CFP last date
20 December 2024
Reseach Article

Design and Implementation of Sensitive Information Security Model based on Term Clustering

by Sona Kaushik, Shalini Puri, Pankaj Gupta
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 43 - Number 7
Year of Publication: 2012
Authors: Sona Kaushik, Shalini Puri, Pankaj Gupta
10.5120/6112-8200

Sona Kaushik, Shalini Puri, Pankaj Gupta . Design and Implementation of Sensitive Information Security Model based on Term Clustering. International Journal of Computer Applications. 43, 7 ( April 2012), 1-6. DOI=10.5120/6112-8200

@article{ 10.5120/6112-8200,
author = { Sona Kaushik, Shalini Puri, Pankaj Gupta },
title = { Design and Implementation of Sensitive Information Security Model based on Term Clustering },
journal = { International Journal of Computer Applications },
issue_date = { April 2012 },
volume = { 43 },
number = { 7 },
month = { April },
year = { 2012 },
issn = { 0975-8887 },
pages = { 1-6 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume43/number7/6112-8200/ },
doi = { 10.5120/6112-8200 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:32:46.121053+05:30
%A Sona Kaushik
%A Shalini Puri
%A Pankaj Gupta
%T Design and Implementation of Sensitive Information Security Model based on Term Clustering
%J International Journal of Computer Applications
%@ 0975-8887
%V 43
%N 7
%P 1-6
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Exchange of enormous data and information securely and frequently via Internet is very common and demanded in today's fast track scenario of world. The idea behind the proposed Sensitive Information Security Model Based on Term Clustering (SIS-TC) is to provide the security to a large volume of text documents which contain very important and sensitive information or data or both. These documents are first broken into its constituent parts, called terms, by using knowledge repository and then term clusters are made by finding out the similar terms of each category. These clusters represent the categories of Noun, Pronoun, Numeral, Punctuation etc. Only one instance of a cluster is kept and become the cluster representative. Firstly, the term frequency of each different occurred term (or word) is calculated and then all the duplicate copies of each term are removed, so that to transform it into the low dimensional data. Such reduced data set drastically decreases the total size of the complete data and space as well, and increases the performance of the system by the ratio of 65% -70%. Next, this reduced data is divided into High Risk Data (HRD) and Low Risk Data (LRD) to provide different level of security to each type. Therefore, HRD is symmetrically encrypted whereas LRD is encrypted non-symmetrically. This paper also includes the analytical experimental results based on the test data set of 8 text documents of varying sizes.

References
  1. Eliane Rich, Kevin Knight and Shivashankar B Nair, Artificial Intelligence, 3rd ed. , Mc Graw Hill, 2010.
  2. N. P. Padhy, Artificial Intelligence and Intelligent Systems, 5th ed. , Oxford University Press, 2009.
  3. Jiawei Han, and Miche Line Kamber, Data Mining: Concepts and Techniques, 2nd ed. , Elsevier, 2006.
  4. Shady Shahata, Fakhri Karray, and Mahamed Kamel, "Enhancing Text Clustering using Concept-based Mining Model," IEEE Proc. of the Sixth International Conference on Data Mining, 2006.
  5. Xianping Wu, Phu Dung Le and Balasubramaniam Srinivasan, "Security Architeture for Sensitive Information Systems," Convergence and Hybrid Information Technologies, pp. 239–266, March 2010.
  6. Weidong Shi, Joshua B. Fryman, Guofei Gu, Hsien­Hsin S. Lee, Youtao Zhang, and Jun Yang, "InfoShield: A Security Architecture for Protecting Information Usage in Memory," IEEE Twelfth International Symposium on High-Performance Computer Architecture, 2006.
  7. Shi-Hua Wang, and Xiao-Yongli, "A Security Model To Protect Sensitive Information Flows Based On Trusted Computing Technologies," IEEE Proc. of the Seventh International Conference on Machine Learning and Cybernetics, July 2008.
  8. Zhao Yong, Liu Ji Qiang, Han Zhen, and Shen ChangXiang, "An Operating System Trusted Security Model For Important Sensitive Information System," IEEE First International Symposium on Data, Privacy and E-Commerce, 2007.
  9. Khaled Hussain, Sharon Rajan, Naveen Addulla, and Ghada Moussa, "No-capture Hardware Feature for Securing Sensitive Information," IEEE Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC), 2005.
  10. John Black, Martin Cochran, and Ryan Gardner, "Lessons Learned: A Security Analysis of the Internet Chess Club," IEEE Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC),2005.
  11. Kun Wang, Ruidan Su, Zengxin Li, Zhen Cai, and Li Hua Zhou, "Study of Secure Complicated Information System Architecture Model," IEEE Proceedings of the First International Conference on Semantics, Knowledge, and Grid (SKG), 2006.
  12. J. L. Mejia-Nogales, S. Vidal-Beltran, and Y. J. L. Lopez-Bonilla, "Design and Implementation of a Secure Access System to InformationResources for IEEE 802. 11 Wireless Networks," IEEE Proceedings of Conference of the Electronics, Robotics and Automotive Mechanics Conference (CERMA), 2006.
  13. Benjamin C. M. Fung, Thomas Trojer, Patrick C. K. Hung, Li Xiong, Khalil Al-Hussaeni, and Rachida Dssouli, "Service-Oriented Architecture for High-Dimensional Private Data Mashup," IEEE Transactions On Services Computing (Under Publication), 2011.
  14. Sona Kaushik, and Shalini Puri, "Sensitive Information on Move," International Journal of Scientific and Engineering Research, vol. 2, December 2011.
  15. Shihab A. Hameed, Habib Yuchoh, and Wajdi F. Al-khateeb "A Model For Ensuring Data Confidentiality," IEEE Fourth International Conference on Mechatronics (ICOM), May 2011.
Index Terms

Computer Science
Information Sciences

Keywords

Term Clustering Knowledge Repository Sensitive Information High Dimensional And Low Dimensional Data Symmetric And Non-symmetric Encryption