Enviar pesquisa
Carregar
Preprocessing and secure computations for privacy preservation data mining
•
0 gostou
•
534 visualizações
IAEME Publication
Seguir
Tecnologia
Denunciar
Compartilhar
Denunciar
Compartilhar
1 de 10
Baixar agora
Baixar para ler offline
Recomendados
Managing Big data using Hadoop Map Reduce in Telecom Domain
Managing Big data using Hadoop Map Reduce in Telecom Domain
AM Publications
An Robust Outsourcing of Multi Party Dataset by Utilizing Super-Modularity an...
An Robust Outsourcing of Multi Party Dataset by Utilizing Super-Modularity an...
IRJET Journal
Framework to Avoid Similarity Attack in Big Streaming Data
Framework to Avoid Similarity Attack in Big Streaming Data
IJECEIAES
V2 i9 ijertv2is90699-1
V2 i9 ijertv2is90699-1
warishali570
50120140503019
50120140503019
IAEME Publication
A statistical data fusion technique in virtual data integration environment
A statistical data fusion technique in virtual data integration environment
IJDKP
INTEGRATED ASSOCIATIVE CLASSIFICATION AND NEURAL NETWORK MODEL ENHANCED BY US...
INTEGRATED ASSOCIATIVE CLASSIFICATION AND NEURAL NETWORK MODEL ENHANCED BY US...
IJDKP
Performance Analysis of Hashing Mathods on the Employment of App
Performance Analysis of Hashing Mathods on the Employment of App
IJECEIAES
Recomendados
Managing Big data using Hadoop Map Reduce in Telecom Domain
Managing Big data using Hadoop Map Reduce in Telecom Domain
AM Publications
An Robust Outsourcing of Multi Party Dataset by Utilizing Super-Modularity an...
An Robust Outsourcing of Multi Party Dataset by Utilizing Super-Modularity an...
IRJET Journal
Framework to Avoid Similarity Attack in Big Streaming Data
Framework to Avoid Similarity Attack in Big Streaming Data
IJECEIAES
V2 i9 ijertv2is90699-1
V2 i9 ijertv2is90699-1
warishali570
50120140503019
50120140503019
IAEME Publication
A statistical data fusion technique in virtual data integration environment
A statistical data fusion technique in virtual data integration environment
IJDKP
INTEGRATED ASSOCIATIVE CLASSIFICATION AND NEURAL NETWORK MODEL ENHANCED BY US...
INTEGRATED ASSOCIATIVE CLASSIFICATION AND NEURAL NETWORK MODEL ENHANCED BY US...
IJDKP
Performance Analysis of Hashing Mathods on the Employment of App
Performance Analysis of Hashing Mathods on the Employment of App
IJECEIAES
Recommendation system using bloom filter in mapreduce
Recommendation system using bloom filter in mapreduce
IJDKP
An Improved Differential Evolution Algorithm for Data Stream Clustering
An Improved Differential Evolution Algorithm for Data Stream Clustering
IJECEIAES
A Comprehensive review of Conversational Agent and its prediction algorithm
A Comprehensive review of Conversational Agent and its prediction algorithm
vivatechijri
Data Imputation by Soft Computing
Data Imputation by Soft Computing
ijtsrd
Variance rover system
Variance rover system
eSAT Journals
Variance rover system web analytics tool using data
Variance rover system web analytics tool using data
eSAT Publishing House
PRIVACY PRESERVING DATA MINING BASED ON VECTOR QUANTIZATION
PRIVACY PRESERVING DATA MINING BASED ON VECTOR QUANTIZATION
ijdms
Association Rule Mining using RHadoop
Association Rule Mining using RHadoop
IRJET Journal
5 parallel implementation 06299286
5 parallel implementation 06299286
Ninad Samel
Study on Positive and Negative Rule Based Mining Techniques for E-Commerce Ap...
Study on Positive and Negative Rule Based Mining Techniques for E-Commerce Ap...
Association of Scientists, Developers and Faculties
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)
IRJET Journal
A Survey on Features and Techniques Description for Privacy of Sensitive Info...
A Survey on Features and Techniques Description for Privacy of Sensitive Info...
IRJET Journal
A Review on Reversible Data Hiding Scheme by Image Contrast Enhancement
A Review on Reversible Data Hiding Scheme by Image Contrast Enhancement
IJERA Editor
Anonymization of data using mapreduce on cloud
Anonymization of data using mapreduce on cloud
eSAT Journals
Different Classification Technique for Data mining in Insurance Industry usin...
Different Classification Technique for Data mining in Insurance Industry usin...
IOSRjournaljce
IRJET- Error Reduction in Data Prediction using Least Square Regression Method
IRJET- Error Reduction in Data Prediction using Least Square Regression Method
IRJET Journal
Survey Performance Improvement Construct FP-Growth Tree
Survey Performance Improvement Construct FP-Growth Tree
ijsrd.com
Parametric comparison based on split criterion on classification algorithm
Parametric comparison based on split criterion on classification algorithm
IAEME Publication
A mathematical model of access control in big data using confidence interval ...
A mathematical model of access control in big data using confidence interval ...
csandit
Comparative analysis of association rule generation algorithms in data streams
Comparative analysis of association rule generation algorithms in data streams
IJCI JOURNAL
Predictors of customer retention in online health care system ohcs
Predictors of customer retention in online health care system ohcs
IAEME Publication
Effect of corrosion on concrete reinforcement mechanical and physical 2
Effect of corrosion on concrete reinforcement mechanical and physical 2
IAEME Publication
Mais conteúdo relacionado
Mais procurados
Recommendation system using bloom filter in mapreduce
Recommendation system using bloom filter in mapreduce
IJDKP
An Improved Differential Evolution Algorithm for Data Stream Clustering
An Improved Differential Evolution Algorithm for Data Stream Clustering
IJECEIAES
A Comprehensive review of Conversational Agent and its prediction algorithm
A Comprehensive review of Conversational Agent and its prediction algorithm
vivatechijri
Data Imputation by Soft Computing
Data Imputation by Soft Computing
ijtsrd
Variance rover system
Variance rover system
eSAT Journals
Variance rover system web analytics tool using data
Variance rover system web analytics tool using data
eSAT Publishing House
PRIVACY PRESERVING DATA MINING BASED ON VECTOR QUANTIZATION
PRIVACY PRESERVING DATA MINING BASED ON VECTOR QUANTIZATION
ijdms
Association Rule Mining using RHadoop
Association Rule Mining using RHadoop
IRJET Journal
5 parallel implementation 06299286
5 parallel implementation 06299286
Ninad Samel
Study on Positive and Negative Rule Based Mining Techniques for E-Commerce Ap...
Study on Positive and Negative Rule Based Mining Techniques for E-Commerce Ap...
Association of Scientists, Developers and Faculties
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)
IRJET Journal
A Survey on Features and Techniques Description for Privacy of Sensitive Info...
A Survey on Features and Techniques Description for Privacy of Sensitive Info...
IRJET Journal
A Review on Reversible Data Hiding Scheme by Image Contrast Enhancement
A Review on Reversible Data Hiding Scheme by Image Contrast Enhancement
IJERA Editor
Anonymization of data using mapreduce on cloud
Anonymization of data using mapreduce on cloud
eSAT Journals
Different Classification Technique for Data mining in Insurance Industry usin...
Different Classification Technique for Data mining in Insurance Industry usin...
IOSRjournaljce
IRJET- Error Reduction in Data Prediction using Least Square Regression Method
IRJET- Error Reduction in Data Prediction using Least Square Regression Method
IRJET Journal
Survey Performance Improvement Construct FP-Growth Tree
Survey Performance Improvement Construct FP-Growth Tree
ijsrd.com
Parametric comparison based on split criterion on classification algorithm
Parametric comparison based on split criterion on classification algorithm
IAEME Publication
A mathematical model of access control in big data using confidence interval ...
A mathematical model of access control in big data using confidence interval ...
csandit
Comparative analysis of association rule generation algorithms in data streams
Comparative analysis of association rule generation algorithms in data streams
IJCI JOURNAL
Mais procurados
(20)
Recommendation system using bloom filter in mapreduce
Recommendation system using bloom filter in mapreduce
An Improved Differential Evolution Algorithm for Data Stream Clustering
An Improved Differential Evolution Algorithm for Data Stream Clustering
A Comprehensive review of Conversational Agent and its prediction algorithm
A Comprehensive review of Conversational Agent and its prediction algorithm
Data Imputation by Soft Computing
Data Imputation by Soft Computing
Variance rover system
Variance rover system
Variance rover system web analytics tool using data
Variance rover system web analytics tool using data
PRIVACY PRESERVING DATA MINING BASED ON VECTOR QUANTIZATION
PRIVACY PRESERVING DATA MINING BASED ON VECTOR QUANTIZATION
Association Rule Mining using RHadoop
Association Rule Mining using RHadoop
5 parallel implementation 06299286
5 parallel implementation 06299286
Study on Positive and Negative Rule Based Mining Techniques for E-Commerce Ap...
Study on Positive and Negative Rule Based Mining Techniques for E-Commerce Ap...
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)
A Survey on Features and Techniques Description for Privacy of Sensitive Info...
A Survey on Features and Techniques Description for Privacy of Sensitive Info...
A Review on Reversible Data Hiding Scheme by Image Contrast Enhancement
A Review on Reversible Data Hiding Scheme by Image Contrast Enhancement
Anonymization of data using mapreduce on cloud
Anonymization of data using mapreduce on cloud
Different Classification Technique for Data mining in Insurance Industry usin...
Different Classification Technique for Data mining in Insurance Industry usin...
IRJET- Error Reduction in Data Prediction using Least Square Regression Method
IRJET- Error Reduction in Data Prediction using Least Square Regression Method
Survey Performance Improvement Construct FP-Growth Tree
Survey Performance Improvement Construct FP-Growth Tree
Parametric comparison based on split criterion on classification algorithm
Parametric comparison based on split criterion on classification algorithm
A mathematical model of access control in big data using confidence interval ...
A mathematical model of access control in big data using confidence interval ...
Comparative analysis of association rule generation algorithms in data streams
Comparative analysis of association rule generation algorithms in data streams
Destaque
Predictors of customer retention in online health care system ohcs
Predictors of customer retention in online health care system ohcs
IAEME Publication
Effect of corrosion on concrete reinforcement mechanical and physical 2
Effect of corrosion on concrete reinforcement mechanical and physical 2
IAEME Publication
Improving impact and mechanical properties of gap graded concrete
Improving impact and mechanical properties of gap graded concrete
IAEME Publication
Object tracking by dtcwt feature vectors 2-3-4
Object tracking by dtcwt feature vectors 2-3-4
IAEME Publication
His human identification schemes on web
His human identification schemes on web
IAEME Publication
Process parameters optimization in sls process using design of experiments 2
Process parameters optimization in sls process using design of experiments 2
IAEME Publication
A review on privatization in education is the boon for percentages of educated
A review on privatization in education is the boon for percentages of educated
IAEME Publication
Perceiving and recovering degraded data on secure cloud
Perceiving and recovering degraded data on secure cloud
IAEME Publication
Factors influencing guests’ loyalty behaviour a case study of selected hotels
Factors influencing guests’ loyalty behaviour a case study of selected hotels
IAEME Publication
Destaque
(9)
Predictors of customer retention in online health care system ohcs
Predictors of customer retention in online health care system ohcs
Effect of corrosion on concrete reinforcement mechanical and physical 2
Effect of corrosion on concrete reinforcement mechanical and physical 2
Improving impact and mechanical properties of gap graded concrete
Improving impact and mechanical properties of gap graded concrete
Object tracking by dtcwt feature vectors 2-3-4
Object tracking by dtcwt feature vectors 2-3-4
His human identification schemes on web
His human identification schemes on web
Process parameters optimization in sls process using design of experiments 2
Process parameters optimization in sls process using design of experiments 2
A review on privatization in education is the boon for percentages of educated
A review on privatization in education is the boon for percentages of educated
Perceiving and recovering degraded data on secure cloud
Perceiving and recovering degraded data on secure cloud
Factors influencing guests’ loyalty behaviour a case study of selected hotels
Factors influencing guests’ loyalty behaviour a case study of selected hotels
Semelhante a Preprocessing and secure computations for privacy preservation data mining
Privacy preserving clustering on centralized data through scaling transf
Privacy preserving clustering on centralized data through scaling transf
IAEME Publication
A novel ppdm protocol for distributed peer to peer information sources
A novel ppdm protocol for distributed peer to peer information sources
IAEME Publication
IRJET- A Study of Privacy Preserving Data Mining and Techniques
IRJET- A Study of Privacy Preserving Data Mining and Techniques
IRJET Journal
IRJET - Coarse Grain Load Balance Algorithm for Detecting
IRJET - Coarse Grain Load Balance Algorithm for Detecting
IRJET Journal
IRJET- Efficient Geometric Range Search on RTREE Occupying Encrypted Spatial ...
IRJET- Efficient Geometric Range Search on RTREE Occupying Encrypted Spatial ...
IRJET Journal
IRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud Data
IRJET Journal
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
IRJET Journal
Implementation of Secured Network Based Intrusion Detection System Using SVM ...
Implementation of Secured Network Based Intrusion Detection System Using SVM ...
IRJET Journal
IRJET- Improving the Performance of Smart Heterogeneous Big Data
IRJET- Improving the Performance of Smart Heterogeneous Big Data
IRJET Journal
Survey paper on Big Data Imputation and Privacy Algorithms
Survey paper on Big Data Imputation and Privacy Algorithms
IRJET Journal
Implementing Proof of Retriavaibility for Multiple Replica of Data File using...
Implementing Proof of Retriavaibility for Multiple Replica of Data File using...
IRJET Journal
Fundamentals of data mining and its applications
Fundamentals of data mining and its applications
Subrat Swain
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
IRJET Journal
Misusability Measure Based Sanitization of Big Data for Privacy Preserving Ma...
Misusability Measure Based Sanitization of Big Data for Privacy Preserving Ma...
IJECEIAES
A Brief Survey on Various Technologies Involved in Cloud Computing Security
A Brief Survey on Various Technologies Involved in Cloud Computing Security
Associate Professor in VSB Coimbatore
CSPCR: Cloud Security, Privacy and Compliance Readiness - A Trustworthy Fram...
CSPCR: Cloud Security, Privacy and Compliance Readiness - A Trustworthy Fram...
IJECEIAES
IRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
IRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
IRJET Journal
Ck34520526
Ck34520526
IJERA Editor
Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240
Editor IJARCET
Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240
Editor IJARCET
Semelhante a Preprocessing and secure computations for privacy preservation data mining
(20)
Privacy preserving clustering on centralized data through scaling transf
Privacy preserving clustering on centralized data through scaling transf
A novel ppdm protocol for distributed peer to peer information sources
A novel ppdm protocol for distributed peer to peer information sources
IRJET- A Study of Privacy Preserving Data Mining and Techniques
IRJET- A Study of Privacy Preserving Data Mining and Techniques
IRJET - Coarse Grain Load Balance Algorithm for Detecting
IRJET - Coarse Grain Load Balance Algorithm for Detecting
IRJET- Efficient Geometric Range Search on RTREE Occupying Encrypted Spatial ...
IRJET- Efficient Geometric Range Search on RTREE Occupying Encrypted Spatial ...
IRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud Data
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
Implementation of Secured Network Based Intrusion Detection System Using SVM ...
Implementation of Secured Network Based Intrusion Detection System Using SVM ...
IRJET- Improving the Performance of Smart Heterogeneous Big Data
IRJET- Improving the Performance of Smart Heterogeneous Big Data
Survey paper on Big Data Imputation and Privacy Algorithms
Survey paper on Big Data Imputation and Privacy Algorithms
Implementing Proof of Retriavaibility for Multiple Replica of Data File using...
Implementing Proof of Retriavaibility for Multiple Replica of Data File using...
Fundamentals of data mining and its applications
Fundamentals of data mining and its applications
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
Misusability Measure Based Sanitization of Big Data for Privacy Preserving Ma...
Misusability Measure Based Sanitization of Big Data for Privacy Preserving Ma...
A Brief Survey on Various Technologies Involved in Cloud Computing Security
A Brief Survey on Various Technologies Involved in Cloud Computing Security
CSPCR: Cloud Security, Privacy and Compliance Readiness - A Trustworthy Fram...
CSPCR: Cloud Security, Privacy and Compliance Readiness - A Trustworthy Fram...
IRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
IRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
Ck34520526
Ck34520526
Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240
Mais de IAEME Publication
IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME Publication
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
IAEME Publication
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
IAEME Publication
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
IAEME Publication
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
IAEME Publication
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
IAEME Publication
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
IAEME Publication
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IAEME Publication
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
IAEME Publication
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
IAEME Publication
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
IAEME Publication
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
IAEME Publication
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
IAEME Publication
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
IAEME Publication
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
IAEME Publication
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
IAEME Publication
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
IAEME Publication
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
IAEME Publication
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
IAEME Publication
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
IAEME Publication
Mais de IAEME Publication
(20)
IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
Último
presentation ICT roal in 21st century education
presentation ICT roal in 21st century education
jfdjdjcjdnsjd
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
ThousandEyes
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
Dropbox
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
apidays
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
sammart93
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
johnbeverley2021
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
Product Anonymous
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
UiPathCommunity
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
Christopher Logan Kennedy
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Juan lago vázquez
Elevate Developer Efficiency & build GenAI Application with Amazon Q
Elevate Developer Efficiency & build GenAI Application with Amazon Q
Bhuvaneswari Subramani
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Zilliz
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
MIND CTI
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
apidays
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
WSO2
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
Sandro Moreira
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
DianaGray10
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Angeliki Cooney
Último
(20)
presentation ICT roal in 21st century education
presentation ICT roal in 21st century education
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Elevate Developer Efficiency & build GenAI Application with Amazon Q
Elevate Developer Efficiency & build GenAI Application with Amazon Q
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Preprocessing and secure computations for privacy preservation data mining
1.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 4, July-August (2013), © IAEME 203 PREPROCESSING AND SECURE COMPUTATIONS FOR PRIVACY PRESERVATION DATA MINING Sumana M1 , Hareesha K S2 1 Information Science and Engineering Department, MSRIT,India 2 Department of Computer Applications, Manipal Institute of Technology, Manipal, India ABSTRACT Privacy Preserving Data Mining is very largely used for extracting knowledge from the data distributed over multiple sites without disclosing information. Dataset maintained by different organizations/sites involved in collaboration include missing, noisy, redundant and irrelevant data. Such data has to be preprocessed for obtaining efficient mining results from multiple sites. This paper discusses the essential preprocessing tasks performed by the individual sites to prepare the data for mining. Also in order to retain privacy, sites should jointly perform computations such as addition, division and union/intersection in a secure manner. The various implemented secure protocols to perform computations on the preprocessed datasets while classification/prediction have been conversed indicating the best approaches. Keywords: data mining, data preprocessing, privacy preservation, secure sum, secure union, secure division. I. INTRODUCTION Let us consider the following scenario where several banks present in different localities want salary status of an individual satisfying certain criteria, or want to predict a fraud while issuing credit card or would like to obtain the characteristics of with salary less than 50K per month. These banks do not want to reveal any information about their data in the process of mining. Hence mining has to be done by preserving privacy. Each of the sites has to preprocess their data to obtain appropriate mining results. For finance dataset some essential preprocessing tasks needs to be performed before performing any form of computations or mining on them. The earlier approach includes transforming nominal and categorical INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) ISSN 0976 – 6367(Print) ISSN 0976 – 6375(Online) Volume 4, Issue 4, July-August (2013), pp. 203-212 © IAEME: www.iaeme.com/ijcet.asp Journal Impact Factor (2013): 6.1302 (Calculated by GISI) www.jifactor.com IJCET © I A E M E
2.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 4, July-August (2013), © IAEME 204 attributes to their numeric form and normalizing them. But most of the data mining results need to be interpreted with different types of attributes. In order to avoid obtaining irrelevant, inaccurate results while performing data mining tasks on the dataset we need to eliminate irrelevant information[9]. Also, certain attributes were repetitive. For example detailed occupation code (numeric attribute) has an equivalent attribute called major occupation code(categorical) in the dataset. Besides in the mining process of finding results, values of the education and class of worker attributes need to be available at various levels of abstraction. We use the concept of taxonomy trees. Data perturbation, anonymization, or cryptographical methods have been used for privacy preserving classification as mentioned in [15]. However cryptographical methods are one the effective approaches for mining and maintaining privacy [3]. These methods use secure multiparty protocols to perform computations during knowledge discovery. Protocols such as secure sum, secure log, union, intersection and dot product have been used in most of the cryptographical data mining procedures. In this paper we discuss the various secure protocols implemented by us and compare them with the existing techniques. Two or more parties want to conduct a computation based on their private inputs, but neither party is willing to disclose its own input to anybody else[5]. The problem is how to conduct such a computation while preserving the privacy of the inputs. Most of these protocols have been build using homomorphic or commutative encryption techniques. Many encryption algorithms are widely available and used in information security. They can be categorized into Symmetric (private) and Asymmetric (public) keys encryption. As mentioned earlier some of the commonly used secure protocols while mining are secure sum, union /intersection protocols. II. DATA PREPROCESSING Preparing the data for mining is known as data preprocessing as mentioned in [1] and [2]. Dataset include redundant attributes and records, missing values, irrelevant data and attributes with values at the lowest level of abstraction. Certain essential modifications that we have performed on the dataset while mining are as follows A. Handling Irrelavant Data While working on the finance datasets we needed to analyze the value of the age attribute. For age less than 18, had a job, children and a salary greater than 50000 then we would term such a record as irrelevant. For analyzing the characteristics of people based on the salary (using clustering method) we require to use only those objects with salary age individual sites need to update their datasets based on the age attribute. On testing our dataset it was observed that only 5% of the total records were irrelevant based on the age criteria. Such records hinder the accuracy of the models build. Hence such noisy data were placed in a different location for further analysis. However it is important that these noisy data need to eliminated from the dataset used for mining. B. Taxonomy Trees For the data mining methods such as classification and clustering on the datasets we want the data of certain attributes to be available at higher levels of abstraction for example education attributes of the finance dataset. Such attributes can be discretized using the concept of taxonomy trees as shown in fig 1. The data miner at a site can access the values of the education attribute at the preschool, highschool or advanced level of abstraction. Using this concept interpreting of the results for classifying and clustering new datasets can be performed in an effective manner.
3.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 4, July-August (2013), © IAEME 205 Fig. 1. Taxonomy tree of the education attribute C. Eliminate Redundancy Every dataset include duplicated entries. One of the most suitable approaches while mining involves sorting the tuples of the dataset based on quasi-identifiers, for example in finance dataset {age, occupation, and gender}, after which repetitive records are eliminated. In the process of the entries were reduced from the dataset maintained in each of the site. D. Handling Missing Values Most of the dataset have missing values[14]. In order to obtain results that yield better patterns from the dataset, these missing values needs to handle. Different ways[14] of managing missing values include computing and placing the mean for numeric values, finding and inserting the value that has occurred the maximum number of times, estimate the missing value by using the remaining values. For the type of data mining we intend to perform we have replaced the missing values with the average attribute value of the nearest neighbours for numeric values and the most probable values using the Euclidean distance measures for categorical values. On performing preprocessing on the census dataset, the accuracy of the decision tree classifier on the rapidminer tool is shown in fig 2. As shown, the accuracy of the ID3 decision classifier is better for preprocessed data as compared to the dataset before preprocessing. 0 20 40 60 80 100 10000 20000 30000 40000 50000 60000 Dataset Size AccuracyofClassification Before After Fig. 2. Accuracy before and after preprocessing III. SECURE SUM In the course of building a classification model we would like to indicate the total number of records that belong to a salary class less than 10K. At one of the classification step we need to compute the number of records that belong to a particular class. Records are distributed through
4.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 4, July-August (2013), © IAEME 206 various parties we need them to jointly perform the computation. Secure addition secure sum protocols are used for this purpose. A discussion on secure union is given in [4] and [5]. A. Random Secure Sum Protocol As shown in fig 2 and [10], a party p1 generates a random to distort his private input and the summation is computed along the cycle p1->p2->p3->p1. p1 then obtains the result by subtracting the value obtained by the random number. However it been proved that the collusion of pi’s immediate predecessor and immediate successor can find out the private input. As the result this approach has hardly any capability of resisting collusion. Fig. 3. Random Secure Sum Protocol B. Privacy Preserving K-Secure Sum Protocol In this approach as shown in fig 3 and mentioned in [11] and [12] of secure sum computation the party1 divides its data into segments. The amount of segments into which the data is to be divided is collectively decided by all the parties involved in the computation. Party1 distributes each of its segments to other parties and retains one for it. Other parties too divide their data into segments and distribute these segments to all the other parties. Fig. 4. k-secure sum protocol This approach provides outstanding security when the number of parties is greater than 3 and each of the parties have a computing facility. All the parties agree on number of segments of a data. 2 5 2 3 1 3 2 4 4 6 4 6 0 5 1 3 P1 P2 P4 P3 Protocol Initiator Computation Path Distribution Path P1 (n1) P2 (n2) P3 (n3) R+ n1 R+ n1+n2 R+ n1+n2 + n3
5.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 4, July-August (2013), © IAEME 207 C. Secure sum protocol using Homomorphic Encryption In this protocol the homomorphic encryption technique, Paillier cryptosystem approach has been used. The algorithm is as follows: 1. Generate an integer X> . xj is the value to be added at party j to obtain the final sum. 2. Party p1 generates a random number ri , encryption(E) , decryption(D) keys and then encrypts its data x1+ r1 and forwards it to the its next party. It also forwards the (E) to the next party. 3. Each of the remaining parties pi compute E(x1+x2+..+xi+(r1+r2+...+ri)*X) and passes it to p(i+1). 4. At last p1 obtains D (E ( + X* )) mod X = . Where n is the number of parties involved in the computation of sum. Fig. 5. Secure sum using homomorphic encryption The security of this approach largely depends on the homomorphic technique used. Since paillier public key encryption technique is used capability of collusion resistance is larger when compared to the other protocols. However the disadvantage of this method is its high computation cost owing to employing homomorphic cryptosystem. D. Comparison Protocol Advantages Disadvantages Random Secure Sum Protocol Simple Hardly any capability of resisting collusion Privacy Preserving K-Secure Sum Protocol Capability of resisting collusion. Works well when number of parties >3 Secure sum protocol using Homomorphic Encryption Capability of resisting collusion. Works well for parties >=2 High Computation Cost because of homomorphic Encryption Table 1: Comparison of the secure sum protocols As shown in table1 a comparison of the various secure sum protocols implemented have been discussed. We have used to secure sum protocol using homomorphic encryption for secure sum computations on the finance dataset. P1(n1) (R1,E,D) P2(n2) (R2,E) P3(n3) (R3,E) E(R1+ n1),E E(R1+ n1)+E(R2+n2),E E(R1+ n1)+ E(R2+n2)+ E(R3+n2) R+ n1+n2 + n3 P1 finally performs D(E( + X* ))mod X =
6.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 4, July-August (2013), © IAEME 208 The computation cost involved on implementing the above three secure sum approaches on 4 sites interacting with each other. We have implemented the protocols in Java using the client server concepts where the server initiates the process of computation and the client interact in a ring format. As observed in the chart the secure sum protocol using homomorphic encryption takes more time compared to the previous approach but is much more secure. 0 0.2 0.4 0.6 0.8 1 1.2 Computation time in ms 10 100 1000 10000 100000 maximum size of the data at each site Random 4-secure encryption Fig. 6. Computation time of the secure sum protocols in millisecond IV. SECURE UNION Let us imagine a situation where data miners would want to know the tuples that satisfy a criterion. Here the assumption is that data is vertically distributed, which means information (characteristics/attributes) regarding each record is maintained at multiple sites. Sites should collectively obtain the union of the tuples. The computation of union is to be performed in a secure manner without revealing any other information other than what has been queried for. A discussion on secure union is given in [4] and [5]. A. Commutative Secure Union protocol Given in Fig.7 is the first level commutative secure union protocol as mentioned in [6]. This protocol starts with party 1 who encrypts its data and forwards it to site 2. Party 2 encrypts its values as well as the encrypted result values obtained by the other sites. These values are moved on to the neighboring parties where again they are encrypted by the key provided by the party. In the process all the values maintained by the n parties are encrypted n times by the encryption keys of each of the parties. Fig. 7. level 1 of the Commutative Secure Union Protocol A,B,C A,B,C E1(ABC) E3(E1(ABC)) E3(ABC) E2(E3(E1(ABC)) E2(ABC) E2(E3(ABC)) A,B,D
7.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 4, July-August (2013), © IAEME 209 Once the data maintained at each of the sites is encrypted. Party1 shuffles all the n times encrypted values and eliminates the duplicate values. Because of commutative encryption property used while deciding on encryption and decryption approach i.e. E3 (E2 (E1 (ABC)))) = E2 (E3 (E1 (ABC)))), we can identify duplicate values. Finally the encrypted values are decrypted by each of the n sites to know that the union of all the data maintained by multiple sites. For the example in fig 7, union of 3 parties will result in ABC and ABD. The above approach uses commutative encryption technique which adds a large overhead to the mining process. This protocol requires the need for a trusted party. B. Secure Union using Public-key Cryptography Site 1 generates a public encryption key k1 and a private key k2 (decryption). Site1 then forwards its encrypted values to site2 who adds its encrypted values to the database sent by site1 and shuffles them. The shuffled dataset is passed to the next site. The next site repeats the step of encryption, shuffling and forwarding. All sites works locally finding local values and encrypting them using the public key sent by site 1. The last party passed the database obtained, shuffles it and sends it to site1.Site1 obtains the union, decrypts them and forwards it to all the other parties. Public key cryptography used for 3 parties with data is as shown in fig 8. This method reduces the time of mining process compared to the previous method. Also the parties can share the union of their data without the need for an outside trusted party. Fig. 8. Secure union using public key cryptography C. Comparison Fig. 9. Computation time for Algo1 and Algo2 with the pohlig hellman encryption
8.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 4, July-August (2013), © IAEME 210 Given that algo1 is secure union protocol using commutative encryption and algo2 is secure union protocol using public encryption. Both the algorithms have been implemented for securely computing the union of data available at 3 parties. The computation time required for each of the approaches when, given the number of tuples involved in secure union computation is being plotted in fig 9. This graph shows that algo2 has a better computation method over algo1. V. SECURE DIVIDE As shown in [8] , where naïve Bayesian approach is used for privacy preserving classification. Here as per the protocol used on horizontal distributed datasets, to find the number of tuples that belongs to a class and with certain features, besides secure sum, secure division protocol is used. ie All parties want to calculate pyz = Cyz/ny. where Cyz represents number of instances belonging to class y and having an attribute value of z and ny indicates number of instances belonging to class y. A. Secure Division using Secure Log Approach As mentioned in [8] the algorithm is implemented as follows. This is implemented by 2 parties p1 and last party pn • Party p1 generates two random values Rc and Rn and forwards it to pn . • Party pn generates Rc + Cyz mod p and Rn + ny mod p for some value p which is large enough to fit the result. • Party 1 generates another random value v1 and u1 and forwards it to party pn. • Party n obtains v2 = C.ln(Rc + Cyz –Rc mod p) mod p – v1 and u2 = C.ln(Rn + ny–Rn mod p) mod p – u1. Where C is a large value assume by party n. • Party n calculates sk = v2- u2 mod p and sends C(to all parties) and sk to party1. • Party 1 calculates the s1 = sk + v1 – u1 mod p and sends it to all parties. • Now all parties can calculate the divided result as exp (s1/C). However in this approach the amount of security is less since the numerator cannot exceed 512 bits. This approach will also work when the numerator and the denominator are encrypted. The values are in encrypted form in most of the cryptographical approaches of data mining. Hence this method is not suitable. B. Secure Division for encrypted Data Since the numerator(n) and the denominator(d) are in the encrypted form we use this method. The encrypted values are of BigInteger type that exceeds the size of 512 bits as in the earlier approach. The working[13] is as follows: • The sub-linear protocol for obtaining 2ld is used by first obtaining the binary equivalent of d (l- bit size) and using binary search approach on bits in d. • Then the inverse of 2ld is generated i.e. 2-ld . From this [p] = (2ld -d) . 2-ld • Then party 1 a~ = 2k . [2-ld ]. poly(p). where poly(p) uses the square and multiply method to obtain a evaluate where w = 2R for some integer R. • The q^ = n . a~ • q~ = truncate q^. • generate [r] = n – d.q~ • Obtain pos_err = result of the bit comparison (<=)between[d]+[d] and [r]+[d]. • Obtain neg_err = result of the bit comparison (>) between[d] and [r] + [d]. • Obtain the divided result q = q~ + pos_err – neg_err. Party 1 circulates q to all the sites which is the divided result.
9.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 4, July-August (2013), © IAEME 211 The entire sequence of events are performed in party 1 itself hence except for broadcasting the result to all the sites there is no other communication cost. Also security is high since the computations are performed on the encrypted datasets. It has also been observed that the number of rounds is O (log2l) where l is the bit size of d. C. Comparison Given below is the comparison between the two protocols used for performing secure divisions. Secure division approach involves paillier encryption approach hence though computation cost increases the communication cost is reduced compared to the secure log approach. As observed in fig 10 secure division is better than secure log approach for performing secure distributed division. The results have been obtained with data maintained at 3 sites. X axis indicates the number of tuples in each of the site. Y axis indicates the time in millisecond. Fig. 10. Computation time with dataset size on the X axis and execution time in the Y axis VI. CONCLUSIONS The preprocessing techniques have been used on the datasets maintained on each of the sites in order to prepare the data for mining. Secure protocols have been implemented in Java platform with a minimum of 3 parties and analyzed the working of the above methods. The best approaches such as secure sum using homomorphic encryption, secure union using encryption and secure division on encrypted data has been used in implementing our data mining approaches on the horizontally classified datasets maintained at 3 sites. VII. ACKNOWLEDGMENT We acknowledge Manipal University and M S Ramaiah Institute of Technology for giving us an opportunity for working and publishing this paper. REFERENCES Journal Papers [1] Sotiris Kotsiantis,”On implementing a Financial Decision Support System”, International Journal of Computer Science and Network Security, 2006. [2] Mohamed MEdhat Gaber, Arkady Zaslavsky,”Mining Data Streams:A Review”, ACM, SIGMOD Record, June 2007. [3] Somayyeh Seifi Moradi, Mohammad Reza ,”Classification and Evaluation of the Privacy preserving Distributed Data Mining Techniques”, Journal of Theoretical and Applied Information Technology, March 2012. Dataset Size
10.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 4, July-August (2013), © IAEME 212 [4] Wenliang Du, Mikhail J Atallah, “Secure Multi-Party Computation Problems and Applications”, Journal of Security Paradigms, 2001. [5] Bart Kuijpers, Karl Tuyls,” Privacy Preserving ID3 over Horizontally, Vertically and Grid Partitioned Data”, Journal of Security, 2006 [6] Murat Kantarcioglu, Chris Clifton,” Privacy-preserving Distributed Mining of Association Rules on Horizontally Partitioned Data”, IEEE Transactions on Knowledge and Data Engineering, 2003. [7] Murat Kantarcioglu, Jaideep Vaidya,” Privacy Preserving Naive Bayes Classifier for Horizontally Partitioned Data”, ACM Transactions on Information Systems Security,2008 [8] Sameep Mehta , Srinivasan Parthasarathy,”Correlation Preserving Discretization” , IEEE transactions 2006. [9] Omar Hasan, Elisa Bertino,”Efficient Privacy Preserving Reputation protocols inspired by Secure sum”, IEEE transactions, 2010. [10] Rashad Sheikh, Beerendra Kumar,”Privacy Preserving k-secure sum Protocol”, International Journal of Computer Science and Information Security. [11] Rashad Sheikh, Durgesh Kumar Mishra,” A Distributed k-secure Sum Protocol for Secure Multi-Party Computations, Journal of Computing, March 2010. [12] Morten Dahl, Chao Ning, and Tomas Toft, “ On Secure Two-party Integer Division” , Financial Cryptography and data security , Volume 7397, 2012,pp164-178. [13] Y. Lindell and B. Pinkas, Privacy Preserving Data Mining, Advances in Cryptology – CRYPTO '00. Lecture Notes in Computer Science, Vol. 1880, Springer-Verlag, 2000, pp. 36- 53 Books: [14] Pang-Ning Tan, “Introduction to Data Mining”, Pearson Education,2007. Conferences: [15] Agrawal, R., and Srikant, R. (2000). Privacy Preserving Data Mining. ACM SIGMOD International Conference on Management of Data, SIGMOD’00, Dallas, USA.439-450.
Baixar agora