 while data-privacy decided() = false do 4 Ar = generate_next_coalition(p) 5 Broadcast coalition Ar. // Runs protected privacy confirmation protocol. 6 privacy breached = is_privacy_breached_by(ar) 7 if privacy breached and Ar _ n then 8 return false // early stop 9 prune_coalitions(ar, privacy breached) 10 return data-privacy() Privacy for different coalitions of attackers, which are generated in specific order. A general scheme of secure data privacy verification is the same for all heuristic algorithms. Common steps are as follows. In the main loop P' verifies privacy of records for data-adversaries until data-privacy can be decided (line 3). Note that in order to determine data-privacy w.r.t. EG monotonic C, it is enough to check privacy for all scenarios with exactly n attackers. In the loop, P' generates and broadcasts a coalition of potential adversaries Ar, so each party can recognize its status (attacker/non-attacker) for the current privacy check. Then, the leader runs the secure privacy verification protocol for Ar (line 6). If privacy could be breached, and Ar has no more than n data providers, then the protocol stops and returns negative answer (line 7). Otherwise, the information about privacy fulfillment is used to prune (upwards or downwards) a few potential data-adversaries (line 9). Finally, if dataprivacy w.r.t. C can be decided, then P' returns the results of data-privacy verification (line 10). 3. Result: By using slicing algorithm and encryption we can get output, Table III. This maintain 4-anonymization with QI {Age, Zipcode} and 3-diversity with {disease(as),gender}. Slicing performs permutations within buckets. This system protect our database from attacks like BK, linkage attack as this result provide no linking between tuples and attributes. Name is another important data which is encrypted. Attacker can breach this security and privacy of sensitive data. TABLE III Name {Age, Zip code} {Disease, Gender} Password {22,12345} {High Bp, Female} {31,12399} {Cancer, Female} * {25,12365} {Flu, Male} {15,12356} {Flu, Female} * {24,23456} {Epilepsy, Female} * {33,23487} {Cancer, Male} * * {19,23466} {High BP, Male} * ** {43, 23478} {Epilepsy, Male} * V. CONCLUSION We consider a potential attack on collaborative data publishing. We used slicing algorithm for anonymization and L diversity and verify it for security and privacy by using binary algorithm of data privacy. Slicing algorithm is very useful when we are using high dimensional data. It divides data in both vertical and horizontal fashion. Due to encryption we can increase security. But the limitation is there could be loss of data utility. Above system can used in many applications like hospital management system, many industrial areas where we like to protect a sensitive data like salary of employee. Pharmaceutical company where sensitive data may be a combination of ingredients of medicines, in banking sector where sensitive data is account number of customer, our system can use. It can be used in military area where data is gathered from different sources and need to secured that data from each other to maintain privacy. This proposed system help to improve the data privacy and security when data is gathered from different sources and output should be in collaborative fashion. In future this system can consider for data which are distributed in ad hoc grid computing. Also the system can be consider for set valued data. 32 Page
7 ACKNOWLEDGEMENT I would like to thank my guide, Professor Dr. S. Singh for their valuable support and share their knowledge. REFERENCES [1] S. Goryczka, L. Xiong, and B. C. M. Fung, m-privacy for collaborative data publishing, in Proc. of the 7th Intl. Conf. on Collaborative Computing: Networking, Applications and Worksharing, [2] C.Dwork, Differential privacy: A survey of results, in Proc. of the 5th Intl. Conf. on Theory and Applications of Models of Computation, 2008, pp [3] N. Mohammed, B. C. M. Fung, P. C. K. Hung, and C. Lee, Centralized and distributed anonymization for high-dimensional healthcare data, ACM Trans. on Knowledge Discovery from Data, vol. 4, no. 4, pp. 18:1 18:33, October [4] W. Jiang and C. Clifton, Privacy-preserving distributed k-anonymity, in DBSec, vol. 3654, 2005, pp [5] W. Jiang and C. Clifton, A secure distributed framework for achieving k-anonymity, The VLDB Journal Special Issue on Privacy Preserving Data Management, vol. 15, no. 4, pp , 2006 [6] A. Machanavajjhala, J. Gehrke, D. Kifer, and M. Venkitasubramaniam, l-diversity: Privacy beyond k-anonymity, in ICDE, 2006,p. 24 [7] R. Sheikh, B. Kumar, and D. K. Mishra, A distributed k-secure sum protocol for secure multi-party computations, J. of Computing, vol. 2, pp , March 2010 (2002) [8] C. Dwork, A firm foundation for private data analysis, Commun. ACM, vol. 54, pp , January 2011 [9] P. Jurczyk and L. Xiong, Distributed anonymization: Achieving privacy for both data subjects and data providers, in DBSec, 2009, pp [10] C. M. Fung, K. Wang, R. Chen, and P. S. Yu, Privacy-preserving data publishing: A survey of recent developments, ACM Comput. Surv., vol. 42, pp. 14:1 14:53, June [11] Tiancheng Li, Ninghui Li, Jian Zhang,Ian Molloy, Slicing: A New Approach for Privacy Preserving Data Publishing IEEE transactions on knowledge and data engineering, vol. 24, no. 3, March 2012 [12] O. Goldreich, Foundations of Cryptography: Volume 2, Page
Information Security in Big Data using Encryption and Decryption
International Research Journal of Computer Science (IRJCS) ISSN: 2393-9842 Information Security in Big Data using Encryption and Decryption SHASHANK -PG Student II year MCA S.K.Saravanan, Assistant Professor
International Journal of Scientific & Engineering Research, Volume 4, Issue 10, October-2013 ISSN 2229-5518 1582
1582 AN EFFICIENT CRYPTOGRAPHIC APPROACH FOR PRESERVING PRIVACY IN DATA MINING T.Sujitha 1, V.Saravanakumar 2, C.Saravanabhavan 3 1. M.E. Student, [email protected] 2. Assistant Professor, [email protected]
Proposing a Novel Synergized K-Degree L-Diversity T- Closeness Model for Graph Based Data Anonymization
Proposing a Novel Synergized K-Degree L-Diversity T- Closeness Model for Graph Based Data Anonymization S.Charanyaa 1, K.Sangeetha 2 M.Tech. Student, Dept of Information Technology, S.N.S. College of Technology,
Obfuscation of sensitive data in network flows 1
Obfuscation of sensitive data in network flows 1 D. Riboni 2, A. Villani 1, D. Vitali 1 C. Bettini 2, L.V. Mancini 1 1 Dipartimento di Informatica,Universitá di Roma, Sapienza. E-mail: {villani, vitali,
Data Outsourcing based on Secure Association Rule Mining Processes
, pp. 41-48 http://dx.doi.org/10.14257/ijsia.2015.9.3.05 Data Outsourcing based on Secure Association Rule Mining Processes V. Sujatha 1, Debnath Bhattacharyya 2, P. Silpa Chaitanya 3 and Tai-hoon Kim
DATA MINING - 1DL360
DATA MINING - 1DL360 Fall 2013" An introductory class in data mining http://www.it.uu.se/edu/course/homepage/infoutv/per1ht13 Kjell Orsborn Uppsala Database Laboratory Department of Information Technology,
SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTING SECURITY ENVIRONMENT
SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTING SECURITY ENVIRONMENT K.karthika 1, M. Daya kanimozhi Rani 2 1 K.karthika, Assistant professor, Department of IT, Adhiyamaan College of Engineering, Hosur
Single Sign-On Secure Authentication Password Mechanism
Single Sign-On Secure Authentication Password Mechanism Deepali M. Devkate, N.D.Kale ME Student, Department of CE, PVPIT, Bavdhan, SavitribaiPhule University Pune, Maharashtra,India. Assistant Professor,
ACL Based Dynamic Network Reachability in Cross Domain
South Asian Journal of Engineering and Technology Vol.2, No.15 (2016) 68 72 ISSN No: 2454-9614 ACL Based Dynamic Network Reachability in Cross Domain P. Nandhini a, K. Sankar a* a) Department Of Computer
Anonymity meets game theory: secure data integration with malicious participants
The VLDB Journal (2011) 20:567 588 DOI 10.1007/s00778-010-0214-6 REGULAR PAPER Anonymity meets game theory: secure data integration with malicious participants Noman Mohammed Benjamin C. M. Fung Mourad
A Secure Model for Medical Data Sharing
International Journal of Database Theory and Application 45 A Secure Model for Medical Data Sharing Wong Kok Seng 1,1,Myung Ho Kim 1, Rosli Besar 2, Fazly Salleh 2 1 Department of Computer, Soongsil University,
Secure Collaborative Privacy In Cloud Data With Advanced Symmetric Key Block Algorithm
Secure Collaborative Privacy In Cloud Data With Advanced Symmetric Key Block Algorithm Twinkle Graf.F 1, Mrs.Prema.P 2 1 (M.E- CSE, Dhanalakshmi College of Engineering, Chennai, India) 2 (Asst. Professor
Database Security. The Need for Database Security
Database Security Public domain NASA image L-1957-00989 of people working with an IBM type 704 electronic data processing machine. 1 The Need for Database Security Because databases play such an important
CS346: Advanced Databases
CS346: Advanced Databases Alexandra I. Cristea [email protected] Data Security and Privacy Outline Chapter: Database Security in Elmasri and Navathe (chapter 24, 6 th Edition) Brief overview of
Detecting Data Leakage using Data Allocation Strategies. With Fake objects
Detecting Data Leakage using Data Allocation Strategies With Fake objects S.P.Subalakshmi 1, B.Geetha 2, S.P.Karthikeyan 3 Student M.E(CSE),Mailam Engineering College,Mailam,India 1 Assistant Professor,
Survey on Data Privacy in Big Data with K- Anonymity
Survey on Data Privacy in Big Data with K- Anonymity Salini. S, Sreetha. V. Kumar, Neevan.R M.Tech Student, Dept of CSE, Marian Engineering College, Trivandrum, Kerala, India Asst. Professor, Dept of CSE,
Homomorphic Encryption Schema for Privacy Preserving Mining of Association Rules
Homomorphic Encryption Schema for Privacy Preserving Mining of Association Rules M.Sangeetha 1, P. Anishprabu 2, S. Shanmathi 3 Department of Computer Science and Engineering SriGuru Institute of Technology
Enhancement of Security in Distributed Data Mining
Enhancement of Security in Distributed Data Mining Sharda Darekar 1, Prof.D.K.Chitre, 2 1,2 Department Of Computer Engineering, Terna Engineering College,Nerul,Navi Mumbai. 1 [email protected],
K-NN CLASSIFICATION OVER SECURE ENCRYPTED RELATIONAL DATA IN OUTSOURCED ENVIRONMENT
Journal homepage: www.mjret.in K-NN CLASSIFICATION OVER SECURE ENCRYPTED RELATIONAL DATA IN OUTSOURCED ENVIRONMENT Akshay Dabi, Arslan Shaikh, Pranay Bamane, Vivek Thorat, Prof.Popat Borse. Computer Engineering.
International Journal of Advanced Research in Computer Science and Software Engineering
Volume, Issue, March 201 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Efficient Approach
Towards Privacy aware Big Data analytics
Towards Privacy aware Big Data analytics Pietro Colombo, Barbara Carminati, and Elena Ferrari Department of Theoretical and Applied Sciences, University of Insubria, Via Mazzini 5, 21100 - Varese, Italy
A SECURE DECISION SUPPORT ESTIMATION USING GAUSSIAN BAYES CLASSIFICATION IN HEALTH CARE SERVICES
A SECURE DECISION SUPPORT ESTIMATION USING GAUSSIAN BAYES CLASSIFICATION IN HEALTH CARE SERVICES K.M.Ruba Malini #1 and R.Lakshmi *2 # P.G.Scholar, Computer Science and Engineering, K. L. N College Of
Policy-based Pre-Processing in Hadoop
Policy-based Pre-Processing in Hadoop Yi Cheng, Christian Schaefer Ericsson Research Stockholm, Sweden [email protected], [email protected] Abstract While big data analytics provides
A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA
A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA U.Pandi Priya 1, R.Padma Priya 2 1 Research Scholar, Department of Computer Science and Information Technology,
CS377: Database Systems Data Security and Privacy. Li Xiong Department of Mathematics and Computer Science Emory University
CS377: Database Systems Data Security and Privacy Li Xiong Department of Mathematics and Computer Science Emory University 1 Principles of Data Security CIA Confidentiality Triad Prevent the disclosure
Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment
Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment Deepa Noorandevarmath 1, Rameshkumar H.K 2, C M Parameshwarappa 3 1 PG Student, Dept of CS&E, STJIT, Ranebennur. Karnataka, India
PRIVACY PRESERVING ASSOCIATION RULE MINING
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 10, October 2014,
Chapter 23. Database Security. Security Issues. Database Security
Chapter 23 Database Security Security Issues Legal and ethical issues Policy issues System-related issues The need to identify multiple security levels 2 Database Security A DBMS typically includes a database
A GENERAL SURVEY OF PRIVACY-PRESERVING DATA MINING MODELS AND ALGORITHMS
Chapter 2 A GENERAL SURVEY OF PRIVACY-PRESERVING DATA MINING MODELS AND ALGORITHMS Charu C. Aggarwal IBM T. J. Watson Research Center Hawthorne, NY 10532 [email protected] Philip S. Yu IBM T. J. Watson
Anonymizing Healthcare Data: A Case Study on the Blood Transfusion Service
Anonymizing Healthcare Data: A Case Study on the Blood Transfusion Service Noman Mohammed Benjamin C. M. Fung Patrick C. K. Hung Cheuk-kwong Lee CIISE, Concordia University, Montreal, QC, Canada University
DEVELOPMENT OF HASH TABLE BASED WEB-READY DATA MINING ENGINE
DEVELOPMENT OF HASH TABLE BASED WEB-READY DATA MINING ENGINE SK MD OBAIDULLAH Department of Computer Science & Engineering, Aliah University, Saltlake, Sector-V, Kol-900091, West Bengal, India [email protected]
A Novel Technique of Privacy Protection. Mining of Association Rules from Outsourced. Transaction Databases
A Novel Technique of Privacy Protection Mining of Association Rules from Outsource Transaction Databases 1 Dhananjay D. Wadkar, 2 Santosh N. Shelke 1 Computer Engineering, Sinhgad Academy of Engineering
MALLET-Privacy Preserving Influencer Mining in Social Media Networks via Hypergraph
MALLET-Privacy Preserving Influencer Mining in Social Media Networks via Hypergraph Janani K 1, Narmatha S 2 Assistant Professor, Department of Computer Science and Engineering, Sri Shakthi Institute of
AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION K.Anusha 1, K.Sudha 2 1 M.Tech Student, Dept of CSE, Aurora's Technological
DATA MINING - 1DL105, 1DL025
DATA MINING - 1DL105, 1DL025 Fall 2009 An introductory class in data mining http://www.it.uu.se/edu/course/homepage/infoutv/ht09 Kjell Orsborn Uppsala Database Laboratory Department of Information Technology,
II. BACKGROUND A. Hadoop and MapReduce
EFFECTIVE AND EFFICIENT WAY OF REDUCE DEPENDENCY ON DATASET WITH THE HELP OF MAPREDUCE ON BIG DATA Satish Londhe a1, Smita Mahajan b2 a M.Tech Student, b Research Guide, Symbiosis International University,,Pune,
Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis
IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661, ISBN: 2278-8727 Volume 6, Issue 5 (Nov. - Dec. 2012), PP 36-41 Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis
An Advanced Bottom up Generalization Approach for Big Data on Cloud
An Advanced Bottom up Generalization Approach for Big Data on Cloud Abstract K.R.Pandilakshmi 1, G.Rashitha Banu 2 1 Research Scholar, Department of Computer Science, Vel s University, Chennai. 2 Professor,
Electronic Contract Signing without Using Trusted Third Party
Electronic Contract Signing without Using Trusted Third Party Zhiguo Wan 1, Robert H. Deng 2 and David Lee 1 Sim Kim Boon Institute for Financial Economics 1, School of Information Science 2, Singapore
MANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE MANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS Kanchupati Kondaiah 1, B.Sudhakar 2 1 M.Tech Student, Dept of CSE,
How To Ensure Correctness Of Data In The Cloud
A MECHANICS FOR ASSURING DATA STORAGE SECURITY IN CLOUD COMPUTING 1, 2 Pratibha Gangwar, 3 Mamta Gadoria 1 M. Tech. Scholar, Jayoti Vidyapeeth Women s University, Jaipur, [email protected] 2 M. Tech.
Protecting Respondents' Identities in Microdata Release
1010 IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 13, NO. 6, NOVEMBER/DECEMBER 2001 Protecting Respondents' Identities in Microdata Release Pierangela Samarati, Member, IEEE Computer Society
Privacy Protection in Personalized Web Search- A Survey
Privacy Protection in Personalized Web Search- A Survey Greeshma A S. * Lekshmy P. L. M.Tech Student Assistant Professor Dept. of CSE & Kerala University Dept. of CSE & Kerala University Thiruvananthapuram
SURVEY ON: CLOUD DATA RETRIEVAL FOR MULTIKEYWORD BASED ON DATA MINING TECHNOLOGY
SURVEY ON: CLOUD DATA RETRIEVAL FOR MULTIKEYWORD BASED ON DATA MINING TECHNOLOGY 1 Kavya G, 2 K.S. Rajesh 1 P.G Scholar, Dept. of Computer Science & Engineering RajaRajeswari College of Engineering, Bangalore,
Enabling Public Auditing for Secured Data Storage in Cloud Computing
IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 5 (May. 2013), V3 PP 01-05 Enabling Public Auditing for Secured Data Storage in Cloud Computing 1 Er.Amandeep Kaur,
(Big) Data Anonymization Claude Castelluccia Inria, Privatics
(Big) Data Anonymization Claude Castelluccia Inria, Privatics BIG DATA: The Risks Singling-out/ Re-Identification: ADV is able to identify the target s record in the published dataset from some know information
International Journal of Engineering Research ISSN: 2348-4039 & Management Technology November-2015 Volume 2, Issue-6
International Journal of Engineering Research ISSN: 2348-4039 & Management Technology Email: [email protected] November-2015 Volume 2, Issue-6 www.ijermt.org Modeling Big Data Characteristics for Discovering
Secure Authentication of Distributed Networks by Single Sign-On Mechanism
Secure Authentication of Distributed Networks by Single Sign-On Mechanism Swati Sinha 1, Prof. Sheerin Zadoo 2 P.G.Student, Department of Computer Application, TOCE, Bangalore, Karnataka, India 1 Asst.Professor,
A Survey on Outlier Detection Techniques for Credit Card Fraud Detection
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 2, Ver. VI (Mar-Apr. 2014), PP 44-48 A Survey on Outlier Detection Techniques for Credit Card Fraud
A Brief Survey on Anonymization Techniques for Privacy Preserving Publishing of Social Network Data
A Brief Survey on Anonymization Techniques for Privacy Preserving Publishing of Social Network Data Bin Zhou School of Computing Science Simon Fraser University, Canada [email protected] Jian Pei School
Computer Security (EDA263 / DIT 641)
Computer Security (EDA263 / DIT 641) Lecture 12: Database Security Erland Jonsson Department of Computer Science and Engineering Chalmers University of Technology Sweden Outline Introduction to databases
Efficient Algorithms for Masking and Finding Quasi-Identifiers
Efficient Algorithms for Masking and Finding Quasi-Identifiers Rajeev Motwani Stanford University [email protected] Ying Xu Stanford University [email protected] ABSTRACT A quasi-identifier refers
Secure Way of Storing Data in Cloud Using Third Party Auditor
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 12, Issue 4 (Jul. - Aug. 2013), PP 69-74 Secure Way of Storing Data in Cloud Using Third Party Auditor 1 Miss.
Index Terms: Cloud Computing, Third Party Auditor, Threats In Cloud Computing, Dynamic Encryption.
Secure Privacy-Preserving Cloud Services. Abhaya Ghatkar, Reena Jadhav, Renju Georgekutty, Avriel William, Amita Jajoo DYPCOE, Akurdi, Pune [email protected], [email protected], [email protected],
COST EFFECTIVE PRIVACY PRESERVED INTERMEDIATE DATASETS FOR CLOUD DATA SERVICES
COST EFFECTIVE PRIVACY PRESERVED INTERMEDIATE DATASETS FOR CLOUD DATA SERVICES Chaya.Y.K 1, Bharathi V Kalmath 2 1 PG Student, Department of CSE, S.V.C.E,Bengaluru 2 Asst.Professor, Department of CSE,
Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption
Partitioning Data and Domain Integrity Checking for Storage - Improving Cloud Storage Security Using Data Partitioning Technique Santosh Jogade *, Ravi Sharma, Prof. Rajani Kadam Department Of Computer
A Catechistic Method for Traffic Pattern Discovery in MANET
A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer
A New Digital Encryption Scheme: Binary Matrix Rotations Encryption Algorithm
International Journal of Research Studies in Computer Science and Engineering (IJRSCSE) Volume 2, Issue 2, February 2015, PP 18-27 ISSN 2349-4840 (Print) & ISSN 2349-4859 (Online) www.arcjournals.org A
ADVANCE SECURITY TO CLOUD DATA STORAGE
Journal homepage: www.mjret.in ADVANCE SECURITY TO CLOUD DATA STORAGE ISSN:2348-6953 Yogesh Bhapkar, Mitali Patil, Kishor Kale,Rakesh Gaikwad ISB&M, SOT, Pune, India Abstract: Cloud Computing is the next
L'Anonymisation des données du DMP Etat des lieux du Privacy Preserving Data Publishing
Partage et Secret de l'information de Santé Nancy 15/10/10 L'Anonymisation des données du DMP Etat des lieux du Privacy Preserving Data Publishing T. Allard & B.Nguyen Institut National de Recherches en
Ranked Keyword Search Using RSE over Outsourced Cloud Data
Ranked Keyword Search Using RSE over Outsourced Cloud Data Payal Akriti 1, Ms. Preetha Mary Ann 2, D.Sarvanan 3 1 Final Year MCA, Sathyabama University, Tamilnadu, India 2&3 Assistant Professor, Sathyabama
Privacy Aspects in Big Data Integration: Challenges and Opportunities
Privacy Aspects in Big Data Integration: Challenges and Opportunities Peter Christen Research School of Computer Science, The Australian National University, Canberra, Australia Contact: [email protected]
Survey on Efficient Information Retrieval for Ranked Query in Cost-Efficient Clouds
Survey on Efficient Information Retrieval for Ranked Query in Cost-Efficient Clouds Ms. Jyotsna T. Kumbhar 1 ME Student, Department of Computer Engineering, TSSM S, P.V.P.I.T., Bavdhan, Pune University,
Horizontal Aggregations In SQL To Generate Data Sets For Data Mining Analysis In An Optimized Manner
24 Horizontal Aggregations In SQL To Generate Data Sets For Data Mining Analysis In An Optimized Manner Rekha S. Nyaykhor M. Tech, Dept. Of CSE, Priyadarshini Bhagwati College of Engineering, Nagpur, India
Keywords: Authentication, Third party audit, cloud storage, cloud service provider, Access control.
Volume 5, Issue 3, March 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Identity Based
How To Create A Privacy Preserving And Dynamic Load Balancing System In A Distributed System
Enforcing Secure and Privacy-Preserving Information Brokering with Dynamic Load Balancing in Distributed Information Sharing. 1 M.E. Computer Engineering Department GHRCEM, Wagholi, Pune. [email protected]
SECURE AND EFFICIENT PRIVACY-PRESERVING PUBLIC AUDITING SCHEME FOR CLOUD STORAGE
International Journal of Computer Network and Security(IJCNS) Vol 7. No.1 2015 Pp. 1-8 gopalax Journals, Singapore available at : www.ijcns.com ISSN: 0975-8283 ----------------------------------------------------------------------------------------------------------------------------------------------------------
A Secure Decentralized Access Control Scheme for Data stored in Clouds
A Secure Decentralized Access Control Scheme for Data stored in Clouds Priyanka Palekar 1, Abhijeet Bharate 2, Nisar Anjum 3 1 SKNSITS, University of Pune 2 SKNSITS, University of Pune 3 SKNSITS, University
Providing Data Protection as a Service in Cloud Computing
International Journal of Scientific and Research Publications, Volume 3, Issue 6, June 2013 1 Providing Data Protection as a Service in Cloud Computing Sunumol Cherian *, Kavitha Murukezhan ** * Department
SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS
SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS Abstract: The Single sign-on (SSO) is a new authentication mechanism that enables a legal user with a single credential
Secure and Efficient Data Retrieval Process based on Hilbert Space Filling Curve
Secure and Efficient Data Retrieval Process based on Hilbert Space Filling Curve N.S. Jeya karthikka PG Scholar Sri Ramakrishna Engg Collg S.Bhaggiaraj Assistant Professor Sri Ramakrishna Engg Collg V.Sumathy
Privacy Preserving Health Monitoring Data Using a Proxy Re-encryption
RESEARCH ARTICLE OPEN ACCESS Privacy Preserving Health Monitoring Data Using a Proxy Re-encryption Lakshmipriya.V 1, Praveena.V(Assistant Professor) 2 Department of Computer Science and Engineering, SRM
An Analysis on Density Based Clustering of Multi Dimensional Spatial Data
An Analysis on Density Based Clustering of Multi Dimensional Spatial Data K. Mumtaz 1 Assistant Professor, Department of MCA Vivekanandha Institute of Information and Management Studies, Tiruchengode,
Chapter 23. Database Security. Security Issues. Database Security
Chapter 23 Database Security Security Issues Legal and ethical issues Policy issues System-related issues The need to identify multiple security levels 2 Database Security A DBMS typically includes a database
PartJoin: An Efficient Storage and Query Execution for Data Warehouses
PartJoin: An Efficient Storage and Query Execution for Data Warehouses Ladjel Bellatreche 1, Michel Schneider 2, Mukesh Mohania 3, and Bharat Bhargava 4 1 IMERIR, Perpignan, FRANCE [email protected] 2
