SlideShare uma empresa Scribd logo
1 de 4
Baixar para ler offline
N. A. Pansare et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 2( Version 1), February 2014, pp.403-406

RESEARCH ARTICLE

www.ijera.com

OPEN ACCESS

Association Rule Mining in Distributed Environment
Mrs. V. C. Kulloli (Guide) 1, O.A. Omble2, V.G. Gadle3, Y. G. Potdar4, N. A.
Pansare5,
1

Asst. Prof in IT PCCOE
B.E.I.T PCCOE

2,3,4,5

Abstract
Association rule mining is an important term in data mining. Association rule mining generates important rules
from the data. These rules are called frequent rules and the whole concept is known as frequent rule mining.
Earlier this technique was used to be implemented at local machines to generate rule. But when the data size
increases as transaction on data increases then local machines took large time to compute the frequent rules. To
reduce the time, local machines started upgrading their machine with higher configuration like expanding RAM
or Hard-Disk etc. In our paper we propose a technique in which the data is divided between the machines and
each machine compute the frequent rules based the data which is given to them after division of data. This
technique is related to distributed data mining. Existing framework such as IDMA, EMADS, suffers the
communication overhead. In this paper, the proposed framework will attempt to reduce the communication
overhead. For providing more security against unauthorized clients, we are using RC4 algorithm for encryption
and decryption of messages which is going to be passed between the clients.
Index Terms— FI-Mining, Association Rule Mining, Distributed Data Mining, Intelligent Agent Based
Mining

I. INTRODUCTION
Data mining is a very old concept in research
area. Since the development in computer science the
roots of data mining are going deeper and deeper.
There are many tools available for extracting
information from the data. One of the techniques is
known as Association Rule Mining introduced by
Agrawal et al [1]. It is highly used for generating
frequent pattern set and most popular algorithm is
Apriori algorithm. But the problem with association
rule mining is, it consumes large time for the large
data set. Even a large disk space is required for the
large data set. Distributed data is one way in which
minimizes this problem can be minimized. In
distributed data base the data is divided in many parts
and each part is saved on different machines. Now
each machine is used to mine the important data from
the data set which is given to them machine after
division of data. Mining rules in distributed data is
known as distributed data mining (DDM). A large
amount of time is saved using distributed data mining.
Performing association rule mining in distributed data
mining is called distributed association rule mining.
Our paper is totally based on distributed association
rule mining and reduces the communication between
the
distributed
machines
means
reduces
communication overhead.
We are attempting to produce secure
transmission of messages between different Clients.
For that we are using s a encryption and decryption of
www.ijera.com

messages. The algorithm we are using for encryption
and decryption is RC4 algorithm [12]. The client will
send a message to another client. Server receives the
message and encrypts the message. Server then sends
this encrypted message to the client which was
supposed to receive the message. After receiving the
message, client will decrypt the message in readable
form.

II. RELATED WORK
There are some tools already present in the
field of distributed data mining. Some of them are
mentioned below.
IDMA [9] architecture shows mobile agent
based distributed and incremental association rule
mining. The system includes the distributed
knowledge discovery management system (KDMS),
the knowledge discovery sub-system (sub-KDS), the
data mining mobile agent (DMMA) and the local
knowledge base (LKB). The KDMS dispatches the
mobile agent DMMA to each site. The mobile agents
move to the sub-KDS and execute the mission of data
mining. The local large item set scan be got so the
local association rules can be obtained and the local
knowledge base can be refreshed. The set of local
large item sets and their support counts led back to
the KDMS by the mobile agents. When all the mobile
agents come back to KDMS, the possible minimum
and maximum support counts of the potential global

403 | P a g e
N. A. Pansare et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 2( Version 1), February 2014, pp.403-406
item sets can be got. This system was implemented
based on IBM Aglet.
An Extendible Multi-Agent Data mining
System (EMADS) [8] framework promotes the ideas
of high-availability and high performance without
compromising data or DM algorithm integrity. This
framework provides a highly flexible and extendible
data-mining platform. The resulting system allows
users to build collaborative DM approaches. The
proposed framework has been applied to a number of
DM scenarios: Meta association rule mining (Meta
ARM) and classifier generation.
Our distributed association rule mining
frameworks attempt to integrate global knowledge
after the local mining. This obviously initiates several
research problems: Reducing high communication
cost, handling multiple heterogeneous data sources,
improve the efficiency of incremental knowledge
integration, scalability of the framework, data privacy
& security, fault Tolerance of EMADS and efficient
Data Partitioning

III. PROPOSED FRAMEWORK
This section describes the working of our
proposed framework.
A client server system is made in which all
clients are registered with server. The data is divided
between all clients. Association rule mining algorithm
is present at each client system but not in server
system as it was in earlier mentioned tools. If a client
system is requires frequent item sets then that client
generate its request and send it to server. Now server
will ask each client to apply their association rule
mining for generating frequent rules. Client systems
generate there rules and send it to server. The rules
generated at client side are call local rules. Now server
will add these local rules and make a global rule
which is called global frequent item set.

www.ijera.com

Algorithm 1: Routine K-Server
1. function K-Server (minsup,ls)
2. {
3.
min_sup=minsup;
4.
key=genkey();
5.
GFIL=ø;
6.
LS=ls;
7.
visit=true;
8.
if (visit) then
9.
{
10.
AG=MAGen(LS,min_sup,key,GFIL,visit);
11.
Dispatch(AG,LS.next());
12.
}
13.
else
14.
{
15.
AG=Receive(AG);
16.
GenAsso(GFIL);
17.
}
18. }
Algorithm 2: Routine SA
1. function SA(ls,ms,k,fil,v)
2. {
3.
If (v)
4.
{
5.
If (key==k)
6.
{
7.
Find FI ;
8.
Update GFIL;
9.
If (ls-id.next()==k-server)
10.
{
11.
v=false;
12.
}
13.
Dispatch(AG,ls.next());
14.
}
15.
}
16. }
Below is the proposed architecture diagram
of our framework.

Figure 1: Client-Server based DDM Process
This global frequent item set is then passes to
each client system by server and hence each client is
aware of total rules present in the actual data set.
Below is the proposed algorithm for our proposed
framework.
Figure 2: MAD-ARM Model
www.ijera.com

404 | P a g e
N. A. Pansare et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 2( Version 1), February 2014, pp.403-406
SA : Stationary Agent (Clients)
MA : Mobile Agent (Message Sent to each client)
LS : Local List (Generated by each client)
GFIL: Global Frequent Item set (Generated by
adding all
LS)

IV. SUPPORT AND CONFIDENCE
PHENOMENON
Any given association rule has a support
level and a confidence level. If the percentage of the
population in which the antecedent is satisfied is s,
then the confidence is that the percentage in which
the consequent is also satisfied. Every association
rule has a support and confidence.The support is the
percentage of transactions that demonstrate the
rule.An itemset is called frequent if its support is
equal or greater than an agreed upon minimal value
the support threshold.The confidence is the
conditional probability that, given X present in a
transition , Y will also be present.
Confidence measure, by definition:
Confidence(X=>Y) equals support(X,Y) /
support(X)

If Client 1 wants to send important message
to another Client2 then Client 1 will request to server
that he/she wants to send a secure message to Client2.
Server will accept the request and encrypt the
message of Client 1 using RC4 algorithm. The
encrypted message and a key are then sent to server.
Client 2 receives the encrypted message from the
server. Client 2 decrypts the message in readable form
using RC4 algorithm with the provided key by server.

VI. CONCLUSION
In this paper we present the overview of
Association rule mining in distributed environment or
called Distributed Association rule Mining and points
out the issues in existing systems. Our approach has
minimized the communication between the different
system used for association rule mining. We had
added a secure message transfer between different
clients using RC4 algorithm to provide more security
for unauthorized Clients.

REFERENCES
[1].

V. RC4 ALGORITHM
RC4 is recognized as the most commonly
utilized stream cipher in the world of cryptography. It
is also acknowledged with two other names such as
the ARC4 and ARCFOUR, which means Alleged
RC4.The person responsible behind the creation of
the RC4 is no other than Ronald Rivest of RSA Data
Security Inc. Based on how it was created, RC4 had
the exact function as a shared key stream cipher
algorithm that entails a highly-secured transfer of a
specific shared key.RC4 has a use in both encryption
and decryption while the data stream undergoes XOR
together with a series of generated keys. It takes in
keys of random lengths and this is known as a
producer of pseudo arbitrary numbers. The output is
then XORed together with the stream of data in order
to generate a newly-encrypted data. Hence, a
particular RC4 key should never be utilized again
when encrypting two other data streams.

[2].

[3].

[4].

[5].

[6].

[7].

[8].

www.ijera.com

www.ijera.com

R. Agrawal, T. Imielinski, and A. Swami,
“Mining Associations between Sets of Items
in Massive Databases,” Proceedings of the
ACM SIGMOD, Washington DC, 1993.
Jaturon Chattratichat, John Darlington,
Moustafa Ghanem, and et. al, “Large Scale
Data Mining: challenges and Responses”,
Proceedings of the 3th International
Conference on Knowledge Discovery and
Data Mining, 1997.
Rakesh Agrawal and John C. Shafer,
“Parallel Mining of Association Rules”,
IEEE Transactions on Knowledge and Data
Engineering, 1996.
Matthias Klusch, Stefano Lodi and Gianluca
Moro, “Agent based distributed data mining:
The KDEC Scheme”.
A.O.Ogunde, O.Folorunso, A.S.Sodiya and
G.O.Ogunieye, “ A review of some issues
and challenges in current agent based
distributed association rule mining”, Asian
Journal of Information Technology, 2011.
E.I. Ariwa, M.B.Senousy and M.M.Medhat,
“Information and
E-business
model
application for distributed data mining using
mobile agents”, Proceedings of the
international conference WWW/Internet,
USA,2003.
G.S.Bhamra, A.K.Verma and R.B.Patel,
”Agent Enriched Distributed Association
Rule Mining: A Review”. Springer Verlag
Berlin Heidelberg, 2012.
Kamal Ali Albashiri, FransCoenen, and Paul
Leng, “An investigation into the issues of

405 | P a g e
N. A. Pansare et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 2( Version 1), February 2014, pp.403-406
Multi-Agent Data Mining”Ph.D-Thesis
2010.
[9]. Yun-Lan Wang, Zeng-Zhi Li and Hai-Ping
Zhu, “Mobile Agent Based Distributed and
Incremental Techniques for Association
Rules”. In Proceeding of the Second
International Conference on Machine
Learning and Cybernetics”, 2003.
[10]. U.P.Kulkarni, P.D.Desai, Tanveer Ahmed,
J.V.Vadavi and A.R. Yardi, “Mobile Agent

www.ijera.com

www.ijera.com

Based Distributed Data Mining”, ICCIMA,
2007.
[11]. WalidAdlyAtteya,
KeshavDahal
and
M.AlamgirHossain, “Distributed BitTable
multi-agent Association Rules Mining
Algorithm”, Springer-Verlag, KES 2011,
Part I, LNAI 6881.
[12]. Quentin,
Galvane,
Baptiste,
Uzel
”Cryptography-RC4 Algorithm” February
18,2012.

406 | P a g e

Mais conteúdo relacionado

Mais procurados

IRJET- Multiple Keyword Search over Encrypted Cloud Data
IRJET- Multiple Keyword Search over Encrypted Cloud DataIRJET- Multiple Keyword Search over Encrypted Cloud Data
IRJET- Multiple Keyword Search over Encrypted Cloud DataIRJET Journal
 
Secure distributed deduplication systems with improved reliability
Secure distributed deduplication systems with improved reliabilitySecure distributed deduplication systems with improved reliability
Secure distributed deduplication systems with improved reliabilityPvrtechnologies Nellore
 
Improving Cloud Security Using Data Mining
Improving Cloud Security Using Data MiningImproving Cloud Security Using Data Mining
Improving Cloud Security Using Data MiningIOSR Journals
 
Cloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge PrivacyCloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge PrivacyIJERA Editor
 
Accessing secured data in cloud computing environment
Accessing secured data in cloud computing environmentAccessing secured data in cloud computing environment
Accessing secured data in cloud computing environmentIJNSA Journal
 
Getting Started with Vortex
Getting Started with VortexGetting Started with Vortex
Getting Started with VortexAngelo Corsaro
 
Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
Oruta: Privacy-Preserving Public Auditing for Shared Data in the CloudOruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
Oruta: Privacy-Preserving Public Auditing for Shared Data in the CloudMigrant Systems
 
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Review on Key Based Encryption Scheme for Secure Data Sharing on CloudReview on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Review on Key Based Encryption Scheme for Secure Data Sharing on CloudIRJET Journal
 
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...Migrant Systems
 
PUBLIC INTEGRITY AUDITING FOR SHARED DYNAMIC CLOUD DATA WITH GROUP USER REVO...
 PUBLIC INTEGRITY AUDITING FOR SHARED DYNAMIC CLOUD DATA WITH GROUP USER REVO... PUBLIC INTEGRITY AUDITING FOR SHARED DYNAMIC CLOUD DATA WITH GROUP USER REVO...
PUBLIC INTEGRITY AUDITING FOR SHARED DYNAMIC CLOUD DATA WITH GROUP USER REVO...Nexgen Technology
 
FILESHADER: ENTRUSTED DATA INTEGRATION USING HASH SERVER
FILESHADER: ENTRUSTED DATA INTEGRATION USING HASH SERVER FILESHADER: ENTRUSTED DATA INTEGRATION USING HASH SERVER
FILESHADER: ENTRUSTED DATA INTEGRATION USING HASH SERVER csandit
 
Improving security for data migration in cloud computing using randomized enc...
Improving security for data migration in cloud computing using randomized enc...Improving security for data migration in cloud computing using randomized enc...
Improving security for data migration in cloud computing using randomized enc...IOSR Journals
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
Paper id 27201448
Paper id 27201448Paper id 27201448
Paper id 27201448IJRAT
 
Secure Medical Data Computation using Virtual_ID Authentication and File Swap...
Secure Medical Data Computation using Virtual_ID Authentication and File Swap...Secure Medical Data Computation using Virtual_ID Authentication and File Swap...
Secure Medical Data Computation using Virtual_ID Authentication and File Swap...IJASRD Journal
 
3 ijece 1 ed iqbal qc
3 ijece 1 ed iqbal qc3 ijece 1 ed iqbal qc
3 ijece 1 ed iqbal qcIAESIJEECS
 
IRJET- Continuous Auditing Approach to the Cloud Service Addressing Attri...
IRJET-  	  Continuous Auditing Approach to the Cloud Service Addressing Attri...IRJET-  	  Continuous Auditing Approach to the Cloud Service Addressing Attri...
IRJET- Continuous Auditing Approach to the Cloud Service Addressing Attri...IRJET Journal
 

Mais procurados (19)

IRJET- Multiple Keyword Search over Encrypted Cloud Data
IRJET- Multiple Keyword Search over Encrypted Cloud DataIRJET- Multiple Keyword Search over Encrypted Cloud Data
IRJET- Multiple Keyword Search over Encrypted Cloud Data
 
Secure distributed deduplication systems with improved reliability
Secure distributed deduplication systems with improved reliabilitySecure distributed deduplication systems with improved reliability
Secure distributed deduplication systems with improved reliability
 
Improving Cloud Security Using Data Mining
Improving Cloud Security Using Data MiningImproving Cloud Security Using Data Mining
Improving Cloud Security Using Data Mining
 
Cloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge PrivacyCloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge Privacy
 
Accessing secured data in cloud computing environment
Accessing secured data in cloud computing environmentAccessing secured data in cloud computing environment
Accessing secured data in cloud computing environment
 
Getting Started with Vortex
Getting Started with VortexGetting Started with Vortex
Getting Started with Vortex
 
L01246974
L01246974L01246974
L01246974
 
Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
Oruta: Privacy-Preserving Public Auditing for Shared Data in the CloudOruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
 
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Review on Key Based Encryption Scheme for Secure Data Sharing on CloudReview on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
 
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
 
PUBLIC INTEGRITY AUDITING FOR SHARED DYNAMIC CLOUD DATA WITH GROUP USER REVO...
 PUBLIC INTEGRITY AUDITING FOR SHARED DYNAMIC CLOUD DATA WITH GROUP USER REVO... PUBLIC INTEGRITY AUDITING FOR SHARED DYNAMIC CLOUD DATA WITH GROUP USER REVO...
PUBLIC INTEGRITY AUDITING FOR SHARED DYNAMIC CLOUD DATA WITH GROUP USER REVO...
 
FILESHADER: ENTRUSTED DATA INTEGRATION USING HASH SERVER
FILESHADER: ENTRUSTED DATA INTEGRATION USING HASH SERVER FILESHADER: ENTRUSTED DATA INTEGRATION USING HASH SERVER
FILESHADER: ENTRUSTED DATA INTEGRATION USING HASH SERVER
 
Improving security for data migration in cloud computing using randomized enc...
Improving security for data migration in cloud computing using randomized enc...Improving security for data migration in cloud computing using randomized enc...
Improving security for data migration in cloud computing using randomized enc...
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
Paper id 27201448
Paper id 27201448Paper id 27201448
Paper id 27201448
 
Secure Medical Data Computation using Virtual_ID Authentication and File Swap...
Secure Medical Data Computation using Virtual_ID Authentication and File Swap...Secure Medical Data Computation using Virtual_ID Authentication and File Swap...
Secure Medical Data Computation using Virtual_ID Authentication and File Swap...
 
Data attribute security and privacy in Collaborative distributed database Pub...
Data attribute security and privacy in Collaborative distributed database Pub...Data attribute security and privacy in Collaborative distributed database Pub...
Data attribute security and privacy in Collaborative distributed database Pub...
 
3 ijece 1 ed iqbal qc
3 ijece 1 ed iqbal qc3 ijece 1 ed iqbal qc
3 ijece 1 ed iqbal qc
 
IRJET- Continuous Auditing Approach to the Cloud Service Addressing Attri...
IRJET-  	  Continuous Auditing Approach to the Cloud Service Addressing Attri...IRJET-  	  Continuous Auditing Approach to the Cloud Service Addressing Attri...
IRJET- Continuous Auditing Approach to the Cloud Service Addressing Attri...
 

Destaque (20)

Ce4201528546
Ce4201528546Ce4201528546
Ce4201528546
 
By4201499502
By4201499502By4201499502
By4201499502
 
Ci4201564569
Ci4201564569Ci4201564569
Ci4201564569
 
Bs4201462467
Bs4201462467Bs4201462467
Bs4201462467
 
Bibliografía
BibliografíaBibliografía
Bibliografía
 
Guidelines On Drawstrings Of Children Outer Wear
Guidelines On Drawstrings Of Children Outer WearGuidelines On Drawstrings Of Children Outer Wear
Guidelines On Drawstrings Of Children Outer Wear
 
TECNOLOGIA ACTUAL
TECNOLOGIA ACTUALTECNOLOGIA ACTUAL
TECNOLOGIA ACTUAL
 
Data Management
Data ManagementData Management
Data Management
 
M25057062
M25057062M25057062
M25057062
 
Me2521122119
Me2521122119Me2521122119
Me2521122119
 
Mc2521062109
Mc2521062109Mc2521062109
Mc2521062109
 
Do31774777
Do31774777Do31774777
Do31774777
 
Dk31751757
Dk31751757Dk31751757
Dk31751757
 
Mp3621482152
Mp3621482152Mp3621482152
Mp3621482152
 
Ms3621652169
Ms3621652169Ms3621652169
Ms3621652169
 
Ml3621282131
Ml3621282131Ml3621282131
Ml3621282131
 
Gh2411361141
Gh2411361141Gh2411361141
Gh2411361141
 
Oamor 7ºano
Oamor 7ºanoOamor 7ºano
Oamor 7ºano
 
La ecologia
La ecologiaLa ecologia
La ecologia
 
Tipos de ram.pdfd
Tipos de ram.pdfdTipos de ram.pdfd
Tipos de ram.pdfd
 

Semelhante a Bi4201403406

Secure Mining of Association Rules in Horizontally Distributed Databases
Secure Mining of Association Rules in Horizontally Distributed DatabasesSecure Mining of Association Rules in Horizontally Distributed Databases
Secure Mining of Association Rules in Horizontally Distributed DatabasesIJSRD
 
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENTACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENTIJNSA Journal
 
710201940
710201940710201940
710201940IJRAT
 
Distributed Framework for Data Mining As a Service on Private Cloud
Distributed Framework for Data Mining As a Service on Private CloudDistributed Framework for Data Mining As a Service on Private Cloud
Distributed Framework for Data Mining As a Service on Private CloudIJERA Editor
 
2014 IEEE JAVA DATA MINING PROJECT Secure mining of association rules in hori...
2014 IEEE JAVA DATA MINING PROJECT Secure mining of association rules in hori...2014 IEEE JAVA DATA MINING PROJECT Secure mining of association rules in hori...
2014 IEEE JAVA DATA MINING PROJECT Secure mining of association rules in hori...IEEEMEMTECHSTUDENTSPROJECTS
 
IEEE 2014 JAVA DATA MINING PROJECTS Secure mining of association rules in hor...
IEEE 2014 JAVA DATA MINING PROJECTS Secure mining of association rules in hor...IEEE 2014 JAVA DATA MINING PROJECTS Secure mining of association rules in hor...
IEEE 2014 JAVA DATA MINING PROJECTS Secure mining of association rules in hor...IEEEFINALYEARSTUDENTPROJECTS
 
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET Journal
 
Centralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data ServicesCentralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data ServicesEditor IJMTER
 
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...ijcseit
 
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...ijcseit
 
Privacy Preserving Data Mining Technique to Recover Association Rules Using H...
Privacy Preserving Data Mining Technique to Recover Association Rules Using H...Privacy Preserving Data Mining Technique to Recover Association Rules Using H...
Privacy Preserving Data Mining Technique to Recover Association Rules Using H...IJSRED
 
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud StorageA Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud StorageIRJET Journal
 
An in-building multi-server cloud system based on shortest Path algorithm dep...
An in-building multi-server cloud system based on shortest Path algorithm dep...An in-building multi-server cloud system based on shortest Path algorithm dep...
An in-building multi-server cloud system based on shortest Path algorithm dep...IOSR Journals
 
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
IRJET-  	  Efficient Privacy-Preserving using Novel Based Secure Protocol in SVMIRJET-  	  Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVMIRJET Journal
 
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)IRJET Journal
 
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET Journal
 
IRJET- Review on Privacy Preserving on Multi Keyword Search over Encrypte...
IRJET-  	  Review on Privacy Preserving on Multi Keyword Search over Encrypte...IRJET-  	  Review on Privacy Preserving on Multi Keyword Search over Encrypte...
IRJET- Review on Privacy Preserving on Multi Keyword Search over Encrypte...IRJET Journal
 

Semelhante a Bi4201403406 (20)

Secure Mining of Association Rules in Horizontally Distributed Databases
Secure Mining of Association Rules in Horizontally Distributed DatabasesSecure Mining of Association Rules in Horizontally Distributed Databases
Secure Mining of Association Rules in Horizontally Distributed Databases
 
IoTReport
IoTReportIoTReport
IoTReport
 
El35782786
El35782786El35782786
El35782786
 
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENTACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
 
710201940
710201940710201940
710201940
 
Distributed Framework for Data Mining As a Service on Private Cloud
Distributed Framework for Data Mining As a Service on Private CloudDistributed Framework for Data Mining As a Service on Private Cloud
Distributed Framework for Data Mining As a Service on Private Cloud
 
2014 IEEE JAVA DATA MINING PROJECT Secure mining of association rules in hori...
2014 IEEE JAVA DATA MINING PROJECT Secure mining of association rules in hori...2014 IEEE JAVA DATA MINING PROJECT Secure mining of association rules in hori...
2014 IEEE JAVA DATA MINING PROJECT Secure mining of association rules in hori...
 
IEEE 2014 JAVA DATA MINING PROJECTS Secure mining of association rules in hor...
IEEE 2014 JAVA DATA MINING PROJECTS Secure mining of association rules in hor...IEEE 2014 JAVA DATA MINING PROJECTS Secure mining of association rules in hor...
IEEE 2014 JAVA DATA MINING PROJECTS Secure mining of association rules in hor...
 
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
 
Centralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data ServicesCentralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data Services
 
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
 
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
 
Privacy Preserving Data Mining Technique to Recover Association Rules Using H...
Privacy Preserving Data Mining Technique to Recover Association Rules Using H...Privacy Preserving Data Mining Technique to Recover Association Rules Using H...
Privacy Preserving Data Mining Technique to Recover Association Rules Using H...
 
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud StorageA Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
 
An in-building multi-server cloud system based on shortest Path algorithm dep...
An in-building multi-server cloud system based on shortest Path algorithm dep...An in-building multi-server cloud system based on shortest Path algorithm dep...
An in-building multi-server cloud system based on shortest Path algorithm dep...
 
H017113842
H017113842H017113842
H017113842
 
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
IRJET-  	  Efficient Privacy-Preserving using Novel Based Secure Protocol in SVMIRJET-  	  Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
 
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)
 
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
 
IRJET- Review on Privacy Preserving on Multi Keyword Search over Encrypte...
IRJET-  	  Review on Privacy Preserving on Multi Keyword Search over Encrypte...IRJET-  	  Review on Privacy Preserving on Multi Keyword Search over Encrypte...
IRJET- Review on Privacy Preserving on Multi Keyword Search over Encrypte...
 

Último

A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusZilliz
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbuapidays
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 

Último (20)

A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 

Bi4201403406

  • 1. N. A. Pansare et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 4, Issue 2( Version 1), February 2014, pp.403-406 RESEARCH ARTICLE www.ijera.com OPEN ACCESS Association Rule Mining in Distributed Environment Mrs. V. C. Kulloli (Guide) 1, O.A. Omble2, V.G. Gadle3, Y. G. Potdar4, N. A. Pansare5, 1 Asst. Prof in IT PCCOE B.E.I.T PCCOE 2,3,4,5 Abstract Association rule mining is an important term in data mining. Association rule mining generates important rules from the data. These rules are called frequent rules and the whole concept is known as frequent rule mining. Earlier this technique was used to be implemented at local machines to generate rule. But when the data size increases as transaction on data increases then local machines took large time to compute the frequent rules. To reduce the time, local machines started upgrading their machine with higher configuration like expanding RAM or Hard-Disk etc. In our paper we propose a technique in which the data is divided between the machines and each machine compute the frequent rules based the data which is given to them after division of data. This technique is related to distributed data mining. Existing framework such as IDMA, EMADS, suffers the communication overhead. In this paper, the proposed framework will attempt to reduce the communication overhead. For providing more security against unauthorized clients, we are using RC4 algorithm for encryption and decryption of messages which is going to be passed between the clients. Index Terms— FI-Mining, Association Rule Mining, Distributed Data Mining, Intelligent Agent Based Mining I. INTRODUCTION Data mining is a very old concept in research area. Since the development in computer science the roots of data mining are going deeper and deeper. There are many tools available for extracting information from the data. One of the techniques is known as Association Rule Mining introduced by Agrawal et al [1]. It is highly used for generating frequent pattern set and most popular algorithm is Apriori algorithm. But the problem with association rule mining is, it consumes large time for the large data set. Even a large disk space is required for the large data set. Distributed data is one way in which minimizes this problem can be minimized. In distributed data base the data is divided in many parts and each part is saved on different machines. Now each machine is used to mine the important data from the data set which is given to them machine after division of data. Mining rules in distributed data is known as distributed data mining (DDM). A large amount of time is saved using distributed data mining. Performing association rule mining in distributed data mining is called distributed association rule mining. Our paper is totally based on distributed association rule mining and reduces the communication between the distributed machines means reduces communication overhead. We are attempting to produce secure transmission of messages between different Clients. For that we are using s a encryption and decryption of www.ijera.com messages. The algorithm we are using for encryption and decryption is RC4 algorithm [12]. The client will send a message to another client. Server receives the message and encrypts the message. Server then sends this encrypted message to the client which was supposed to receive the message. After receiving the message, client will decrypt the message in readable form. II. RELATED WORK There are some tools already present in the field of distributed data mining. Some of them are mentioned below. IDMA [9] architecture shows mobile agent based distributed and incremental association rule mining. The system includes the distributed knowledge discovery management system (KDMS), the knowledge discovery sub-system (sub-KDS), the data mining mobile agent (DMMA) and the local knowledge base (LKB). The KDMS dispatches the mobile agent DMMA to each site. The mobile agents move to the sub-KDS and execute the mission of data mining. The local large item set scan be got so the local association rules can be obtained and the local knowledge base can be refreshed. The set of local large item sets and their support counts led back to the KDMS by the mobile agents. When all the mobile agents come back to KDMS, the possible minimum and maximum support counts of the potential global 403 | P a g e
  • 2. N. A. Pansare et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 4, Issue 2( Version 1), February 2014, pp.403-406 item sets can be got. This system was implemented based on IBM Aglet. An Extendible Multi-Agent Data mining System (EMADS) [8] framework promotes the ideas of high-availability and high performance without compromising data or DM algorithm integrity. This framework provides a highly flexible and extendible data-mining platform. The resulting system allows users to build collaborative DM approaches. The proposed framework has been applied to a number of DM scenarios: Meta association rule mining (Meta ARM) and classifier generation. Our distributed association rule mining frameworks attempt to integrate global knowledge after the local mining. This obviously initiates several research problems: Reducing high communication cost, handling multiple heterogeneous data sources, improve the efficiency of incremental knowledge integration, scalability of the framework, data privacy & security, fault Tolerance of EMADS and efficient Data Partitioning III. PROPOSED FRAMEWORK This section describes the working of our proposed framework. A client server system is made in which all clients are registered with server. The data is divided between all clients. Association rule mining algorithm is present at each client system but not in server system as it was in earlier mentioned tools. If a client system is requires frequent item sets then that client generate its request and send it to server. Now server will ask each client to apply their association rule mining for generating frequent rules. Client systems generate there rules and send it to server. The rules generated at client side are call local rules. Now server will add these local rules and make a global rule which is called global frequent item set. www.ijera.com Algorithm 1: Routine K-Server 1. function K-Server (minsup,ls) 2. { 3. min_sup=minsup; 4. key=genkey(); 5. GFIL=ø; 6. LS=ls; 7. visit=true; 8. if (visit) then 9. { 10. AG=MAGen(LS,min_sup,key,GFIL,visit); 11. Dispatch(AG,LS.next()); 12. } 13. else 14. { 15. AG=Receive(AG); 16. GenAsso(GFIL); 17. } 18. } Algorithm 2: Routine SA 1. function SA(ls,ms,k,fil,v) 2. { 3. If (v) 4. { 5. If (key==k) 6. { 7. Find FI ; 8. Update GFIL; 9. If (ls-id.next()==k-server) 10. { 11. v=false; 12. } 13. Dispatch(AG,ls.next()); 14. } 15. } 16. } Below is the proposed architecture diagram of our framework. Figure 1: Client-Server based DDM Process This global frequent item set is then passes to each client system by server and hence each client is aware of total rules present in the actual data set. Below is the proposed algorithm for our proposed framework. Figure 2: MAD-ARM Model www.ijera.com 404 | P a g e
  • 3. N. A. Pansare et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 4, Issue 2( Version 1), February 2014, pp.403-406 SA : Stationary Agent (Clients) MA : Mobile Agent (Message Sent to each client) LS : Local List (Generated by each client) GFIL: Global Frequent Item set (Generated by adding all LS) IV. SUPPORT AND CONFIDENCE PHENOMENON Any given association rule has a support level and a confidence level. If the percentage of the population in which the antecedent is satisfied is s, then the confidence is that the percentage in which the consequent is also satisfied. Every association rule has a support and confidence.The support is the percentage of transactions that demonstrate the rule.An itemset is called frequent if its support is equal or greater than an agreed upon minimal value the support threshold.The confidence is the conditional probability that, given X present in a transition , Y will also be present. Confidence measure, by definition: Confidence(X=>Y) equals support(X,Y) / support(X) If Client 1 wants to send important message to another Client2 then Client 1 will request to server that he/she wants to send a secure message to Client2. Server will accept the request and encrypt the message of Client 1 using RC4 algorithm. The encrypted message and a key are then sent to server. Client 2 receives the encrypted message from the server. Client 2 decrypts the message in readable form using RC4 algorithm with the provided key by server. VI. CONCLUSION In this paper we present the overview of Association rule mining in distributed environment or called Distributed Association rule Mining and points out the issues in existing systems. Our approach has minimized the communication between the different system used for association rule mining. We had added a secure message transfer between different clients using RC4 algorithm to provide more security for unauthorized Clients. REFERENCES [1]. V. RC4 ALGORITHM RC4 is recognized as the most commonly utilized stream cipher in the world of cryptography. It is also acknowledged with two other names such as the ARC4 and ARCFOUR, which means Alleged RC4.The person responsible behind the creation of the RC4 is no other than Ronald Rivest of RSA Data Security Inc. Based on how it was created, RC4 had the exact function as a shared key stream cipher algorithm that entails a highly-secured transfer of a specific shared key.RC4 has a use in both encryption and decryption while the data stream undergoes XOR together with a series of generated keys. It takes in keys of random lengths and this is known as a producer of pseudo arbitrary numbers. The output is then XORed together with the stream of data in order to generate a newly-encrypted data. Hence, a particular RC4 key should never be utilized again when encrypting two other data streams. [2]. [3]. [4]. [5]. [6]. [7]. [8]. www.ijera.com www.ijera.com R. Agrawal, T. Imielinski, and A. Swami, “Mining Associations between Sets of Items in Massive Databases,” Proceedings of the ACM SIGMOD, Washington DC, 1993. Jaturon Chattratichat, John Darlington, Moustafa Ghanem, and et. al, “Large Scale Data Mining: challenges and Responses”, Proceedings of the 3th International Conference on Knowledge Discovery and Data Mining, 1997. Rakesh Agrawal and John C. Shafer, “Parallel Mining of Association Rules”, IEEE Transactions on Knowledge and Data Engineering, 1996. Matthias Klusch, Stefano Lodi and Gianluca Moro, “Agent based distributed data mining: The KDEC Scheme”. A.O.Ogunde, O.Folorunso, A.S.Sodiya and G.O.Ogunieye, “ A review of some issues and challenges in current agent based distributed association rule mining”, Asian Journal of Information Technology, 2011. E.I. Ariwa, M.B.Senousy and M.M.Medhat, “Information and E-business model application for distributed data mining using mobile agents”, Proceedings of the international conference WWW/Internet, USA,2003. G.S.Bhamra, A.K.Verma and R.B.Patel, ”Agent Enriched Distributed Association Rule Mining: A Review”. Springer Verlag Berlin Heidelberg, 2012. Kamal Ali Albashiri, FransCoenen, and Paul Leng, “An investigation into the issues of 405 | P a g e
  • 4. N. A. Pansare et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 4, Issue 2( Version 1), February 2014, pp.403-406 Multi-Agent Data Mining”Ph.D-Thesis 2010. [9]. Yun-Lan Wang, Zeng-Zhi Li and Hai-Ping Zhu, “Mobile Agent Based Distributed and Incremental Techniques for Association Rules”. In Proceeding of the Second International Conference on Machine Learning and Cybernetics”, 2003. [10]. U.P.Kulkarni, P.D.Desai, Tanveer Ahmed, J.V.Vadavi and A.R. Yardi, “Mobile Agent www.ijera.com www.ijera.com Based Distributed Data Mining”, ICCIMA, 2007. [11]. WalidAdlyAtteya, KeshavDahal and M.AlamgirHossain, “Distributed BitTable multi-agent Association Rules Mining Algorithm”, Springer-Verlag, KES 2011, Part I, LNAI 6881. [12]. Quentin, Galvane, Baptiste, Uzel ”Cryptography-RC4 Algorithm” February 18,2012. 406 | P a g e