An Efficient Approach for Leakage Tracing
|
|
- Ezra Ray
- 5 years ago
- Views:
Transcription
1 International Journal of Electronics and Computer Science Engineering 2301 Available Online at ISSN Paladugu Divya 1, V.Sivaparvathi 2, M.Salaja 3, V. Sowjanya 4, 1 Student, PVP Siddhartha Institute of Technology, in the Department of Computer Science and Engineering, Vijayawada,Krishna(dt) 2 Assistant Professor, PVP Siddhartha Institute of Technology, in the Department of Computer Science and 3 Assistant Professor, PVP Siddhartha Institute of Technology, in the Department of Computer Science and 4 Assistant Professor, PVP Siddhartha Institute of Technology, in the Department of Computer Science and 1 paladugu.divya@gmail.com, 2 vallabhaneni_sp@yahoo.in, 3saili_klce@yahoo.com, 4 sowji_635@yahoo.com, Abstract- Data distribution across trusted agents by a distributor is difficult to analyze and manage as there is always the danger of misappropriation by one or more number of agents. A prior approach such as Watermarks that alters the data is of no use. In case of a leak the data is found at an unauthorized place (e.g., on the web or somebody s laptop). Nothing can be done in former s case. In a latter scenario data allocation strategies like injecting realistic but fake data records to the original sensitive data were developed such that these fake tuples can be used to identify the leaker among the trusted agents. Also guilt assessment algorithms were proposed for distributing objects to agents, in a way that improves the chances of identifying a leaker. These strategies have limited functionality as they function with an assumption that there are a fixed set of agents with requests known in advance. We propose to extend the functionality of these techniques to handle more number of agents using staged event-driven architecture (SEDA). Using this model a distributor can assess the likelihood of a leaker among more number of trusted agents in the aftermath of a leak. I INTRODUCTION In today technically empowered data rich environment, it is a major challenge for data holders to prevent data leakage. In the course of doing business, sometimes sensitive data must be handed over to supposedly trusted third parties. We call the owner of the data the distributor and the supposedly trusted third parties the agents. Our goal is to detect when the distributor s sensitive data has been leaked by agents, if possible to identify the agent that leaked the data and functionality of the technique is extended in order to detect leakers among more number of trusted agents. Traditionally, water marking is used for detecting leakages which a unique code is embedded in each distributed copy. If any unauthorized party accesses the copy then traitor can be identified. Further, if data receipts are malicious then watermarks can sometimes destroyed. Later approaches use perturbation techniques that modify data and make it less sensitive before being handed to agents. Fake data allocation schemes and use of unobtrusive techniques like Allocation for Explicit Data Requests, Random Agent Selection, fake object allocation, Greedy Selection of agent for optimization, Data allocation, Object Selection etc were used to trace data leakages. But fails in scalability aspects as these techniques function with an assumption that there are a fixed set of agents with requests known in advance. Previously, a guilt assessment algorithm was proposed for distributing objects to agents, in a way that improves the chances of identifying a leaker. This model is for assessing the guilt of agents. Here, the fake objects acts like a type of watermark for the entire set, without any modifications in individual members. If it turns out that an agent was given one or more fake objects that were leaked, then the distributor can be more confident that agent was guilty. These strategies have limited functionality as they function with an assumption that there are a fixed set of agents with requests known in advance. In this paper, we uses Fake data allocation schemes along with unobtrusive techniques like Allocation for Explicit Data Requests, Random Agent Selection, fake object allocation, Greedy Selection of agent for optimization, Data allocation, Object Selection etc were used to trace data leakages and refines scalability issues by using staged event-driven architecture (SEDA) that is intended to support massive concurrency demands among trusted agents and simplifies the construction of well-conditioned services.
2 IJECSE,Volume1,Number 4 Paladugu Divya et al II RELATED WORK The data allocation strategies are concerned, mostly relevant to watermarking that is used as a means of establishing original ownership of distributed objects. Watermarks [2] were initially used in images, video, and audio data whose digital representation includes considerable redundancy. Recently, [1], [8], [9] and other works have also studied marks insertion to relational data [3]. Our approach and watermarking are similar in the sense of providing agents with some kind of receiver identifying information. However, by its very nature, a watermark [2] modifies the item being watermarked. If the object to be watermarked cannot be modified, then a watermark cannot be inserted. In such cases, methods that attach watermarks to the distributed data are not applicable. Water mark is added in to three types of files they are IMAGE,PDF&XLS forms and each format have its own type watermark. The guilt detection approach presented is related to the data provenance problem[3]: tracing the lineage of S objects implies essentially the detection of the guilty agents and assume some prior knowledge on the way a data view is created out of data sources. Our problem formulation with objects and sets is more general As far as the data allocation strategies[7] are concerned. Finally, there are also lots of other works [4], [7] on mechanisms that allow only authorized users to access sensitive data through access control policies[6]. Such approaches prevent in some sense data leakage by sharing information only with trusted parties. However, these policies are restrictive and may make it impossible to satisfy agents requests. III PROBLEM DEFINITION Suppose a distributor owns a set O = {o1,.., o m } of valuable data objects. The distributor wants to share some of the objects with a set of agents A1,A2,,An but does wish the objects be leaked to other third parties. An agent Ai receives a subset of objects Ri which belongs to O, determined either by a sample request or an explicit request, Sample Request Ri = SAMPLE (O, mi ) : Any subset of mi records from O can be given to Ai. Explicit Request Ri = EXPLICIT ( O,condi ) : Agent Ai receives all the O objects that satisfy condi. The objects in O could be of any type and size, e.g., they could be tuples in a relation, or relations in a database. After giving objects to agents, the distributor discovers that a set S of O has leaked. This means that some third party called the target has been caught in possession of S. For example, this target may be displaying S on its web site, or perhaps as part of a legal discovery process, the target turned over S to the distributor. Since the agents A1,A2,,An, have some of the data, it is reasonable to suspect them leaking the data. However, the agents can argue that they are innocent, and that the S data was obtained by the target through other means. IV AGENT GUILT MODEL In this model we taken O as the total content of objects and the R s are used as the set of objects given to the agents and s is the target set which contains the leaked objects. There are O={o 1,o 2,o 3 }; R1={o 1,o 3 }; R2={o 2,o 3 }; S={o 1,o 2,o 3 }. In this case, all three of the distributor s objects have been leaked and appear in S. Let us first consider how the target may have obtained object o 1, which was given to both agents. The target either guessed o 3 or one of A1 or A2 leaked it. We know that the probability of the former event is p, so assuming that probability that each of the two agents leaked o 3 is the same we have the following cases: the target guessed o 3 with probability p; agent A1 leaked o 3 to S with probability (1 - p)/2; agent A2 leaked o 3 to S with probability (1 -p)/2;
3 2303 Similarly, we find that agent A1 leaked o 2 to S with Probability 1 - p since he is the only agent that has o 2. Given these values, the probability that agent A1 is not Guilty, namely that A1 did not leak either object is: (1 -(1 - p)/2) -(1 -(1 - p)); And the probability that A1 is guilty is: 1 - Pr{G1} V DATA ALLOCATION Main problem in leakage detection is the data allocation: how can the distributor intelligently give data to agents in order to improve the chances of detecting a guilty agent. The two types of requests : sample and explicit. Fake objects are objects generated by the distributor that are not in set O. The objects are designed to look like real objects, and are distributed to agents together with O objects, in order to increase the chances of detecting agents that leak data. The distributor may be able to add fake objects to the distributed data in order to improve his effectiveness in detecting guilty agents. However, fake objects may impact the correctness of what agents do, so they may not always be allowable. The distributor gives the data to agents such that he can easily detect the guilty agent in case of leakage of data. To improve the chances of detecting guilty agent, he injects fake objects into the distributed dataset. These fake objects are created in such a manner that, agent cannot distinguish it from original objects. with the addition of fake tuples. Whenever any user request for the tuple it follows the following steps: 1. The request is sent by the user to the distributor. 2. The request may be implicit or explicit. 3. If it is implicit a subset of the data is given. 4. If request is explicit, it is checked with the log, if any previous request is same. 5. If request is same then system gives the data objects that are not given to previous agent. 6. The fake objects are added to agent s request set. 7. Leaked data set L, obtained by distributor is given as an input. 8. Calculate the guilt probability Gi of user. VI THE STAGED EVENT-DRIVEN ARCHITECTURE The staged eventdriven architecture (SEDA) is designed to enable high concurrency, load conditioning, and ease of engineering for Internet services which improve the scalability and a distributor can assess the likelihood of a leaker. SEDA decomposes an application into a network of stages separated by event queues and introduces the notion of dynamic resource controllers[10] to allow applications to adjust dynamically to changing load. SEDA Support massive concurrency[5], Simplify the construction of well-conditioned services, Enable introspection and Support self-tuning resource management. The fundamental unit of processing within SEDA is the stage. A stage is a self-contained application component consisting of an event handler, an incoming event queue, and a thread pool. Stage threads operate by pulling a batch of events off of the incoming event queue and invoking the application-supplied event handler. The event handler processes each batch of events, and dispatches zero or more events by enqueuing them on the event queues of other stages.
4 IJECSE,Volume1,Number 4 Paladugu Divya et al Fig: SEDA resource controllers The SEDA design facilitates debugging and performance analysis of services, which has traditionally been a challenge for complex multithreaded servers. The decomposition of application code into stages and explicit event delivery mechanisms facilitates inspection. To keep each stage within its operating regime, SEDA makes use of a set of resource controllers[10], which automatically adapt the resource usage of the stage based on observed performance and demand. Abstractly, a controller observes runtime characteristics of the stage and and adjusts allocation and scheduling[5] parameters to meet performance targets. Controllers can operate either with entirely local knowledge about a particular stage, or work in concert based on global state. The first is the thread pool controller, which adjusts the number of threads executing within each stage. The goal is to avoid allocating too many threads, but still have enough threads to meet the concurrency demands of the stage. The controller periodically samples the input queue and adds a thread when the queue length exceeds some threshold, up to a maximum number of threads per stage. Threads are removed from a stage when they are idle for a specified period of time. The second is the batching controller, which adjusts the number of events processed by each invocation of the event handler within a stage (the batching factor). The controller attempts to trade off these effects by searching for the smallest batching factor that sustains high throughput. It operates by observing the output rate of events from a stage (by maintaining a moving average across many samples) and decreases the batching factor until throughput begins to degrade. If throughput degrades slightly, the batching factor is increased by a small amount. The controller responds to sudden drops in load by resetting the batching factor to its maximum value. Each stage has an associated controller that adjusts its resource allocation and behavior to keep the application within its operating regime. The thread pool controller adjusts the number of threads executing within the stage, and the batching controller adjusts the number of events processed by each iteration of the event handler. By using this SEDA, the functionality of these techniques is extended to handle more number of agents. By using this model a distributor can assess the likelihood of a leaker among more number of trusted agents. VII CONCLUSION Data leakage is a silent type of threat. Major challenge for data holders to prevent data leakage because sometimes sensitive data must be handed over to supposedly trusted third parties. Earlier approaches use perturbation techniques that modify data and make it less sensitive before being handed to agents. Some other techniques Fails in scalability aspects as with an assumption that there are a fixed set of agents with requests known in advance. In this paper, we uses Fake data allocation schemes along with unobtrusive techniques like Allocation for Explicit Data Requests, Random Agent Selection, fake object allocation, Greedy Selection of agent for optimization, Data allocation, Object Selection etc were used to trace data leakages and refines scalability issues by using staged event-driven architecture (SEDA) that is intended to support massive concurrency demands among trusted agents and simplifies the construction of well-conditioned services. Using this model a distributor can assess the likelihood of a leaker among more number of trusted agents in the aftermath of a leak.
5 2305 VIII REFERENCES [1] L. Sweeney, Achieving k-anonymity privacy protection using generalization and suppression, River Edge, NJ, USA, pp , [2] R. Agrawal and J. Kiernan, Watermarking relational databases, in VLDB 02: Proceedings of the 28 th international conference on Very Large Data Bases. VLDB Endowment, 2002, pp [3] P. Buneman and W.-C.Tan, Provenance in Databases, Proc.ACM SIGMOD, pp , [4] P. Papadimitriou and H. Garcia-Molina, Data leakage detection, Stanford University, Tech. Rep., [Online]. Available: http: //dbpubs.stanford.edu/pub/ [5] T. Anderson, B. Bershad, E. Lazowska, and H. Levy. Scheduler activations: Effective kernel support for the user-level management of parallelism. ACM Transactions on Computer Systems, 10(1):53 79, February [6] S. Jajodia, P. Samarati, M.L. Sapino, and V.S. Subrahmanian, Flexible Support for Multiple Access Control Policies, ACM Trans. Database Systems, vol. 26, no. 2, pp , [7] Rudragouda G Patil, Development of Data leakage Detection Using Data Allocation Strategies International Journal of Computer Applications in Engineering Sciences,VOL I, ISSUE II, JUNE [8] J.J.K.O. Ruanaidh, W.J. Dowling, and F.M. Boland, Watermarking Digital Images for Copyright Protection, IEE Proc. Vision, Signal and Image Processing, vol. 143, no. 4, pp , [9] F. Guo, J. Wang, Z. Zhang, X. Ye, and D. Li, An Improved Algorithm to Watermark Numeric Relational Data, Information Security Applications, pp , Springer, [10] G. Banga, P. Druschel, and J. Mogul. Resource containers: A new facility for resource management in server systems. In Proc. Third Symposium on Operating Systems Design and Implementation (OSDI 99), February 1999.
AN EFFICIENT AND ROBUST MODEL FOR DATA LEAKAGE DETECTION SYSTEM
Volume 3, No. 6, June 2012 Journal of Global Research in Computer Science RESEARCH PAPER Available Online at www.jgrcs.info AN EFFICIENT AND ROBUST MODEL FOR DATA LEAKAGE DETECTION SYSTEM Janga Ajay Kumar
More informationVol. 2, Issue 3, May-Jun 2012, pp Data leakage Detection
Data leakage Detection Rohit Pol (Student), Vishwajeet Thakur (Student), Ruturaj Bhise (Student), Guide Prof. Akash Kate Maharashtra Academy of Engineering, University of Pune, Pune, Maharashtra, India
More informationDataLeakageDetection. Data Leakage Detection. By Rajesh Kumar Manav Rachna International University
Global Journal of Computer Science and Technology: E Network, Web & Security Volume 17 Issue 4 Version 1.0 Year 2017 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
More informationData Leakage Detection with K-Anonymity Algorithm
Data Leakage Detection with K-Anonymity Algorithm Wakhare Yashwant R #1, B. M. Patil *2 # MBES s College of Engineering, Ambajogai, Dr. Babasaheb Ambedkar Marathwada University, Aurangabad, India Abstract
More informationANGUILT TECHNOLOGY TO PREVENT DATA LEAKAGE AND ITS DETECTION ON CLOUD
Volume 118 No. 20 2018, 1935-1943 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu ANGUILT TECHNOLOGY TO PREVENT DATA LEAKAGE AND ITS DETECTION ON
More informationSEDA: An Architecture for Well-Conditioned, Scalable Internet Services
SEDA: An Architecture for Well-Conditioned, Scalable Internet Services Matt Welsh, David Culler, and Eric Brewer Computer Science Division University of California, Berkeley Operating Systems Principles
More informationE. Thenmozhi Research Scholar, PG and Research Department Nehru Memorial College (Autonomous) Puthanampatti, Tamilnadu, India
Volume 7, Issue 4, April 2017 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Data Leakage Detection
More informationAccumulative Privacy Preserving Data Mining Using Gaussian Noise Data Perturbation at Multi Level Trust
Accumulative Privacy Preserving Data Mining Using Gaussian Noise Data Perturbation at Multi Level Trust G.Mareeswari 1, V.Anusuya 2 ME, Department of CSE, PSR Engineering College, Sivakasi, Tamilnadu,
More informationSIMPLE AND EFFECTIVE METHOD FOR SELECTING QUASI-IDENTIFIER
31 st July 216. Vol.89. No.2 25-216 JATIT & LLS. All rights reserved. SIMPLE AND EFFECTIVE METHOD FOR SELECTING QUASI-IDENTIFIER 1 AMANI MAHAGOUB OMER, 2 MOHD MURTADHA BIN MOHAMAD 1 Faculty of Computing,
More informationChapter 4: Threads. Chapter 4: Threads. Overview Multicore Programming Multithreading Models Thread Libraries Implicit Threading Threading Issues
Chapter 4: Threads Silberschatz, Galvin and Gagne 2013 Chapter 4: Threads Overview Multicore Programming Multithreading Models Thread Libraries Implicit Threading Threading Issues 4.2 Silberschatz, Galvin
More informationResource Containers. A new facility for resource management in server systems. Presented by Uday Ananth. G. Banga, P. Druschel, J. C.
Resource Containers A new facility for resource management in server systems G. Banga, P. Druschel, J. C. Mogul OSDI 1999 Presented by Uday Ananth Lessons in history.. Web servers have become predominantly
More informationChapter 4: Threads. Operating System Concepts 9 th Edition
Chapter 4: Threads Silberschatz, Galvin and Gagne 2013 Chapter 4: Threads Overview Multicore Programming Multithreading Models Thread Libraries Implicit Threading Threading Issues Operating System Examples
More informationChapter 4: Threads. Chapter 4: Threads
Chapter 4: Threads Silberschatz, Galvin and Gagne 2013 Chapter 4: Threads Overview Multicore Programming Multithreading Models Thread Libraries Implicit Threading Threading Issues Operating System Examples
More informationChapter 4: Multithreaded Programming
Chapter 4: Multithreaded Programming Silberschatz, Galvin and Gagne 2013 Chapter 4: Multithreaded Programming Overview Multicore Programming Multithreading Models Thread Libraries Implicit Threading Threading
More informationModification and Evaluation of Linux I/O Schedulers
Modification and Evaluation of Linux I/O Schedulers 1 Asad Naweed, Joe Di Natale, and Sarah J Andrabi University of North Carolina at Chapel Hill Abstract In this paper we present three different Linux
More informationChapter 4: Threads. Operating System Concepts 9 th Edition
Chapter 4: Threads Silberschatz, Galvin and Gagne 2013 Chapter 4: Threads Overview Multicore Programming Multithreading Models Thread Libraries Implicit Threading Threading Issues Operating System Examples
More informationWatermarking for Security in Database
Watermarking for Security in Database Prof. Manoj Dhande Department of Computer Engineering of Shah and Anchor Kutchhi Engineering College, Chembur, University of manoj.dhande@gmail.com Aishwarya Kotyankar
More informationJoint Entity Resolution
Joint Entity Resolution Steven Euijong Whang, Hector Garcia-Molina Computer Science Department, Stanford University 353 Serra Mall, Stanford, CA 94305, USA {swhang, hector}@cs.stanford.edu No Institute
More informationInternational Journal of Software and Web Sciences (IJSWS) Web service Selection through QoS agent Web service
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) ISSN (Print): 2279-0063 ISSN (Online): 2279-0071 International
More informationABSTRACT I. INTRODUCTION
2018 IJSRSET Volume 4 Issue 4 Print ISSN: 2395-1990 Online ISSN : 2394-4099 Themed Section : Engineering and Technology An Efficient Search Method over an Encrypted Cloud Data Dipeeka Radke, Nikita Hatwar,
More informationSystem Models. 2.1 Introduction 2.2 Architectural Models 2.3 Fundamental Models. Nicola Dragoni Embedded Systems Engineering DTU Informatics
System Models Nicola Dragoni Embedded Systems Engineering DTU Informatics 2.1 Introduction 2.2 Architectural Models 2.3 Fundamental Models Architectural vs Fundamental Models Systems that are intended
More informationOPERATING SYSTEM. Chapter 4: Threads
OPERATING SYSTEM Chapter 4: Threads Chapter 4: Threads Overview Multicore Programming Multithreading Models Thread Libraries Implicit Threading Threading Issues Operating System Examples Objectives To
More informationADDITIVE GAUSSIAN NOISE BASED DATA PERTURBATION IN MULTI-LEVEL TRUST PRIVACY PRESERVING DATA MINING
ADDITIVE GAUSSIAN NOISE BASED DATA PERTURBATION IN MULTI-LEVEL TRUST PRIVACY PRESERVING DATA MINING R.Kalaivani #1,S.Chidambaram #2 # Department of Information Techology, National Engineering College,
More informationAuditing a Batch of SQL Queries
Auditing a Batch of SQL Queries Rajeev Motwani, Shubha U. Nabar, Dilys Thomas Department of Computer Science, Stanford University Abstract. In this paper, we study the problem of auditing a batch of SQL
More informationRule Enforcement with Third Parties in Secure Cooperative Data Access
Rule Enforcement with Third Parties in Secure Cooperative Data Access Meixing Le, Krishna Kant, and Sushil Jajodia George Mason University, Fairfax, VA 22030 {mlep,kkant,jajodia}@gmu.edu Abstract. In this
More informationChapter 4: Threads. Operating System Concepts 9 th Edit9on
Chapter 4: Threads Operating System Concepts 9 th Edit9on Silberschatz, Galvin and Gagne 2013 Chapter 4: Threads 1. Overview 2. Multicore Programming 3. Multithreading Models 4. Thread Libraries 5. Implicit
More informationA NEW WATERMARKING TECHNIQUE FOR SECURE DATABASE
Online Journal, www.ijcea.com A NEW WATERMARKING TECHNIQUE FOR SECURE DATABASE Jun Ziang Pinn 1 and A. Fr. Zung 2 1,2 P. S. University for Technology, Harbin 150001, P. R. China ABSTRACT Digital multimedia
More informationThe Concurrency Viewpoint
The Concurrency Viewpoint View Relationships The Concurrency Viewpoint 2 The Concurrency Viewpoint Definition: The Concurrency Viewpoint: describes the concurrency structure of the system and maps functional
More informationRouting Scheme in Energy efficient based Protocols for Wireless Sensor Networks
Routing Scheme in Energy efficient based Protocols for Wireless Sensor Networks 1 Chiranjeevi Rampilla, 2 Pallikonda Anil Kumar, 1 Student, DEPT.OF CSE, PVPSIT, KANURU, VIJAYAWADA. 2 Asst.Professor, DEPT.OF
More informationCPS221 Lecture: Threads
Objectives CPS221 Lecture: Threads 1. To introduce threads in the context of processes 2. To introduce UML Activity Diagrams last revised 9/5/12 Materials: 1. Diagram showing state of memory for a process
More informationA Report on RMI and RPC Submitted by Sudharshan Reddy B
A Report on RMI and RPC Submitted by Sudharshan Reddy B Abstract: This report mainly explains the RMI and RPC technologies. In the first part of the paper the RMI technology is briefly explained and in
More informationEfficient Regression Test Model for Object Oriented Software
Efficient Regression Test Model for Object Oriented Software Swarna Lata Pati College of Engg. & Tech, Bhubaneswar Abstract : This paper presents an efficient regression testing model with an integration
More informationSystematic Detection And Resolution Of Firewall Policy Anomalies
Systematic Detection And Resolution Of Firewall Policy Anomalies 1.M.Madhuri 2.Knvssk Rajesh Dept.of CSE, Kakinada institute of Engineering & Tech., Korangi, kakinada, E.g.dt, AP, India. Abstract: In this
More informationTrust Enhanced Cryptographic Role-based Access Control for Secure Cloud Data Storage
1 Trust Enhanced Cryptographic Role-based Access Control for Secure Cloud Data Storage Lan Zhou,Vijay Varadharajan,and Michael Hitchens Abstract Cloud data storage has provided significant benefits by
More informationAnnouncement. Exercise #2 will be out today. Due date is next Monday
Announcement Exercise #2 will be out today Due date is next Monday Major OS Developments 2 Evolution of Operating Systems Generations include: Serial Processing Simple Batch Systems Multiprogrammed Batch
More informationOperating Systems 2 nd semester 2016/2017. Chapter 4: Threads
Operating Systems 2 nd semester 2016/2017 Chapter 4: Threads Mohamed B. Abubaker Palestine Technical College Deir El-Balah Note: Adapted from the resources of textbox Operating System Concepts, 9 th edition
More informationA Transaction Processing Technique in Real-Time Object- Oriented Databases
122 IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.1, January 2008 A Transaction Processing Technique in Real-Time Object- Oriented Databases Woochun Jun Dept. of Computer
More informationFREQUENT ITEMSET MINING USING PFP-GROWTH VIA SMART SPLITTING
FREQUENT ITEMSET MINING USING PFP-GROWTH VIA SMART SPLITTING Neha V. Sonparote, Professor Vijay B. More. Neha V. Sonparote, Dept. of computer Engineering, MET s Institute of Engineering Nashik, Maharashtra,
More informationComparative Analysis of Anonymization Techniques
International Journal of Electronic and Electrical Engineering. ISSN 0974-2174 Volume 7, Number 8 (2014), pp. 773-778 International Research Publication House http://www.irphouse.com Comparative Analysis
More informationKeywords Data alignment, Data annotation, Web database, Search Result Record
Volume 5, Issue 8, August 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Annotating Web
More informationCS533 Concepts of Operating Systems. Jonathan Walpole
CS533 Concepts of Operating Systems Jonathan Walpole SEDA: An Architecture for Well- Conditioned Scalable Internet Services Overview What does well-conditioned mean? Internet service architectures - thread
More informationDynamic Search Technique Used for Improving Passive Source Routing Protocol in Manet
African Journal of Basic & Applied Sciences 9 (1): 27-32, 2017 ISSN 2079-2034 IDOSI Publications, 2017 DOI: 10.5829/idosi.ajbas.2017.27.32 Dynamic Search Technique Used for Improving Passive Source Routing
More informationLecture Topics. Announcements. Today: Threads (Stallings, chapter , 4.6) Next: Concurrency (Stallings, chapter , 5.
Lecture Topics Today: Threads (Stallings, chapter 4.1-4.3, 4.6) Next: Concurrency (Stallings, chapter 5.1-5.4, 5.7) 1 Announcements Make tutorial Self-Study Exercise #4 Project #2 (due 9/20) Project #3
More information02 - Distributed Systems
02 - Distributed Systems Definition Coulouris 1 (Dis)advantages Coulouris 2 Challenges Saltzer_84.pdf Models Physical Architectural Fundamental 2/60 Definition Distributed Systems Distributed System is
More informationIdentifying Stepping Stone Attack using Trace Back Based Detection Approach
International Journal of Security Technology for Smart Device Vol.3, No.1 (2016), pp.15-20 http://dx.doi.org/10.21742/ijstsd.2016.3.1.03 Identifying Stepping Stone Attack using Trace Back Based Detection
More informationResource Containers: A new facility for resource management in server systems. Outline
Resource Containers: A new facility for resource management in server systems By: Banga, Druschel and Mogul From: OSDI 99 presented by Peter Graham 2/21/2007 Resource Containers by Banga, Druschel and
More informationThreat Modeling. Bart De Win Secure Application Development Course, Credits to
Threat Modeling Bart De Win bart.dewin@ascure.com Secure Application Development Course, 2009 Credits to Frank Piessens (KUL) for the slides 2 1 Overview Introduction Key Concepts Threats, Vulnerabilities,
More informationDYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET
DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET S. J. Sultanuddin 1 and Mohammed Ali Hussain 2 1 Department of Computer Science Engineering, Sathyabama University,
More informationPPKM: Preserving Privacy in Knowledge Management
PPKM: Preserving Privacy in Knowledge Management N. Maheswari (Corresponding Author) P.G. Department of Computer Science Kongu Arts and Science College, Erode-638-107, Tamil Nadu, India E-mail: mahii_14@yahoo.com
More informationA Formal Model to Preserve Knowledge in Outsourced Datasets
A Formal Model to Preserve Knowledge in Outsourced Datasets 1 Veera Ragavan K, 2 Karthick S 1 ME Student, 2 Asst.Prof 1,2 Dept of Software Engineering, SRM University, Chennai, India 1 ragu.skp@gmail.com,
More informationA mining method for tracking changes in temporal association rules from an encoded database
A mining method for tracking changes in temporal association rules from an encoded database Chelliah Balasubramanian *, Karuppaswamy Duraiswamy ** K.S.Rangasamy College of Technology, Tiruchengode, Tamil
More informationSoftware Architecture
Software Architecture Does software architecture global design?, architect designer? Overview What is it, why bother? Architecture Design Viewpoints and view models Architectural styles Architecture asssessment
More informationChapter 4: Threads. Overview Multithreading Models Thread Libraries Threading Issues Operating System Examples Windows XP Threads Linux Threads
Chapter 4: Threads Overview Multithreading Models Thread Libraries Threading Issues Operating System Examples Windows XP Threads Linux Threads Chapter 4: Threads Objectives To introduce the notion of a
More informationSurvey Paper on Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,
More informationHigher-order Testing. Stuart Anderson. Stuart Anderson Higher-order Testing c 2011
Higher-order Testing Stuart Anderson Defining Higher Order Tests 1 The V-Model V-Model Stages Meyers version of the V-model has a number of stages that relate to distinct testing phases all of which are
More informationSecured Medical Data Publication & Measure the Privacy Closeness Using Earth Mover Distance (EMD)
Vol.2, Issue.1, Jan-Feb 2012 pp-208-212 ISSN: 2249-6645 Secured Medical Data Publication & Measure the Privacy Closeness Using Earth Mover Distance (EMD) Krishna.V #, Santhana Lakshmi. S * # PG Student,
More informationSupporting Fuzzy Keyword Search in Databases
I J C T A, 9(24), 2016, pp. 385-391 International Science Press Supporting Fuzzy Keyword Search in Databases Jayavarthini C.* and Priya S. ABSTRACT An efficient keyword search system computes answers as
More informationScalable GPU Graph Traversal!
Scalable GPU Graph Traversal Duane Merrill, Michael Garland, and Andrew Grimshaw PPoPP '12 Proceedings of the 17th ACM SIGPLAN symposium on Principles and Practice of Parallel Programming Benwen Zhang
More informationA Framework for Securing Databases from Intrusion Threats
A Framework for Securing Databases from Intrusion Threats R. Prince Jeyaseelan James Department of Computer Applications, Valliammai Engineering College Affiliated to Anna University, Chennai, India Email:
More informationAn Approach to Intensional Query Answering at Multiple Abstraction Levels Using Data Mining Approaches
An Approach to Intensional Query Answering at Multiple Abstraction Levels Using Data Mining Approaches Suk-Chung Yoon E. K. Park Dept. of Computer Science Dept. of Software Architecture Widener University
More informationCorrelation Based Feature Selection with Irrelevant Feature Removal
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,
More informationISSN Vol.08,Issue.16, October-2016, Pages:
ISSN 2348 2370 Vol.08,Issue.16, October-2016, Pages:3146-3152 www.ijatir.org Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation VEDIRE AJAYANI 1, K. TULASI 2, DR P. SUNITHA
More informationLightweight Remote Procedure Call
Lightweight Remote Procedure Call Brian N. Bershad, Thomas E. Anderson, Edward D. Lazowska, Henry M. Levy ACM Transactions Vol. 8, No. 1, February 1990, pp. 37-55 presented by Ian Dees for PSU CS533, Jonathan
More informationADVANCES in NATURAL and APPLIED SCIENCES
ADVANCES in NATURAL and APPLIED SCIENCES ISSN: 1995-0772 Published BY AENSI Publication EISSN: 1998-1090 http://www.aensiweb.com/anas 2016 May 10(5): pages 223-227 Open Access Journal An Efficient Proxy
More informationGPU Programming Using NVIDIA CUDA
GPU Programming Using NVIDIA CUDA Siddhante Nangla 1, Professor Chetna Achar 2 1, 2 MET s Institute of Computer Science, Bandra Mumbai University Abstract: GPGPU or General-Purpose Computing on Graphics
More informationObtaining Rough Set Approximation using MapReduce Technique in Data Mining
Obtaining Rough Set Approximation using MapReduce Technique in Data Mining Varda Dhande 1, Dr. B. K. Sarkar 2 1 M.E II yr student, Dept of Computer Engg, P.V.P.I.T Collage of Engineering Pune, Maharashtra,
More information[Nitnaware *, 5(11): November 2018] ISSN DOI /zenodo Impact Factor
[Nitnaware *, 5(11): November 218] ISSN 2348 834 DOI- 1.5281/zenodo.1495289 Impact Factor- 5.7 GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES INVESTIGATION OF DETECTION AND PREVENTION SCHEME FOR
More informationSecure Data Deduplication with Dynamic Ownership Management in Cloud Storage
Secure Data Deduplication with Dynamic Ownership Management in Cloud Storage Dr.S.Masood Ahamed 1, N.Mounika 2, N.vasavi 3, M.Vinitha Reddy 4 HOD, Department of Computer Science & Engineering,, Guru Nanak
More informationPoints-to Analysis of RMI-based Java Programs
Computing For Nation Development, February 25 26, 2010 Bharati Vidyapeeth s Institute of Computer Applications and Management, New Delhi Points-to Analysis of RMI-based Java Programs Yogesh Pingle M.E.(Comp.),
More informationUser Task Automator. Himanshu Prasad 1, P. Geetha Priya 2, S.Manjunatha 3, B.H Namratha 4 and Rekha B. Venkatapur 5 1,2,3&4
Asian Journal of Engineering and Applied Technology ISSN: 2249-068X Vol. 6 No. 1, 2017, pp.40-44 The Research Publication, www.trp.org.in Himanshu Prasad 1, P. Geetha Priya 2, S.Manjunatha 3, B.H Namratha
More informationTop-k Keyword Search Over Graphs Based On Backward Search
Top-k Keyword Search Over Graphs Based On Backward Search Jia-Hui Zeng, Jiu-Ming Huang, Shu-Qiang Yang 1College of Computer National University of Defense Technology, Changsha, China 2College of Computer
More informationInternational Journal of Advance Engineering and Research Development. AN Optimal Matrix Approach for virtual load allocation and data sharing
Scientific Journal of Impact Factor (SJIF): 5.71 International Journal of Advance Engineering and Research Development Volume 5, Issue 02, February -2018 e-issn (O): 2348-4470 p-issn (P): 2348-6406 AN
More information(Refer Slide Time: 1:26)
Information Security-3 Prof. V Kamakoti Department of Computer science and Engineering Indian Institute of Technology Madras Basics of Unix and Network Administration Operating Systems Introduction Mod01,
More informationAccountability in Privacy-Preserving Data Mining
PORTIA Privacy, Obligations, and Rights in Technologies of Information Assessment Accountability in Privacy-Preserving Data Mining Rebecca Wright Computer Science Department Stevens Institute of Technology
More informationA Supervised Method for Multi-keyword Web Crawling on Web Forums
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,
More informationBuffer Overflow attack avoiding Signature free technique
Buffer Overflow attack avoiding Signature free technique Umesh Deshmukh Student of Comuter Engineering S.E.C.O.E.Kopargaon,A Nagar Maharastra,India Prof.P.N.Kalawadekar Department of Computer Engineering
More informationSTUDY AND COMPARISION OF PROACTIVE AND REACTIVE ROUTING PROTOCOL FOR MULTICHANNEL WIRELESS AD-HOC NETWORK
STUDY AND COMPARISION OF PROACTIVE AND REACTIVE ROUTING PROTOCOL FOR MULTICHANNEL WIRELESS AD-HOC NETWORK 1 Arpita Singh, 2 Navendu Nitin, 3 Neelesh Agrawal, 4 Arvind Kumar Jaiswal 1 PG student, SHIATS-DU,
More informationOperating System. Chapter 4. Threads. Lynn Choi School of Electrical Engineering
Operating System Chapter 4. Threads Lynn Choi School of Electrical Engineering Process Characteristics Resource ownership Includes a virtual address space (process image) Ownership of resources including
More informationSystem Call. Preview. System Call. System Call. System Call 9/7/2018
Preview Operating System Structure Monolithic Layered System Microkernel Virtual Machine Process Management Process Models Process Creation Process Termination Process State Process Implementation Operating
More informationResource Containers: A New Facility for Resource Management in Server Systems
Resource Containers: A New Facility for Resource Management in Server Systems Gaurav Banga, Peter Druschel, Jeffrey C. Mogul February 1999 Presented for EECS 443, Northwestern University Stephen Brenner
More informationChapter 4: Multi-Threaded Programming
Chapter 4: Multi-Threaded Programming Chapter 4: Threads 4.1 Overview 4.2 Multicore Programming 4.3 Multithreading Models 4.4 Thread Libraries Pthreads Win32 Threads Java Threads 4.5 Implicit Threading
More informationFault Identification from Web Log Files by Pattern Discovery
ABSTRACT International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 2 ISSN : 2456-3307 Fault Identification from Web Log Files
More informationAn Improved Priority Dynamic Quantum Time Round-Robin Scheduling Algorithm
An Improved Priority Dynamic Quantum Time Round-Robin Scheduling Algorithm Nirali A. Patel PG Student, Information Technology, L.D. College Of Engineering,Ahmedabad,India ABSTRACT In real-time embedded
More informationInternational Journal of Computer Engineering and Applications, Volume IX, Issue X, Oct. 15 ISSN
DIVERSIFIED DATASET EXPLORATION BASED ON USEFULNESS SCORE Geetanjali Mohite 1, Prof. Gauri Rao 2 1 Student, Department of Computer Engineering, B.V.D.U.C.O.E, Pune, Maharashtra, India 2 Associate Professor,
More informationSurvey Result on Privacy Preserving Techniques in Data Publishing
Survey Result on Privacy Preserving Techniques in Data Publishing S.Deebika PG Student, Computer Science and Engineering, Vivekananda College of Engineering for Women, Namakkal India A.Sathyapriya Assistant
More informationChallenges in Mobile Ad Hoc Network
American Journal of Engineering Research (AJER) e-issn: 2320-0847 p-issn : 2320-0936 Volume-5, Issue-5, pp-210-216 www.ajer.org Research Paper Challenges in Mobile Ad Hoc Network Reshma S. Patil 1, Dr.
More informationAn Optimal Locking Scheme in Object-Oriented Database Systems
An Optimal Locking Scheme in Object-Oriented Database Systems Woochun Jun Le Gruenwald Dept. of Computer Education School of Computer Science Seoul National Univ. of Education Univ. of Oklahoma Seoul,
More informationImproved Mechanism for Efficient object Pooling in J2ME Based Mobile Phone
Abstract Nowadays mobile phones are expected to handle huge volume of multimedia data which is very challenging due to the small memory size of the mobile phone sets. J2ME services play an important role
More informationTest Cases Generation from UML Activity Diagrams
Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing Test Cases Generation from UML Activity Diagrams Hyungchoul Kim, Sungwon
More informationTrustworthiness Based Authorization on WWW
CERIAS Tech Report 2002-08 Trustworthiness Based Authorization on WWW Y. Zong, B. Bhargava, M. Mahoui Center for Education and Research in Information Assurance and Security & Department of Computer Science,
More informationImplementation of Aggregate Function in Multi Dimension Privacy Preservation Algorithms for OLAP
324 Implementation of Aggregate Function in Multi Dimension Privacy Preservation Algorithms for OLAP Shivaji Yadav(131322) Assistant Professor, CSE Dept. CSE, IIMT College of Engineering, Greater Noida,
More informationImproved Frequent Pattern Mining Algorithm with Indexing
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 16, Issue 6, Ver. VII (Nov Dec. 2014), PP 73-78 Improved Frequent Pattern Mining Algorithm with Indexing Prof.
More informationProposed System. Start. Search parameter definition. User search criteria (input) usefulness score > 0.5. Retrieve results
, Impact Factor- 5.343 Hybrid Approach For Efficient Diversification on Cloud Stored Large Dataset Geetanjali Mohite 1, Prof. Gauri Rao 2 1 Student, Department of Computer Engineering, B.V.D.U.C.O.E, Pune,
More informationIJSER. Virtualization Intrusion Detection System in Cloud Environment Ku.Rupali D. Wankhade. Department of Computer Science and Technology
ISSN 2229-5518 321 Virtualization Intrusion Detection System in Cloud Environment Ku.Rupali D. Wankhade. Department of Computer Science and Technology Abstract - Nowadays all are working with cloud Environment(cloud
More informationLearning Outcomes. Processes and Threads. Major Requirements of an Operating System. Processes and Threads
Learning Outcomes Processes and Threads An understanding of fundamental concepts of processes and threads 1 2 Major Requirements of an Operating System Interleave the execution of several processes to
More informationAn Approach for Privacy Preserving in Association Rule Mining Using Data Restriction
International Journal of Engineering Science Invention Volume 2 Issue 1 January. 2013 An Approach for Privacy Preserving in Association Rule Mining Using Data Restriction Janakiramaiah Bonam 1, Dr.RamaMohan
More informationGround truth and evaluation for latent fingerprint matching
Ground truth and evaluation for latent fingerprint matching Anna Mikaelyan and Josef Bigun Halmstad University SE-0118 Halmstad {anna.mikaelyan,josef.bigun}@hh.se Abstract In forensic fingerprint studies
More informationChapter 4: Multithreaded Programming. Operating System Concepts 8 th Edition,
Chapter 4: Multithreaded Programming, Silberschatz, Galvin and Gagne 2009 Chapter 4: Multithreaded Programming Overview Multithreading Models Thread Libraries Threading Issues 4.2 Silberschatz, Galvin
More informationIntrusion Detection and Prevention in Internet of Things
IJSRD National Conference on Advances in Computer Science Engineering & Technology May 2017 ISSN: 2321-0613 Intrusion Detection and Prevention in Internet of Things Mr. Maulik Bhensdadia 1 Mr. Aditya Kumar
More informationCPS221 Lecture: Operating System Protection
Objectives CPS221 Lecture: Operating System Protection last revised 9/5/12 1. To explain the use of two CPU modes as the basis for protecting privileged instructions and memory 2. To introduce basic protection
More information