CFP last date
20 January 2025
Reseach Article

Security of Private Data Extracted from Outsource Database in Association Rule Mining

Published on May 2016 by Madhuri B. Bagdane, N.d. Kale
National Conference on Advancements in Computer & Information Technology
Foundation of Computer Science USA
NCACIT2016 - Number 5
May 2016
Authors: Madhuri B. Bagdane, N.d. Kale
376d1847-9305-4cd8-babb-40400dda1b1a

Madhuri B. Bagdane, N.d. Kale . Security of Private Data Extracted from Outsource Database in Association Rule Mining. National Conference on Advancements in Computer & Information Technology. NCACIT2016, 5 (May 2016), 16-19.

@article{
author = { Madhuri B. Bagdane, N.d. Kale },
title = { Security of Private Data Extracted from Outsource Database in Association Rule Mining },
journal = { National Conference on Advancements in Computer & Information Technology },
issue_date = { May 2016 },
volume = { NCACIT2016 },
number = { 5 },
month = { May },
year = { 2016 },
issn = 0975-8887,
pages = { 16-19 },
numpages = 4,
url = { /proceedings/ncacit2016/number5/24727-3079/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Advancements in Computer & Information Technology
%A Madhuri B. Bagdane
%A N.d. Kale
%T Security of Private Data Extracted from Outsource Database in Association Rule Mining
%J National Conference on Advancements in Computer & Information Technology
%@ 0975-8887
%V NCACIT2016
%N 5
%P 16-19
%D 2016
%I International Journal of Computer Applications
Abstract

Spurred by using trends inclusive of cloud computing, there has been enormous current hobby inside the paradigm of Data mining-as-a-carrier. A business enterprise (statistics proprietor) lacking in expertise or computational resources can outsource its mining desires to provider issuer (server). However, both the gadgets and the affiliation rules of the outsourced database are considered private property of the organization (facts proprietor). To guard corporate privacy, the data proprietor transforms its facts and ships it to the server, sends mining queries to the server, and recovers the real patterns from the extracted patterns obtained from the server. In this paper, look at the trouble of outsourcing the affiliation rule mining undertaking within a company privacy-keeping framework. Advise an attack model based totally on history expertise and devise a scheme for privacy maintaining outsourced mining. Another interesting heading is to unwind our presumptions about the attacker by permitting him to know the subtle elements of encryption calculations and/or the recurrence of thing sets and the dissemination of exchange lengths. Our present system expects that the attacker does not have such information. Our scheme ensures that every transformed item is indistinguishable with appreciate to the attacker's background expertise, from as a minimum k?1 other converted items. Our comprehensive experiments on a completely big and actual transaction database display that our techniques are powerful, scalable, and protect privacy.

References
  1. R. Buyya, C. S. Yeo, and S. Venugopal, "Market-oriented cloud computing: Vision, hype, and reality for delivering it services as computing utilities," in Proc. IEEE Conf. High Performance Comput. Commun. , Sep. 2008, pp. 5–13.
  2. W. K. Wong, D. W. Cheung, E. Hung, B. Kao, and N. Mamoulis, "Security in outsourcing of association rule mining," in Proc. Int. Conf. Very Large Data Bases, 2007, pp. 111–122.
  3. L. Qiu, Y. Li, and X. Wu, "Protecting business intelligence and customer privacy while outsourcing data mining tasks," Knowledge Inform. Syst. , vol. 17, no. 1, pp. 99–120, 2008.
  4. C. Clifton, M. Kantarcioglu, and J. Vaidya, "Defining privacy for data mining," in Proc. Nat. Sci. Found. Workshop Next Generation Data Mining, 2002, pp. 126–133.
  5. I. Molloy, N. Li, and T. Li, "On the (in)security and (im)practicality of outsourcing precise association rule mining," in Proc. IEEE Int. Conf. Data Mining, Dec. 2009, pp. 872–877.
  6. F. Giannotti, L. V. Lakshmanan, A. Monreale, D. Pedreschi, and H. Wang, "Privacy-preserving data mining from outsourced databases," in Proc. SPCC2010 Conjunction with CPDP, 2010, pp. 411–426.
  7. Nilesh B. Prajapati, Krupali H. Shah, Information Technology Department, B. V. M. ,V. V. Nagar, GTU, INDIA. Privacy Preserving in Association Rule mining"
  8. Cong Wang, Member, IEEE, Sherman S. M. Chow, Qian Wang, Member, IEEE, Kui Ren, Senior Member, IEEE, and Wenjing Lou, Senior Member "Privacy-Preserving Public Auditing for Secure Cloud Storage:", IEEE, IEEE Transactions on computers, VOL. 62, NO. 2, FEBRUARY 2013.
  9. Ning Caoy, Cong Wangz, Ming Liy, Kui Renz, and Wenjing Lou, Department of ECE, Worcester Polytechnic Institute,Department of ECE, Illinois Institute of Technology,.
  10. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data" .
Index Terms

Computer Science
Information Sciences

Keywords

Association Rule Mining Privacy-preserving Outsourcing.