A Cryptographic Privacy Preserving Approach over Classification
|
|
- Dortha Freeman
- 6 years ago
- Views:
Transcription
1 A Cryptographic Privacy Preserving Approach over Classification Sivasankar Vakkalagadda *, Satyanarayana Mummana # Final M.Tech Student, Assistant Professor Department of CSE, Avanthi Institute of Engineering & Technology, Visakhapatnam. Andhra Pradesh Abstract:- We proposed an efficient privacy preserving technique during the classification of data. We introduce a Cryptographic based approach that protects centralized sample data sets utilized for decision tree mining of data. Preservation of privacy is applied to sanitize the samples prior to their release to third parties in order to mitigate the threat of their inadvertent disclosure or reveal. In contrast to other sanitization approaches, our approach does not affect the accuracy efficiency of results of data mining.the decision tree can be built directly from the pre-processed data sets, it means originals do not need to be formed. Moreover, this approach provides an efficient privacy preserving technique over data mining and can be applied at any time during the data collection process so that privacy protection can be in effect even while samples are still being collected. I. INTRODUCTION Explosive progress in networking, storage, and processor technologies has led to the creation of ultra large databases that record unprecedented amount of transactional information. In tandem with this dramatic growth in digital data, concerns about informational privacy have emerged globally [1] [2] [3]. Privacy issues are further exacerbated now that the World Wide Web makes it easy for the new data to be automatically collected and added to databases [4] [5] [6] [17] The concerns over massive collection of data are naturally extending to analytic tools applied to relevant data. During the mining, with its promise to efficiently discover worthy, non-obvious information from large databases, is particularly vulnerable to misuse [9] [10][18].A fruitful direction for future research in data mining will be the development of techniques that incorporate Privacy reasons. Particularly, we address the following question. Because the primary task in data mining is the development of models about computed data, can we develop accurate models without access to Precise information in individual data records? The underlying assumption is that a person will be willing to selectively divulge information in exchange of value such models can provide Example of the value provided include Filtering to weed out unwanted information, better search results with less effort, and Automatic triggers [11]. A recent survey of web users [12] classified 17% of respondents as privacy fun damentalists who will not provide data to a web site even if privacy protection measures are in place. How- ever, the concerns of 56% of respondents constituting the pragmatic majority were significantly reduced by the presence of privacy protection measures. The remaining 27% were marginally concerned and generally willing to provide data to web sites, although they often expressed a mild general concern about privacy. Another recent survey of web users [Wes99] found that 86% of respondents believe that participation in information for benefits programs is a matter of individual privacy choice. A resounding 82% said that having a privacy policy would matter; only 14% said that was not important as long as they got benefit. Furthermore, people are not equally protective of every field in their data records [14] [16]. Specifically, a person may not divulge at all the values of certain fields; may not mind giving true values of certain fields, may be willing to give not true values but modified values of certain fields. Given a population that satisfies the above assumptions, we address the concrete problem of building decision-tree classifiers [14] [15] and show that it is possible to develop accurate models while respecting users' privacy concerns. Classification is one the most used tasks in data mining. Decision-tree classifiers are relatively fast, efficient and yield comprehensible models, and obtain similar and sometimes better accuracy than other classification methods [13]. We introduce a new perturbation and randomization based approach that protects centralized sample data sets utilized for decision tree mining of data. II. RELATED WORK Previous work in privacy-preserving data mining has addressed two issues. In one, the aim is to preserve customer privacy by perturbing the data values [1]. In this scheme random noise data is introduced to distort sensitive values, and the distribution of the random data is used to generate a new data distribution which is close to the original data Distribution without revealing the original data values. The estimated original data distribution is used to reconstruct the data, and data mining techniques, such as classifiers and Association rules are applied to the reconstructed data set and after refinement of this approach have tightened estimation of original values based on the distorted data [2]. The data distortion approach has also been applied to Boolean values in research work. Perturbation methods and their privacy protection have been criticized because some methods may derive private information from the reconstruction step [9]. ISSN: Page 3191
2 Different to the original noise additive method in [1], many distinctive perturbation methods have been proposed. One important category is multiplicative perturbation method. During the concern of geometric property data multiplying the original data values with a random noise matrix is to rotate the matrix representation of the original data, so it is also called rotated based perturbation. In [4], authors have given a sound proof of Rotation invariant Classifiers to show some data mining tools can be directly applied to the rotation based perturbed data. In the later work [11], Liu et al have proposed multiplicative random projection which provided more enhanced privacy protection. There are some other interesting techniques, such as condensation based approach [10] matrix decomposition and so on. As pointed out in [12], these recently research on perturbation based approaches apply the data mining techniques directly on the perturbed data skipping the reconstruction step. Choosing the suitable data mining techniques is determined by the method which noise has been introduced and our knowledge, very few works focus on mapping or modifying the data mining techniques to meet the perturbation data needs. The other approach uses cryptographic tools to build data mining models. For example, in [10], the goal is to securely Build an ID3 decision tree where the training set is distributed between two parties. Different solutions were given to address different data mining problems using cryptographic techniques (e.g., [6, 8, 18]). This approach treats privacypreserving data mining as a special case of secure multiparty computation and not only aims for preserving individual privacy but also tries to preserve leakage of any information other than the final result. In this paper we are introducing an efficient privacy preserving cryptographic approach for the classification of the datasets without exposing the user sensitive information to the external world III. PROPOSED WORK In this paper we are proposing a cryptographic classification approach Plain Dataset Data Owner Original Rules Decoder Encoder Cipher Dataset Figure1.Privacy preserving Architecture The above architecture describes as follows Initialize Training Datasets for Machine Learning: Datasets are the collection of tuples with respect to different attributes and possible values for each attribute and with class labels, is given for the classification process for analyzing the testing set behaviour with machine learning approach. Synthetic dataset can be gathered for the classification of results. Initially data set can be forwarded to the encoder, encoder returns the cipher dataset. Unrealized Dataset Creation Cipher Dataset Cipher Classification Rules CC rules Analyst Cipher Rules Classifier Dataset Usually data can be passed to the analysts for the machine learning purpose, but there is a privacy preserving issue regarding the confidential information. So in this paper we introduced AES algorithm for the privacy issue. After applying this mechanism dataset can be constructed as unrealized dataset. i.e cipher dataset can be passed to the analyst for the classification instead of plain sensitive or confidential information. Classification with ID3 : ID3 is one of the efficient Machine learning approaches for implementing the decision trees. Decision trees are used for classification purpose. Tree can be constructed based on the attribute based entropy or information gain values. We can efficiently analyze the classification rules by sending the testing data on to the training datasets. ISSN: Page 3192
3 Retrieval of Original classified results After generating the classification results, results can be passed to the Data owner, there administrator can perform attribute oriented decryption for the resulted set. Original data set can reconstruct by the decoder and classified rules can be obtained finally at the data owner end. Gain measures how well a given attribute separates training examples into targeted classes. The one with the highest information is selected and in order to define gain, we first borrow an idea from information theory called entropy and it measures the amount of information in an attribute This is the formula for calculating homogeneity of a sample. Experimental Analysis ID3 builds a decision tree from a static sanitized examples and the resulting tree is used to classify future samples and example has several attributes and belongs to a class (like yes or no decision label) and the leaf nodes of the decision tree contain the class name whereas a non-leaf node is a conditional node and that decision node is an attribute test with each branch (to another decision tree) being a possible value of the attribute. ID3 uses information gain to help it decide which attribute goes into a decision node. The advantage of learning a decision tree is that a program, better than a knowledge engineer, draw out knowledge from an expert. It helps to measure the information gain with respect to the attributes Gain( A) E( Current set) E( all child sets) Our Experimental result purposes we are using a synthetic dataset, the following dataset at Data owner side before converting to unrealized dataset, after converting the dataset to unrealized dataset, data owner forwards to the analyst. Figure2. Original Data at Owner At analyst end,he constructs the decision tree for Unrealized dataset which is encrypted,based on information gain and analyzes the testing data with training or unrealized dataset. ISSN: Page 3193
4 Figure3. Unrealized Dataset Decision tree constructed with the class labels based on information gain, in terms of entropy, the tree can be shown as follows. Figure 4. Tree and Eligible Data ISSN: Page 3194
5 Final eligible Data After decryption at Data owner end can be shown as follows Figure5. Eligible Data after Classification and Decryption IV. CONCLUSION In this paper we proposed an efficient privacy preservation technique during classification of unreal datasets. It prevents the data owner from the un authorized access and privacy issues, Our proposed approach works efficiently with our violating the classification properties. Meanwhile, an accurate decision tree can be built directly from those unreal data sets. Finally the results yield accurate results even though classification applies on the cipher dataset. REFERENCES [1] R. Agrawal and R. Srikant, Privacy Preserving Data Mining, Proc. ACM SIGMOD Conf. Management of Data (SIGMOD 00), pp , May [2] S.L. Wang and A. Jafari, Hiding Sensitive Predictive Association Rules, Proc. IEEE Int l Conf. Systems, Man and Cybernetics, pp , [3] S. Ajmani, R. Morris, and B. Liskov, A Trusted Third- Party Computation Service, Technical Report MIT-LCS- TR-847, MIT, [4] Q. Ma and P. Deng, Secure Multi-Party Protocols for Privacy Preserving Data Mining, Proc. Third Int l Conf. Wireless Algorithms, Systems, and Applications (WASA 08), pp , [5] N. Lomas, Data on 84,000 United Kingdom Prisoners is Lost, Retrieved Sept. 12, 2008, Aug [6] J. Gitanjali, J. Indumathi, N.C. Iyengar, and N. Sriman, A Pristine Clean Cabalistic Foruity Strategize Based Approach for Incremental Data Stream Privacy Preserving Data Mining, Proc. IEEE Second Int l Advance Computing Conf. (IACC), pp , [7] S. Bu, L. Lakshmanan, R. Ng, and G. Ramesh, Preservation of Patterns and Input-Output Privacy, Proc. IEEE 23rd Int l Conf. Data Eng., pp , Apr [8] S. Russell and N. Peter, Artificial Intelligence. A Modern Approach 2/ E. Prentice-Hall, [9] D. Goodin, Hackers Infiltrate TD Ameritrade client Database, Retrieved Sept.2008, meritrade_database_burgled/, Sept [10] L. Liu, M. Kantarcioglu, and B. Thuraisingham, Privacy Preserving Decision Tree Mining from Perturbed Data, Proc. 42 nd Hawaii Int l Conf. System Sciences (HICSS 09), [11] Y. Zhu, L. Huang, W. Yang, D. Li, Y. Luo, and F. Dong, Three New Approaches to Privacy-Preserving Add to Multiply Protocol and Its Application, Proc. Second Int l Workshop Knowledge Discovery and Data Mining, (WKDD 09), pp , [12] J. Vaidya and C. Clifton, Privacy Preserving Association Rule Mining in Vertically Partitioned Data, ISSN: Page 3195
6 Proc Eighth ACM SIGKDD Int l Conf. Knowledge Discovery and Data Mining (KDD 02), pp , July [13] J. Dowd, S. Xu, and W. Zhang, Privacy-Preserving Decision Tree Mining Based on Random Substitions, Proc. Int l Conf. Emerging Trends in Information and Comm. Security (ETRICS 06), pp , (HICSS), pp. 1-9, [14] C. Aggarwal and P. Yu, Privacy-Preserving Data Mining:, Models and Algorithms. Springer, [15] L. Sweeney, k-anonymity: A Model for Protecting Privacy, Int l J. Uncertainty, Fuzziness and Knowledgebased Systems, vol. 10, pp , May [16] M. Shaneck and Y. Kim, Efficient Cryptographic Primitives for Private Data Mining, Proc. 43rd Hawaii Int l Conf. System Sciences [7] BBC News Brown Apologises for Records Loss. Retrieved Sept. 12, 2008, stm, Nov BIOGRAPHIES Satyanarayana Mummana is working as an Asst. Professor in Avanthi Institute of Engineering & Technology, Visakhapatnam, Andhra Pradesh. He has received his Masters degree (MCA) from Gandhi Institute of Technology and Management (GITAM), Visakhapatnam and M.Tech (CSE) from Avanthi Institute of Engineering & Technology, Visakhapatnam. Andhra Pradesh. His research areas include Image Processing, Computer Networks, Data Mining, Distributed Systems, Cloud Computing. Sivasankar Vakkalagadda Completed his B.Tech and pursuing M.Tech in from Avanthi Institute of Engineering & Technology, Visakhapatnam. Andhra Pradesh Interesting areas are Java and data mining and web technologies and Oracle database. [8] D. Kaplan, Hackers Steal 22,000 Social Security Numbers from Univ. of Missouri Database, Retrieved Sept. 2008, com/hackers-steal Social-Security-numbers-from- Univ.-of-Missouridatabase/article/34964/, May [19] P.K. Fong, Privacy Preservation for Training Data Sets in Database: Application to Decision Tree Learning, master s thesis, Dept. of Computer Science, Univ. of Victoria, [20] R. Buyya, C. S. Yeo, and S. Venugopal, Marketoriented cloud computing: Vision, hype, and reality for delivering it services as computing utilities, in Proc. IEEE Conf. High Performance Comput. Commun., Sep. 2008, pp [21] W. K. Wong, D. W. Cheung, E. Hung, B. Kao, and N. Mamoulis, Security in outsourcing of association rule mining, in Proc. Int. Conf. Very Large Data Bases, 2007, pp [22] F. Giannotti, L. V. Lakshmanan, A. Monreale, D. Pedreschi, and H. Wang, Privacy-preserving data mining from outsourced databases, in Proc. SPCC2010 Conjunction with CPDP, 2010, pp [23] S. J. Rizvi and J. R. Haritsa, Maintaining data privacy in association rule mining, in Proc. Int. Conf. Very Large Data Bases, 2002, pp ISSN: Page 3196
Privacy Preserving On Continuous and Discrete Data Sets- A Novel Approach
Privacy Preserving On Continuous and Discrete Data Sets- A Novel Approach Sathya Rangasamy, 1 P.Suvithavani 2 1 M.E Computer Science and Engineering, Sri Shakthi Institute of Engineering and Technology,
More informationVerifying Result Correctness of Outsourced Frequent Item set Mining using Rob Frugal Algorithm
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 5.258 IJCSMC,
More informationAccumulative Privacy Preserving Data Mining Using Gaussian Noise Data Perturbation at Multi Level Trust
Accumulative Privacy Preserving Data Mining Using Gaussian Noise Data Perturbation at Multi Level Trust G.Mareeswari 1, V.Anusuya 2 ME, Department of CSE, PSR Engineering College, Sivakasi, Tamilnadu,
More informationFREQUENT ITEMSET MINING USING PFP-GROWTH VIA SMART SPLITTING
FREQUENT ITEMSET MINING USING PFP-GROWTH VIA SMART SPLITTING Neha V. Sonparote, Professor Vijay B. More. Neha V. Sonparote, Dept. of computer Engineering, MET s Institute of Engineering Nashik, Maharashtra,
More informationThe Applicability of the Perturbation Model-based Privacy Preserving Data Mining for Real-world Data
The Applicability of the Perturbation Model-based Privacy Preserving Data Mining for Real-world Data Li Liu, Murat Kantarcioglu and Bhavani Thuraisingham Computer Science Department University of Texas
More informationPrivacy and Security Ensured Rule Mining under Partitioned Databases
www.ijiarec.com ISSN:2348-2079 Volume-5 Issue-1 International Journal of Intellectual Advancements and Research in Engineering Computations Privacy and Security Ensured Rule Mining under Partitioned Databases
More informationMultilevel Data Aggregated Using Privacy Preserving Data mining
Multilevel Data Aggregated Using Privacy Preserving Data mining V.Nirupa Department of Computer Science and Engineering Madanapalle, Andhra Pradesh, India M.V.Jaganadha Reddy Department of Computer Science
More informationDistributed Bottom up Approach for Data Anonymization using MapReduce framework on Cloud
Distributed Bottom up Approach for Data Anonymization using MapReduce framework on Cloud R. H. Jadhav 1 P.E.S college of Engineering, Aurangabad, Maharashtra, India 1 rjadhav377@gmail.com ABSTRACT: Many
More informationADDITIVE GAUSSIAN NOISE BASED DATA PERTURBATION IN MULTI-LEVEL TRUST PRIVACY PRESERVING DATA MINING
ADDITIVE GAUSSIAN NOISE BASED DATA PERTURBATION IN MULTI-LEVEL TRUST PRIVACY PRESERVING DATA MINING R.Kalaivani #1,S.Chidambaram #2 # Department of Information Techology, National Engineering College,
More informationPrivacy Preserving Decision Tree Mining from Perturbed Data
Privacy Preserving Decision Tree Mining from Perturbed Data Li Liu Global Information Security ebay Inc. liiliu@ebay.com Murat Kantarcioglu and Bhavani Thuraisingham Computer Science Department University
More informationHiding Sensitive Predictive Frequent Itemsets
Hiding Sensitive Predictive Frequent Itemsets Barış Yıldız and Belgin Ergenç Abstract In this work, we propose an itemset hiding algorithm with four versions that use different heuristics in selecting
More informationPrivacy Preserving Mining Techniques and Precaution for Data Perturbation
Privacy Preserving Mining Techniques and Precaution for Data Perturbation J.P. Maurya 1, Sandeep Kumar 2, Sushanki Nikhade 3 1 Asst.Prof. C.S Dept., IES BHOPAL 2 Mtech Scholar, IES BHOPAL 1 jpeemaurya@gmail.com,
More informationPreserving Data Mining through Data Perturbation
Preserving Data Mining through Data Perturbation Mr. Swapnil Kadam, Prof. Navnath Pokale Abstract Data perturbation, a widely employed and accepted Privacy Preserving Data Mining (PPDM) approach, tacitly
More information. (1) N. supp T (A) = If supp T (A) S min, then A is a frequent itemset in T, where S min is a user-defined parameter called minimum support [3].
An Improved Approach to High Level Privacy Preserving Itemset Mining Rajesh Kumar Boora Ruchi Shukla $ A. K. Misra Computer Science and Engineering Department Motilal Nehru National Institute of Technology,
More informationPrivacy Preserving Decision Tree Classification on Horizontal Partition Data
Privacy Preserving Decision Tree Classification on Horizontal Partition Kamini D. Tandel Shri S ad Vidya Mandal Institute of Technology Bharuch, Gujarat, India Jignasa N. Patel Shri S ad Vidya Mandal Institute
More informationA Survey on: Privacy Preserving Mining Implementation Techniques
A Survey on: Privacy Preserving Mining Implementation Techniques Mukesh Kumar Dangi P.G. Scholar Computer Science & Engineering, Millennium Institute of Technology Bhopal E-mail-mukeshlncit1987@gmail.com
More informationAn Approach for Privacy Preserving in Association Rule Mining Using Data Restriction
International Journal of Engineering Science Invention Volume 2 Issue 1 January. 2013 An Approach for Privacy Preserving in Association Rule Mining Using Data Restriction Janakiramaiah Bonam 1, Dr.RamaMohan
More informationUNCOVERING OF ANONYMOUS ATTACKS BY DISCOVERING VALID PATTERNS OF NETWORK
UNCOVERING OF ANONYMOUS ATTACKS BY DISCOVERING VALID PATTERNS OF NETWORK Dr G.Charles Babu Professor MRE College Secunderabad, India. charlesbabu26@gmail.com N.Chennakesavulu Assoc.Professor Wesley PG
More informationA Review on Privacy Preserving Data Mining Approaches
A Review on Privacy Preserving Data Mining Approaches Anu Thomas Asst.Prof. Computer Science & Engineering Department DJMIT,Mogar,Anand Gujarat Technological University Anu.thomas@djmit.ac.in Jimesh Rana
More informationReconstruction-based Classification Rule Hiding through Controlled Data Modification
Reconstruction-based Classification Rule Hiding through Controlled Data Modification Aliki Katsarou, Aris Gkoulalas-Divanis, and Vassilios S. Verykios Abstract In this paper, we propose a reconstruction
More informationEFFICIENT DATA SHARING WITH ATTRIBUTE REVOCATION FOR CLOUD STORAGE
EFFICIENT DATA SHARING WITH ATTRIBUTE REVOCATION FOR CLOUD STORAGE Chakali Sasirekha 1, K. Govardhan Reddy 2 1 M.Tech student, CSE, Kottam college of Engineering, Chinnatekuru(V),Kurnool,Andhra Pradesh,
More informationPrivacy Preserving Two-Layer Decision Tree Classifier for Multiparty Databases
Privacy Preserving Two-Layer Decision Tree Classifier for Multiparty Databases Alka Gangrade T.I.T.-M.C.A. Technocrats Institute of Technology Bhopal, India alkagangrade@yahoo.co.in Ravindra Patel Dept.
More informationA compact Aggregate key Cryptosystem for Data Sharing in Cloud Storage systems.
A compact Aggregate key Cryptosystem for Data Sharing in Cloud Storage systems. G Swetha M.Tech Student Dr.N.Chandra Sekhar Reddy Professor & HoD U V N Rajesh Assistant Professor Abstract Cryptography
More informationSA-IFIM: Incrementally Mining Frequent Itemsets in Update Distorted Databases
SA-IFIM: Incrementally Mining Frequent Itemsets in Update Distorted Databases Jinlong Wang, Congfu Xu, Hongwei Dan, and Yunhe Pan Institute of Artificial Intelligence, Zhejiang University Hangzhou, 310027,
More informationPRIVACY PRESERVING IN DISTRIBUTED DATABASE USING DATA ENCRYPTION STANDARD (DES)
PRIVACY PRESERVING IN DISTRIBUTED DATABASE USING DATA ENCRYPTION STANDARD (DES) Jyotirmayee Rautaray 1, Raghvendra Kumar 2 School of Computer Engineering, KIIT University, Odisha, India 1 School of Computer
More informationDynamic Optimization of Generalized SQL Queries with Horizontal Aggregations Using K-Means Clustering
Dynamic Optimization of Generalized SQL Queries with Horizontal Aggregations Using K-Means Clustering Abstract Mrs. C. Poongodi 1, Ms. R. Kalaivani 2 1 PG Student, 2 Assistant Professor, Department of
More informationPartition Based Perturbation for Privacy Preserving Distributed Data Mining
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 17, No 2 Sofia 2017 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.1515/cait-2017-0015 Partition Based Perturbation
More informationEmerging Measures in Preserving Privacy for Publishing The Data
Emerging Measures in Preserving Privacy for Publishing The Data K.SIVARAMAN 1 Assistant Professor, Dept. of Computer Science, BIST, Bharath University, Chennai -600073 1 ABSTRACT: The information in the
More informationPrivacy Preserving Naïve Bayes Classifier for Horizontally Distribution Scenario Using Un-trusted Third Party
IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661, ISBN: 2278-8727, Volume 7, Issue 6 (Nov. - Dec. 2012), PP 04-12 Privacy Preserving Naïve Bayes Classifier for Horizontally Distribution Scenario
More informationInternational Journal of Advance Engineering and Research Development. AN Optimal Matrix Approach for virtual load allocation and data sharing
Scientific Journal of Impact Factor (SJIF): 5.71 International Journal of Advance Engineering and Research Development Volume 5, Issue 02, February -2018 e-issn (O): 2348-4470 p-issn (P): 2348-6406 AN
More informationPrivacy-Preserving of Check-in Services in MSNS Based on a Bit Matrix
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 15, No 2 Sofia 2015 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.1515/cait-2015-0032 Privacy-Preserving of Check-in
More informationDifferential Privacy. Seminar: Robust Data Mining Techniques. Thomas Edlich. July 16, 2017
Differential Privacy Seminar: Robust Techniques Thomas Edlich Technische Universität München Department of Informatics kdd.in.tum.de July 16, 2017 Outline 1. Introduction 2. Definition and Features of
More informationSanitization Techniques against Personal Information Inference Attack on Social Network
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 12, December 2014,
More informationETP-Mine: An Efficient Method for Mining Transitional Patterns
ETP-Mine: An Efficient Method for Mining Transitional Patterns B. Kiran Kumar 1 and A. Bhaskar 2 1 Department of M.C.A., Kakatiya Institute of Technology & Science, A.P. INDIA. kirankumar.bejjanki@gmail.com
More informationROBUST AND ANONYMOUS AUTHENTICATION OF DATA STORED IN CLOUDS WITH DECENTRALIZED ACCESS CONTROL
ROBUST AND ANONYMOUS AUTHENTICATION OF DATA STORED IN CLOUDS WITH DECENTRALIZED ACCESS CONTROL S.Vijaya Madhavi 1, G.Rama Subba Reddy 2 1 M.tech Scholar (CSE), 2 Headof Department (CSE), Vignana Bharathi
More informationService-Oriented Architecture for Privacy-Preserving Data Mashup
Service-Oriented Architecture for Privacy-Preserving Data Mashup Thomas Trojer a Benjamin C. M. Fung b Patrick C. K. Hung c a Quality Engineering, Institute of Computer Science, University of Innsbruck,
More informationImage Similarity Measurements Using Hmok- Simrank
Image Similarity Measurements Using Hmok- Simrank A.Vijay Department of computer science and Engineering Selvam College of Technology, Namakkal, Tamilnadu,india. k.jayarajan M.E (Ph.D) Assistant Professor,
More informationSEGMENT STATURE HASH TABLE BASED COST EFFICIENT DATA SHARING IN CLOUD ENVIRONMENT
SEGMENT STATURE HASH TABLE BASED COST EFFICIENT DATA SHARING IN CLOUD ENVIRONMENT K. Karthika Lekshmi 1, Dr. M. Vigilsonprem 2 1 Assistant Professor, Department of Information Technology, Cape Institute
More informationInternational Journal of Modern Trends in Engineering and Research e-issn No.: , Date: 2-4 July, 2015
International Journal of Modern Trends in Engineering and Research www.ijmter.com e-issn No.:2349-9745, Date: 2-4 July, 2015 Privacy Preservation Data Mining Using GSlicing Approach Mr. Ghanshyam P. Dhomse
More informationPrivacy Preserving Classification of heterogeneous Partition Data through ID3 Technique
Privacy Preserving Classification of heterogeneous Partition Data through ID3 Technique Saurabh Karsoliya 1 B.Tech. (CSE) MANIT, Bhopal, M.P., INDIA Abstract: The goal of data mining is to extract or mine
More informationPurna Prasad Mutyala et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 2 (5), 2011,
Weighted Association Rule Mining Without Pre-assigned Weights PURNA PRASAD MUTYALA, KUMAR VASANTHA Department of CSE, Avanthi Institute of Engg & Tech, Tamaram, Visakhapatnam, A.P., India. Abstract Association
More informationINFREQUENT WEIGHTED ITEM SET MINING USING NODE SET BASED ALGORITHM
INFREQUENT WEIGHTED ITEM SET MINING USING NODE SET BASED ALGORITHM G.Amlu #1 S.Chandralekha #2 and PraveenKumar *1 # B.Tech, Information Technology, Anand Institute of Higher Technology, Chennai, India
More informationEFFECTIVE INTRUSION DETECTION AND REDUCING SECURITY RISKS IN VIRTUAL NETWORKS (EDSV)
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 8, August 2014,
More informationAutomated Information Retrieval System Using Correlation Based Multi- Document Summarization Method
Automated Information Retrieval System Using Correlation Based Multi- Document Summarization Method Dr.K.P.Kaliyamurthie HOD, Department of CSE, Bharath University, Tamilnadu, India ABSTRACT: Automated
More informationResearch Paper SECURED UTILITY ENHANCEMENT IN MINING USING GENETIC ALGORITHM
Research Paper SECURED UTILITY ENHANCEMENT IN MINING USING GENETIC ALGORITHM 1 Dr.G.Kirubhakar and 2 Dr.C.Venkatesh Address for Correspondence 1 Department of Computer Science and Engineering, Surya Engineering
More informationFrequent Itemset Mining With PFP Growth Algorithm (Transaction Splitting)
Frequent Itemset Mining With PFP Growth Algorithm (Transaction Splitting) Nikita Khandare 1 and Shrikant Nagure 2 1,2 Computer Department, RMDSOE Abstract Frequent sets play an important role in many Data
More informationOn Privacy-Preservation of Text and Sparse Binary Data with Sketches
On Privacy-Preservation of Text and Sparse Binary Data with Sketches Charu C. Aggarwal Philip S. Yu Abstract In recent years, privacy preserving data mining has become very important because of the proliferation
More informationSecure Role-Based Access Control on Encrypted Data in Cloud Storage using ARM
Secure Role-Based Access Control on Encrypted Data in Cloud Storage using ARM Rohini Vidhate, V. D. Shinde Abstract With the rapid developments occurring in cloud computing and services, there has been
More informationInternational Journal of Modern Engineering and Research Technology
Volume 2, Issue 4, October 2015 ISSN: 2348-8565 (Online) International Journal of Modern Engineering and Research Technology Website: http://www.ijmert.org Privacy Preservation in Data Mining Using Mixed
More informationA Methodology for Assigning Access Control to Public Clouds
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 12, December 2014,
More informationSecure Token Based Storage System to Preserve the Sensitive Data Using Proxy Re-Encryption Technique
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,
More informationA Review of Privacy Preserving Data Publishing Technique
A Review of Privacy Preserving Data Publishing Technique Abstract:- Amar Paul Singh School of CSE Bahra University Shimla Hills, India Ms. Dhanshri Parihar Asst. Prof (School of CSE) Bahra University Shimla
More informationLOCAWARD: A SECURITY AND PRIVACY AWARE LOCATION-BASED REWARDING SYSTEM
LOCAWARD: A SECURITY AND PRIVACY AWARE LOCATION-BASED REWARDING SYSTEM Madhuri Martis 1, Rameshkumar H K 2 1 M.Tech Student, 2 Assistant Professor, Dept. of Computer Science and Engineering, STJIT, Ranebennur,
More informationA Study on Data Perturbation Techniques in Privacy Preserving Data Mining
A Study on Data Perturbation Techniques in Privacy Preserving Data Mining Nimpal Patel, Shreya Patel Student, Dept. Of Computer Engineering, Grow More Faculty of Engineering Himatnagar, Gujarat, India
More informationDistributed Data Anonymization with Hiding Sensitive Node Labels
Distributed Data Anonymization with Hiding Sensitive Node Labels C.EMELDA Research Scholar, PG and Research Department of Computer Science, Nehru Memorial College, Putthanampatti, Bharathidasan University,Trichy
More informationA Survey on: Techniques of Privacy Preserving Mining Implementation
www.ijarcet.org 50 A Survey on: Techniques of Privacy Preserving Mining Implementation Priya Gupta, Sini Shibu Abstract With the increase in the data mining algorithm knowledge extraction from the large
More informationSurvey Result on Privacy Preserving Techniques in Data Publishing
Survey Result on Privacy Preserving Techniques in Data Publishing S.Deebika PG Student, Computer Science and Engineering, Vivekananda College of Engineering for Women, Namakkal India A.Sathyapriya Assistant
More informationReview on Techniques of Collaborative Tagging
Review on Techniques of Collaborative Tagging Ms. Benazeer S. Inamdar 1, Mrs. Gyankamal J. Chhajed 2 1 Student, M. E. Computer Engineering, VPCOE Baramati, Savitribai Phule Pune University, India benazeer.inamdar@gmail.com
More informationItem Set Extraction of Mining Association Rule
Item Set Extraction of Mining Association Rule Shabana Yasmeen, Prof. P.Pradeep Kumar, A.Ranjith Kumar Department CSE, Vivekananda Institute of Technology and Science, Karimnagar, A.P, India Abstract:
More informationComparison and Analysis of Anonymization Techniques for Preserving Privacy in Big Data
Advances in Computational Sciences and Technology ISSN 0973-6107 Volume 10, Number 2 (2017) pp. 247-253 Research India Publications http://www.ripublication.com Comparison and Analysis of Anonymization
More informationData Distortion for Privacy Protection in a Terrorist Analysis System
Data Distortion for Privacy Protection in a Terrorist Analysis System Shuting Xu, Jun Zhang, Dianwei Han, and Jie Wang Department of Computer Science, University of Kentucky, Lexington KY 40506-0046, USA
More informationCombining Review Text Content and Reviewer-Item Rating Matrix to Predict Review Rating
Combining Review Text Content and Reviewer-Item Rating Matrix to Predict Review Rating Dipak J Kakade, Nilesh P Sable Department of Computer Engineering, JSPM S Imperial College of Engg. And Research,
More informationWeb page recommendation using a stochastic process model
Data Mining VII: Data, Text and Web Mining and their Business Applications 233 Web page recommendation using a stochastic process model B. J. Park 1, W. Choi 1 & S. H. Noh 2 1 Computer Science Department,
More informationClosest Keywords Search on Spatial Databases
Closest Keywords Search on Spatial Databases 1 A. YOJANA, 2 Dr. A. SHARADA 1 M. Tech Student, Department of CSE, G.Narayanamma Institute of Technology & Science, Telangana, India. 2 Associate Professor,
More informationAn Overview of various methodologies used in Data set Preparation for Data mining Analysis
An Overview of various methodologies used in Data set Preparation for Data mining Analysis Arun P Kuttappan 1, P Saranya 2 1 M. E Student, Dept. of Computer Science and Engineering, Gnanamani College of
More informationImproving Recommendations Through. Re-Ranking Of Results
Improving Recommendations Through Re-Ranking Of Results S.Ashwini M.Tech, Computer Science Engineering, MLRIT, Hyderabad, Andhra Pradesh, India Abstract World Wide Web has become a good source for any
More informationImplementation of Privacy Mechanism using Curve Fitting Method for Data Publishing in Health Care Domain
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 5, May 2014, pg.1105
More informationBUILDING PRIVACY-PRESERVING C4.5 DECISION TREE CLASSIFIER ON MULTI- PARTIES
BUILDING PRIVACY-PRESERVING C4.5 DECISION TREE CLASSIFIER ON MULTI- PARTIES ALKA GANGRADE 1, RAVINDRA PATEL 2 1 Technocrats Institute of Technology, Bhopal, MP. 2 U.I.T., R.G.P.V., Bhopal, MP email alkagangrade@yahoo.co.in,
More informationA FUZZY BASED APPROACH FOR PRIVACY PRESERVING CLUSTERING
A FUZZY BASED APPROACH FOR PRIVACY PRESERVING CLUSTERING 1 B.KARTHIKEYAN, 2 G.MANIKANDAN, 3 V.VAITHIYANATHAN 1 Assistant Professor, School of Computing, SASTRA University, TamilNadu, India. 2 Assistant
More informationAn Architecture for Privacy-preserving Mining of Client Information
An Architecture for Privacy-preserving Mining of Client Information Murat Kantarcioglu Jaideep Vaidya Department of Computer Sciences Purdue University 1398 Computer Sciences Building West Lafayette, IN
More informationIJSER. Privacy and Data Mining
Privacy and Data Mining 2177 Shilpa M.S Dept. of Computer Science Mohandas College of Engineering and Technology Anad,Trivandrum shilpams333@gmail.com Shalini.L Dept. of Computer Science Mohandas College
More informationA LTERATURE SURVEY ON REVOCABLE MULTIAUTHORITY CIPHER TEXT-POLICY ATTRIBUTE-BASED ENCRYPTION (CP-ABE) SCHEME FOR CLOUD STORAGE
A LTERATURE SURVEY ON REVOCABLE MULTIAUTHORITY CIPHER TEXT-POLICY ATTRIBUTE-BASED ENCRYPTION (CP-ABE) SCHEME FOR CLOUD STORAGE Vinoth Kumar P, Dr.P.D.R. Vijaya Kumar 1 PG Student, INFO Institute of Engineering,
More informationDistributed Data Mining with Differential Privacy
Distributed Data Mining with Differential Privacy Ning Zhang, Ming Li, Wenjing Lou Department of Electrical and Computer Engineering, Worcester Polytechnic Institute, MA Email: {ning, mingli}@wpi.edu,
More informationEnhancing Forecasting Performance of Naïve-Bayes Classifiers with Discretization Techniques
24 Enhancing Forecasting Performance of Naïve-Bayes Classifiers with Discretization Techniques Enhancing Forecasting Performance of Naïve-Bayes Classifiers with Discretization Techniques Ruxandra PETRE
More informationRaunak Rathi 1, Prof. A.V.Deorankar 2 1,2 Department of Computer Science and Engineering, Government College of Engineering Amravati
Analytical Representation on Secure Mining in Horizontally Distributed Database Raunak Rathi 1, Prof. A.V.Deorankar 2 1,2 Department of Computer Science and Engineering, Government College of Engineering
More informationSTUDY ON FREQUENT PATTEREN GROWTH ALGORITHM WITHOUT CANDIDATE KEY GENERATION IN DATABASES
STUDY ON FREQUENT PATTEREN GROWTH ALGORITHM WITHOUT CANDIDATE KEY GENERATION IN DATABASES Prof. Ambarish S. Durani 1 and Mrs. Rashmi B. Sune 2 1 Assistant Professor, Datta Meghe Institute of Engineering,
More informationFUFM-High Utility Itemsets in Transactional Database
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 3, March 2014,
More informationC-NBC: Neighborhood-Based Clustering with Constraints
C-NBC: Neighborhood-Based Clustering with Constraints Piotr Lasek Chair of Computer Science, University of Rzeszów ul. Prof. St. Pigonia 1, 35-310 Rzeszów, Poland lasek@ur.edu.pl Abstract. Clustering is
More informationA New Metric for Code Readability
IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661, ISBN: 2278-8727Volume 6, Issue 6 (Nov. - Dec. 2012), PP 44-48 A New Metric for Code Readability Rajendar Namani 1, Kumar J 2 1 Department
More informationDENSITY BASED AND PARTITION BASED CLUSTERING OF UNCERTAIN DATA BASED ON KL-DIVERGENCE SIMILARITY MEASURE
DENSITY BASED AND PARTITION BASED CLUSTERING OF UNCERTAIN DATA BASED ON KL-DIVERGENCE SIMILARITY MEASURE Sinu T S 1, Mr.Joseph George 1,2 Computer Science and Engineering, Adi Shankara Institute of Engineering
More informationEnhanced Slicing Technique for Improving Accuracy in Crowdsourcing Database
Enhanced Slicing Technique for Improving Accuracy in Crowdsourcing Database T.Malathi 1, S. Nandagopal 2 PG Scholar, Department of Computer Science and Engineering, Nandha College of Technology, Erode,
More informationVolume 6, Issue 1, January 2018 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) e-isjn: A4372-3114 Impact Factor: 7.327 Volume 6, Issue 1, January 2018 International Journal of Advance Research in Computer Science and Management Studies Research Article /
More informationPreserving Privacy Using Gradient Descent Methods Applied for Neural Network with Distributed Datasets
www.ijcsi.org 728 Preserving Privacy Using Gradient Descent Methods Applied for Neural Network with Distributed Datasets Mr.Sachin P.Yadav, Mr.Amit B.Chougule 1 D.Y.Patil College of Engineering Kolhapur,Maharashtra,India
More informationENCRYPTED DATA MANAGEMENT WITH DEDUPLICATION IN CLOUD COMPUTING
ENCRYPTED DATA MANAGEMENT WITH DEDUPLICATION IN CLOUD COMPUTING S KEERTHI 1*, MADHAVA REDDY A 2* 1. II.M.Tech, Dept of CSE, AM Reddy Memorial College of Engineering & Technology, Petlurivaripalem. 2. Assoc.
More informationIMPROVING DATA SECURITY USING ATTRIBUTE BASED BROADCAST ENCRYPTION IN CLOUD COMPUTING
IMPROVING DATA SECURITY USING ATTRIBUTE BASED BROADCAST ENCRYPTION IN CLOUD COMPUTING 1 K.Kamalakannan, 2 Mrs.Hemlathadhevi Abstract -- Personal health record (PHR) is an patient-centric model of health
More informationISSN (Online) ISSN (Print)
Accurate Alignment of Search Result Records from Web Data Base 1Soumya Snigdha Mohapatra, 2 M.Kalyan Ram 1,2 Dept. of CSE, Aditya Engineering College, Surampalem, East Godavari, AP, India Abstract: Most
More informationCollaborative Framework for Testing Web Application Vulnerabilities Using STOWS
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 5.258 IJCSMC,
More informationQuery- And User-Dependent Approach for Ranking Query Results in Web Databases
IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661, ISBN: 2278-8727Volume 6, Issue 6 (Nov. - Dec. 2012), PP 36-43 Query- And User-Dependent Approach for Ranking Query Results in Web Databases
More informationWeb Data mining-a Research area in Web usage mining
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 13, Issue 1 (Jul. - Aug. 2013), PP 22-26 Web Data mining-a Research area in Web usage mining 1 V.S.Thiyagarajan,
More informationPrivacy-Preserving. Introduction to. Data Publishing. Concepts and Techniques. Benjamin C. M. Fung, Ke Wang, Chapman & Hall/CRC. S.
Chapman & Hall/CRC Data Mining and Knowledge Discovery Series Introduction to Privacy-Preserving Data Publishing Concepts and Techniques Benjamin C M Fung, Ke Wang, Ada Wai-Chee Fu, and Philip S Yu CRC
More informationAnalysis of Dendrogram Tree for Identifying and Visualizing Trends in Multi-attribute Transactional Data
Analysis of Dendrogram Tree for Identifying and Visualizing Trends in Multi-attribute Transactional Data D.Radha Rani 1, A.Vini Bharati 2, P.Lakshmi Durga Madhuri 3, M.Phaneendra Babu 4, A.Sravani 5 Department
More informationA Secure and Dynamic Multi Keyword Ranked Search Scheme over encrypted
ISSN (O): 2349-7084 International Journal of Computer Engineering In Research Trends Available online at: www.ijcert.org A Secure and Dynamic Multi Keyword Ranked Search Scheme over encrypted 1 A.Raghavendra
More informationInternational Journal of Advanced Research in Computer Science and Software Engineering
Volume 3, Issue 3, March 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Special Issue:
More informationAn Evolutionary Algorithm for Mining Association Rules Using Boolean Approach
An Evolutionary Algorithm for Mining Association Rules Using Boolean Approach ABSTRACT G.Ravi Kumar 1 Dr.G.A. Ramachandra 2 G.Sunitha 3 1. Research Scholar, Department of Computer Science &Technology,
More informationDetection and Deletion of Outliers from Large Datasets
Detection and Deletion of Outliers from Large Datasets Nithya.Jayaprakash 1, Ms. Caroline Mary 2 M. tech Student, Dept of Computer Science, Mohandas College of Engineering and Technology, India 1 Assistant
More informationAC-Close: Efficiently Mining Approximate Closed Itemsets by Core Pattern Recovery
: Efficiently Mining Approximate Closed Itemsets by Core Pattern Recovery Hong Cheng Philip S. Yu Jiawei Han University of Illinois at Urbana-Champaign IBM T. J. Watson Research Center {hcheng3, hanj}@cs.uiuc.edu,
More informationANONYMIZATION OF DATA USING MAPREDUCE ON CLOUD
ANONYMIZATION OF DATA USING MAPREDUCE ON CLOUD Mallappa Gurav 1, N. V. Karekar 2, Manjunath Suryavanshi 3 1 Dept. Of Computer Science and Engineering, K. L. E College of Engineering & Technology, Chikodi-591
More informationEncrypting the Auto Detected Face Part of Human in a Image Using RC4 and Hiding the Data in Image
Encrypting the Auto Detected Face Part of Human in a Image Using RC4 and Hiding the Data in Image N.Mahesh Chandra M.Tech Student, Sreenidhi Institute of Science and Technology. Abstract: In this paper,
More informationADVANCES in NATURAL and APPLIED SCIENCES
ADVANCES in NATURAL and APPLIED SCIENCES ISSN: 1995-0772 Published BY AENSI Publication EISSN: 1998-1090 http://www.aensiweb.com/anas 2016 May 10(5): pages 223-227 Open Access Journal An Efficient Proxy
More informationRECORD DEDUPLICATION USING GENETIC PROGRAMMING APPROACH
Int. J. Engg. Res. & Sci. & Tech. 2013 V Karthika et al., 2013 Research Paper ISSN 2319-5991 www.ijerst.com Vol. 2, No. 2, May 2013 2013 IJERST. All Rights Reserved RECORD DEDUPLICATION USING GENETIC PROGRAMMING
More information