SlideShare une entreprise Scribd logo
1  sur  4
Télécharger pour lire hors ligne
ISSN(Online): 2395-xxxx
International Journal of Innovative Research in Computer
and Electronics Engineering
Vol. 1, Issue 5, May 2015
Copyright to IJIRCEE www.ijircee.com 11
Efficient Data Mining Of Association Rules in
Horizontally Distributed Databases
Vasanthakumar P1, Jayasudha R2, Prof Srinivasan R3
M.Tech (IT) Student, Department of IT, PSV College of Engg & Tech, Krishnagiri, TN.India1
Assistant Professor, Department of IT, PSV College of Engg & Tech, Krishnagiri, TN,India2
Head of Department , Department of IT, PSV College of Engg & Tech, Krishnagiri, TN, India3
ABSTRACT: This paper proposes a protocol to perform secure mining of association rules in horizontally distributed
databases. The current leading protocol is that of Kantarcioglu and Clifton. This protocol, like theirs, is based on the
Fast Distributed Mining (FDM) algorithm of Cheung et al. which is an unsecured distributed version of the Apriori
algorithm. The main ingredients in this protocol are two novel secure multi-party algorithms one that computes the
union of private subsets that each of the interacting players hold, and another that tests the inclusion of an element held
by one player in a subset held by another. The secure multi-party computation definitions from the cryptography
domain may be too restrictive for our purpose. A specific example of the need for more flexible definitions can be seen
in Protocol it is possible to mine globally valid results from distributed data without revealing information that
compromises the privacy of the individual sources. This protocol offers enhanced privacy with respect to the protocol.
In addition, it is simpler and is significantly more efficient in terms of communication rounds, communication cost and
computational cost.
KEYWORDS: Privacy Preserving Data Mining; Distributed Computation; Frequent Item sets; Association Rules.
I. INTRODUCTION
We study here the problem of secure mining of association rules in horizontally partitioned databases. In that
setting, There are several sites (or players) that hold homogeneous databases, i.e., databases that share the same schema
but hold information on different entities. The goal is to find all association rules with support at least s and confidence
at least c, for some given minimal support size s and confidence level c, that hold in the unified database, while
minimizing the information disclosed about the private databases held by those players. The information that we would
like to protect in this context is not only individual transactions in the different databases, but also more global
information such as what association rules are supported locally in each of those databases. That goal defines a problem
of secure multi-party computation. In such problems, there are M players that hold private inputs, x1, . . . , x M, and
they wish to securely compute y = f(x1, . . . , xM) for some public function f. If there existed a trusted third party, the
players could surrender to him their inputs and he would perform the function evaluation and send to them the resulting
output. In the absence of such a trusted third party, it is needed to devise a protocol that the players can run on their
own in order to arrive at the required output y. Such a protocol is considered perfectly secure if no player can learn
from his view of the protocol more than what he would have learnt in the idealized setting where the computation is
carried out by a trusted third party. Yao [2] was the first to propose a generic solution for this problem in the case of
two players. The main part of the protocol is a sub-protocol for the secure computation of the union of private subsets
that are held by the different players. The most costly part of the protocol and its implementation relies upon
cryptographic primitives such as commutative encryption, oblivious transfer, and hash functions. In particular, our
protocol does not depend on commutative encryption and oblivious transfer (what simplifies it significantly and
contributes towards much reduced communication and computational costs). While our solution is still not perfectly
secure, it leaks excess information only to a small number (three) of possible coalitions. Here in we propose an
alternative protocol for the secure computation of the union of private subsets. The proposed protocol improves upon
that in [1] in terms of simplicity and efficiency as well as privacy. In particular, our protocol does not depend on
commutative encryption and oblivious transfer (what simplifies it significantly and contributes towards much reduced
communication and computational costs). While our solution is still not perfectly secure, it leaks excess information
only to a small number (three) of possible coalitions, unlike the protocol of [1] that discloses information also to some
single players. In addition, we claim that the excess information that our protocol may leak is less sensitive than the
excess information leaked by the protocol.
ISSN(Online): 2395-xxxx
International Journal of Innovative Research in Computer
and Electronics Engineering
Vol. 1, Issue 5, May 2015
Copyright to IJIRCEE www.ijircee.com 12
II. RELATED WORK
In [1] the use of cryptographic hash functions like MD5 or SHA-1 for message authentication has become a
standard approach in many applications, particularly Internet security protocols. Though very easy to implement, these
mechanisms are usually based on ad hoc techniques that lack a sound security analysis. We present new, simple, and
practical constructions of message authentication schemes based on a cryptographic hash function. Our schemes,
NMAC and HMAC, are proven to be secure as long as the underlying hash function has some reasonable cryptographic
strength. Moreover we show, in a quantitative way, that the schemes retain almost all the security of the underlying
hash function. The performance of our schemes is essentially that of the underlying hash function. Moreover they use
the hash function (or its compression function) as a black box, so that widely available library code or hardware can be
used to implement them in a simple way, and replace ability of the underlying hash function is easily supported. In [2]
system for secure multi-party computation. Secure computation is one of the great achievements of modern
cryptography, enabling a set of untrusting parties to compute any function of their private inputs while revealing
nothing but the result of the function. In a sense, FairplayMP lets the parties run a joint computation that emulates a
trusted party which receives the inputs from the parties, computes the function, and privately informs the parties of
their outputs. FairplayMP operates by receiving a high-level language description of a function and a configuration file
describing the participating parties. The system compiles the function into a description as a Boolean circuit, and
performs a distributed evaluation of the circuit while revealing nothing else. FairplayMP supplements the Fairplay
system, which supported secure computation between two parties. The underlying protocol of FairplayMP is the
Beaver-Micali-Rogaway (BMR) protocol which runs in a constant number of communication rounds (eight rounds in
our implementation). We modified the BMR protocol in a novel way and considerably improved its performance by
using the Ben-Or-Goldwasser-Wigderson (BGW) protocol for the purpose of constructing gate tables. We chose to use
this protocol since we believe that the number of communication rounds is a major factor on the overall performance of
the protocol. We conducted different experiments which measure the effect of different parameters on the performance
of the system and demonstrate its scalability. In [3] this paper describes a homomorphism property attained by these
and several other secret sharing schemes which allow multiple secrets to be combined by direct computation on shares.
This property reduces the need for trust among agents and allows secret sharing to be applied to many new problems.
One application described gives a method of verifiable secret sharing which is much simpler and more efficient than
previous schemes. A second application is described which gives a fault-tolerant method of holding verifiable secret-
ballot elections. In [4] file distribution and storage in a cloud storage environment is usually handled by storage device
providers or physical storage devices rented from third parties.Files can be integrated into useful resources that users
are then able to access via centralized management and virtualization. Nevertheless, when the number of files continues
to increase, the condition of every storage node cannot be guaranteed by the manager. High volumes of files will result
in wasted hardware resources, increased control complexity of the data centre, and a less efficient cloud storage system.
III. PROBLEM DEFINITION
Kantarcioglu and Clifton studied that problems and devised a protocol for its solution. The main part of the
protocol is a sub-protocol for the secure computation of the union of private subsets that are held by the different
players. (The private subset of a given player, as we explain below, includes the item sets that are s-frequent in his
partial database. That is the most costly part of the protocol and its implementation relies upon cryptographic primitives
such as commutative encryption, oblivious transfer, and hash functions. This is also the only part in the protocol in
which the players may extract from their view of the protocol information on other databases, beyond what is implied
by the final output and their own input. While such leakage of information renders the protocol not perfectly secure, the
perimeter of the excess information is explicitly bounded and it is argued there that such information leakage is
innocuous, whence acceptable from a practical point of view.
The protocol that we propose here computes a parameterized family of functions, which we call threshold
functions, in which the two extreme cases correspond to the problems of computing the union and intersection of
private subsets. Those are in fact general-purpose protocols that can be used in other contexts as well. Another problem
of secure multiparty computation that we solve here as part of our discussion is the set inclusion problem; namely, the
problem where Alice holds a private subset of some ground set, and Bob holds an element in the ground set, and they
wish to determine whether Bob’s element is within Alice’s subset, without revealing to either of them information
about the other party’s input beyond the above described inclusion.
ISSN(Online): 2395-xxxx
International Journal of Innovative Research in Computer
and Electronics Engineering
Vol. 1, Issue 5, May 2015
Copyright to IJIRCEE www.ijircee.com 13
We proposed a protocol for secure mining of association rules in horizontally distributed databases that
improves significantly upon the current leading protocol in terms of privacy and efficiency. The main ingredient in our
proposed protocol is a novel secure multi-party protocol for computing the union (or intersection) of private subsets
that each of the interacting players holds.
IV.IMPLEMENTATION AND RESULT
A: Privacy Preserving Data Mining
One, in which the data owner and the data miner are two different entities, and another, in which the data is
distributed among several parties who aim to jointly perform data mining on the unified corpus of data that they hold.
In the first setting, the goal is to protect the data records from the data miner. Hence, the data owner aims at anonym
zing the data prior to its release. The main approach in this context is to apply data perturbation. The idea is that.
Computation and communication costs versus the number of transactions N the perturbed data can be used to infer
general trends in the data, without revealing original record information. In the second setting, the goal is to perform
data mining while protecting the data records of each of the data owners from the other data owners. This is a problem
of secure multiparty computation. The usual approach here is cryptographic rather than probabilistic.
B: Distributed Computation
We compared the performance of two secure implementations of the FDM algorithm Section In the first
implementation (denoted FDM-KC), we executed the unification step using Protocol UNIFI-KC, where the
commutative cipher was 1024-bit RSA in the second implementation (denoted FDM) we used our Protocol UNIFI,
where the keyed-hash function was HMAC. In both implementations, we implemented Step 5 of the FDM algorithm in
the secure manner that was described in later. We tested the two implementations with respect to three measures: Total
computation time of the complete protocols (FDMKC and FDM) over all players. That measure includes the Apriori
computation time, and the time to identify the globally s-frequent item sets, as described in later.Total computation
time of the unification protocols only (UNIFI-KC and UNIFI) over all players. Total message size. We ran three
experiment sets, where each set tested the dependence of the above measures on a different parameter: N the number of
transactions in the unified database.
C: Frequent Itemsets
We describe here the solution that was proposed by Kantarcioglu and Clifton. They considered two possible
settings. If the required output includes all globally s-frequent item sets, as well as the sizes of their supports, then the
values of Δ(x) can be revealed for all. In such a case, those values may be computed using a secure summation
protocol, where the private addend of Pm is suppm(x), sNm. The more interesting setting, however, is the one where
the support sizes are not part of the required output. We proceed to discuss it.
D: Association Rules
Once the set Fs of all s-frequent itemsets is found, we may proceed to look for all (s, c) association rules (rules
with support at least sN and confidence at least c). In order to derive from Fs all (s, c)-association rules in an efficient
manner we rely upon the straightforward lemma. Association Rules run on the server and find out the similarities of
DNA data’s from the various trusted clients and it can collect the information from global data owners.
V. CONCLUSION AND FUTURE WORK
This paper proposed a protocol to perform secure mining of association rules in horizontally distributed
databases that improves significantly upon the current leading protocol in terms of privacy and efficiency. One of the
main ingredients in our proposed protocol is a novel secure multi-party protocol for computing the union (or
intersection) of private subsets that each of the interacting players holds. Another ingredient is a protocol that tests the
ISSN(Online): 2395-xxxx
International Journal of Innovative Research in Computer
and Electronics Engineering
Vol. 1, Issue 5, May 2015
Copyright to IJIRCEE www.ijircee.com 14
inclusion of an element held by one player in a subset held by another. Those protocols exploit the fact that the
underlying problem is of interest only when the number of players is greater than two.
The secure multi-party computation definitions from the cryptography domain may be too restrictive for our
purposes. A specific example of the need for more flexible definition scan be seen in Protocol it is possible to mine
globally valid results from distributed data without revealing information that compromises the privacy of the
individual sources. Such privacy preserving data mining can be done with a reasonable increase in cost over methods
that do not maintain privacy. Continued research will expand the scope of privacy-preserving data mining, enabling
most or all data mining methods to be applied in situations where privacy concerns would appear to restrict such
mining.
REFERENCES.
1. R. Agrawal and R. Srikant. Fast algorithms for mining association rules in large databases.In VLDB, pages 487–499, 1994.
2. R. Agrawal and R. Srikant. Privacy-preserving data mining. In SIGMOD Conference, pages 439–450, 2000.
3. D. Beaver, S. Micali, and P. Rogaway. The round complexity of secure protocols. In STOC, pages 503–513, 1990.
4. M. Bellare, R. Canetti, and H. Krawczyk. Keying hash functions for message authentication. In Crypto, pages 1–15, 1996.
5. A. Ben-David, N. Nisan, and B. Pinkas. FairplayMP - A system for secure multi-party computation. In CCS, pages 257–266,
2008.
6. J.C. Benaloh. Secret sharing homomorphisms: Keeping shares of a secret secret. In Crypto, pages 251–260, 1986.
7. J. Brickell and V. Shmatikov. Privacy-preserving graph algorithms in the semi-honest model. In ASIACRYPT, pages 236–
252, 2005.
8. D.W.L. Cheung, J. Han, V.T.Y. Ng, A.W.C. Fu, and Y. Fu. A fast distributed algorithm f or mining association rules. In PDIS,
pages 31– 42, 1996.
9. D.W.L Cheung, V.T.Y. Ng, A.W.C. Fu, and Y. Fu. Efficient mining of association rules in distributed databases. IEEE
Trans. Knowl. Data Eng., 8(6):911–922, 1996.
10. T. ElGamal. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on
Information Theory, 31:469–472, 1985.
11. A.V. Evfimievski, R. Srikant, R. Agrawal, and J. Gehrke. Privacy preserving mining of association rules. In KDD, pages 217–
228, 2002.
12. M. Freedman, Y. Ishai, B. Pinkas, and O. Reingold. Keyword search and obliviou pseudorandom functions. In TCC,
pages 303–324, 2005.
13. M.J. Freedman, K. Nissim, and B. Pinkas. Efficient private matching and set intersection . In EUROCRYPT, pages
1–19, 2004.
14. O. Goldreich, S. Micali, and A. Wigderson. How to play any mental game or A completeness theorem for protocols
with honest majority. In STOC, pages 218–1987.

Contenu connexe

Tendances

A Crypto-System with Embedded Error Control for Secure and Reliable Communica...
A Crypto-System with Embedded Error Control for Secure and Reliable Communica...A Crypto-System with Embedded Error Control for Secure and Reliable Communica...
A Crypto-System with Embedded Error Control for Secure and Reliable Communica...CSCJournals
 
Searchable Encryption Systems
Searchable Encryption SystemsSearchable Encryption Systems
Searchable Encryption SystemsChristopher Frenz
 
The effect of Encryption algorithms Delay on TCP Traffic over data networks
The effect of Encryption algorithms Delay on TCP Traffic over data networksThe effect of Encryption algorithms Delay on TCP Traffic over data networks
The effect of Encryption algorithms Delay on TCP Traffic over data networksIOSR Journals
 
Research trends review on RSA scheme of asymmetric cryptography techniques
Research trends review on RSA scheme of asymmetric cryptography techniquesResearch trends review on RSA scheme of asymmetric cryptography techniques
Research trends review on RSA scheme of asymmetric cryptography techniquesjournalBEEI
 
COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...
COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...
COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...AM Publications
 
survey paper on object oriented cryptographic security for runtime entities
survey paper on object oriented cryptographic security for runtime entitiessurvey paper on object oriented cryptographic security for runtime entities
survey paper on object oriented cryptographic security for runtime entitiesINFOGAIN PUBLICATION
 
An efficient distributed group key management using hierarchical approach wit...
An efficient distributed group key management using hierarchical approach wit...An efficient distributed group key management using hierarchical approach wit...
An efficient distributed group key management using hierarchical approach wit...Alexander Decker
 
File transfer with multiple security mechanism
File transfer with multiple security mechanismFile transfer with multiple security mechanism
File transfer with multiple security mechanismShubham Patil
 
Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..Jayanth Dwijesh H P
 
User Selective Encryption Method for Securing MANETs
User Selective Encryption Method for Securing MANETs User Selective Encryption Method for Securing MANETs
User Selective Encryption Method for Securing MANETs IJECEIAES
 
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud StorageIRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud StorageIRJET Journal
 
Implementation of De-Duplication Algorithm
Implementation of De-Duplication AlgorithmImplementation of De-Duplication Algorithm
Implementation of De-Duplication AlgorithmIRJET Journal
 
Paper id 28201425
Paper id 28201425Paper id 28201425
Paper id 28201425IJRAT
 
Securing Personal Information in Data Mining
Securing Personal Information in Data MiningSecuring Personal Information in Data Mining
Securing Personal Information in Data MiningIJMER
 
Block-Level Message-Locked Encryption for Secure Large File De-duplication
Block-Level Message-Locked Encryption for Secure Large File De-duplicationBlock-Level Message-Locked Encryption for Secure Large File De-duplication
Block-Level Message-Locked Encryption for Secure Large File De-duplicationIRJET Journal
 
Ieeepro techno solutions 2014 ieee java project - query services in cost ef...
Ieeepro techno solutions   2014 ieee java project - query services in cost ef...Ieeepro techno solutions   2014 ieee java project - query services in cost ef...
Ieeepro techno solutions 2014 ieee java project - query services in cost ef...hemanthbbc
 
SPACE-EFFICIENT VERIFIABLE SECRET SHARING USING POLYNOMIAL INTERPOLATION
 SPACE-EFFICIENT VERIFIABLE SECRET SHARING USING POLYNOMIAL INTERPOLATION SPACE-EFFICIENT VERIFIABLE SECRET SHARING USING POLYNOMIAL INTERPOLATION
SPACE-EFFICIENT VERIFIABLE SECRET SHARING USING POLYNOMIAL INTERPOLATIONNexgen Technology
 

Tendances (17)

A Crypto-System with Embedded Error Control for Secure and Reliable Communica...
A Crypto-System with Embedded Error Control for Secure and Reliable Communica...A Crypto-System with Embedded Error Control for Secure and Reliable Communica...
A Crypto-System with Embedded Error Control for Secure and Reliable Communica...
 
Searchable Encryption Systems
Searchable Encryption SystemsSearchable Encryption Systems
Searchable Encryption Systems
 
The effect of Encryption algorithms Delay on TCP Traffic over data networks
The effect of Encryption algorithms Delay on TCP Traffic over data networksThe effect of Encryption algorithms Delay on TCP Traffic over data networks
The effect of Encryption algorithms Delay on TCP Traffic over data networks
 
Research trends review on RSA scheme of asymmetric cryptography techniques
Research trends review on RSA scheme of asymmetric cryptography techniquesResearch trends review on RSA scheme of asymmetric cryptography techniques
Research trends review on RSA scheme of asymmetric cryptography techniques
 
COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...
COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...
COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...
 
survey paper on object oriented cryptographic security for runtime entities
survey paper on object oriented cryptographic security for runtime entitiessurvey paper on object oriented cryptographic security for runtime entities
survey paper on object oriented cryptographic security for runtime entities
 
An efficient distributed group key management using hierarchical approach wit...
An efficient distributed group key management using hierarchical approach wit...An efficient distributed group key management using hierarchical approach wit...
An efficient distributed group key management using hierarchical approach wit...
 
File transfer with multiple security mechanism
File transfer with multiple security mechanismFile transfer with multiple security mechanism
File transfer with multiple security mechanism
 
Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..
 
User Selective Encryption Method for Securing MANETs
User Selective Encryption Method for Securing MANETs User Selective Encryption Method for Securing MANETs
User Selective Encryption Method for Securing MANETs
 
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud StorageIRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
 
Implementation of De-Duplication Algorithm
Implementation of De-Duplication AlgorithmImplementation of De-Duplication Algorithm
Implementation of De-Duplication Algorithm
 
Paper id 28201425
Paper id 28201425Paper id 28201425
Paper id 28201425
 
Securing Personal Information in Data Mining
Securing Personal Information in Data MiningSecuring Personal Information in Data Mining
Securing Personal Information in Data Mining
 
Block-Level Message-Locked Encryption for Secure Large File De-duplication
Block-Level Message-Locked Encryption for Secure Large File De-duplicationBlock-Level Message-Locked Encryption for Secure Large File De-duplication
Block-Level Message-Locked Encryption for Secure Large File De-duplication
 
Ieeepro techno solutions 2014 ieee java project - query services in cost ef...
Ieeepro techno solutions   2014 ieee java project - query services in cost ef...Ieeepro techno solutions   2014 ieee java project - query services in cost ef...
Ieeepro techno solutions 2014 ieee java project - query services in cost ef...
 
SPACE-EFFICIENT VERIFIABLE SECRET SHARING USING POLYNOMIAL INTERPOLATION
 SPACE-EFFICIENT VERIFIABLE SECRET SHARING USING POLYNOMIAL INTERPOLATION SPACE-EFFICIENT VERIFIABLE SECRET SHARING USING POLYNOMIAL INTERPOLATION
SPACE-EFFICIENT VERIFIABLE SECRET SHARING USING POLYNOMIAL INTERPOLATION
 

En vedette

Secure mining of association rules in horizontally distributed databases
Secure mining of association rules in horizontally distributed databasesSecure mining of association rules in horizontally distributed databases
Secure mining of association rules in horizontally distributed databasesPapitha Velumani
 
Secure mining of association rules in horizontally distributed databases
Secure mining of association rules in horizontally distributed databasesSecure mining of association rules in horizontally distributed databases
Secure mining of association rules in horizontally distributed databasesPapitha Velumani
 
secure mining of association rules in horizontally distributed databases
secure mining of association rules in horizontally distributed databasessecure mining of association rules in horizontally distributed databases
secure mining of association rules in horizontally distributed databasesswathi78
 
Secure Mining of Association Rules in Horizontally Distributed Databases
Secure Mining of Association Rules in Horizontally Distributed DatabasesSecure Mining of Association Rules in Horizontally Distributed Databases
Secure Mining of Association Rules in Horizontally Distributed DatabasesIJSRD
 
IEEE 2014 JAVA DATA MINING PROJECTS Secure mining of association rules in hor...
IEEE 2014 JAVA DATA MINING PROJECTS Secure mining of association rules in hor...IEEE 2014 JAVA DATA MINING PROJECTS Secure mining of association rules in hor...
IEEE 2014 JAVA DATA MINING PROJECTS Secure mining of association rules in hor...IEEEFINALYEARSTUDENTPROJECTS
 
JAVA 2013 IEEE DATAMINING PROJECT Secure mining of association rules in horiz...
JAVA 2013 IEEE DATAMINING PROJECT Secure mining of association rules in horiz...JAVA 2013 IEEE DATAMINING PROJECT Secure mining of association rules in horiz...
JAVA 2013 IEEE DATAMINING PROJECT Secure mining of association rules in horiz...IEEEGLOBALSOFTTECHNOLOGIES
 
Secure mining of association rules in horizontally distributed databases
Secure mining of association rules in horizontally distributed databasesSecure mining of association rules in horizontally distributed databases
Secure mining of association rules in horizontally distributed databasesIEEEFINALYEARPROJECTS
 

En vedette (7)

Secure mining of association rules in horizontally distributed databases
Secure mining of association rules in horizontally distributed databasesSecure mining of association rules in horizontally distributed databases
Secure mining of association rules in horizontally distributed databases
 
Secure mining of association rules in horizontally distributed databases
Secure mining of association rules in horizontally distributed databasesSecure mining of association rules in horizontally distributed databases
Secure mining of association rules in horizontally distributed databases
 
secure mining of association rules in horizontally distributed databases
secure mining of association rules in horizontally distributed databasessecure mining of association rules in horizontally distributed databases
secure mining of association rules in horizontally distributed databases
 
Secure Mining of Association Rules in Horizontally Distributed Databases
Secure Mining of Association Rules in Horizontally Distributed DatabasesSecure Mining of Association Rules in Horizontally Distributed Databases
Secure Mining of Association Rules in Horizontally Distributed Databases
 
IEEE 2014 JAVA DATA MINING PROJECTS Secure mining of association rules in hor...
IEEE 2014 JAVA DATA MINING PROJECTS Secure mining of association rules in hor...IEEE 2014 JAVA DATA MINING PROJECTS Secure mining of association rules in hor...
IEEE 2014 JAVA DATA MINING PROJECTS Secure mining of association rules in hor...
 
JAVA 2013 IEEE DATAMINING PROJECT Secure mining of association rules in horiz...
JAVA 2013 IEEE DATAMINING PROJECT Secure mining of association rules in horiz...JAVA 2013 IEEE DATAMINING PROJECT Secure mining of association rules in horiz...
JAVA 2013 IEEE DATAMINING PROJECT Secure mining of association rules in horiz...
 
Secure mining of association rules in horizontally distributed databases
Secure mining of association rules in horizontally distributed databasesSecure mining of association rules in horizontally distributed databases
Secure mining of association rules in horizontally distributed databases
 

Similaire à Efficient Data Mining Of Association Rules in Horizontally Distributed Databases

JPD1416 Secure Mining Of Association Rules In Horizantally Distributed Data...
JPD1416   Secure Mining Of Association Rules In Horizantally Distributed Data...JPD1416   Secure Mining Of Association Rules In Horizantally Distributed Data...
JPD1416 Secure Mining Of Association Rules In Horizantally Distributed Data...chennaijp
 
Secure mining of association rules in horizontally distributed databases
Secure mining of association rules in horizontally distributed databasesSecure mining of association rules in horizontally distributed databases
Secure mining of association rules in horizontally distributed databasesJPINFOTECH JAYAPRAKASH
 
Secure mining-of-association-rules-in-horizontally-distributed-databases-docx
Secure mining-of-association-rules-in-horizontally-distributed-databases-docxSecure mining-of-association-rules-in-horizontally-distributed-databases-docx
Secure mining-of-association-rules-in-horizontally-distributed-databases-docxShakas Technologies
 
secure mining of association rules in horizontally distributed databases
secure mining of association rules in horizontally distributed databasessecure mining of association rules in horizontally distributed databases
secure mining of association rules in horizontally distributed databasesswathi78
 
Multi-Server Authentication Key Exchange Approach in BIGDATA Environment
Multi-Server Authentication Key Exchange Approach in BIGDATA EnvironmentMulti-Server Authentication Key Exchange Approach in BIGDATA Environment
Multi-Server Authentication Key Exchange Approach in BIGDATA EnvironmentIRJET Journal
 
Secure mining of association rules in horizontally distributed databases
Secure mining of association rules in horizontally distributed databasesSecure mining of association rules in horizontally distributed databases
Secure mining of association rules in horizontally distributed databasesShakas Technologies
 
Data Sharing: Ensure Accountability Distribution in the Cloud
Data Sharing: Ensure Accountability Distribution in the CloudData Sharing: Ensure Accountability Distribution in the Cloud
Data Sharing: Ensure Accountability Distribution in the CloudSuraj Mehta
 
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...IRJET Journal
 
Exchange Protocols on Network File Systems Using Parallel Sessions Authentica...
Exchange Protocols on Network File Systems Using Parallel Sessions Authentica...Exchange Protocols on Network File Systems Using Parallel Sessions Authentica...
Exchange Protocols on Network File Systems Using Parallel Sessions Authentica...IJMTST Journal
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperShakas Technologies
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperShakas Technologies
 
Providing user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure cloudsProviding user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure cloudsKamal Spring
 
An Auditing Protocol for Protected Data Storage in Cloud Computing
An Auditing Protocol for Protected Data Storage in Cloud ComputingAn Auditing Protocol for Protected Data Storage in Cloud Computing
An Auditing Protocol for Protected Data Storage in Cloud Computingijceronline
 
Secured Authorized Deduplication Based Hybrid Cloud
Secured Authorized Deduplication Based Hybrid CloudSecured Authorized Deduplication Based Hybrid Cloud
Secured Authorized Deduplication Based Hybrid Cloudtheijes
 
E031102034039
E031102034039E031102034039
E031102034039theijes
 
Paper id 27201448
Paper id 27201448Paper id 27201448
Paper id 27201448IJRAT
 
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTINGSECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTINGIJNSA Journal
 
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTINGSECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTINGIJNSA Journal
 
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET Journal
 

Similaire à Efficient Data Mining Of Association Rules in Horizontally Distributed Databases (20)

JPD1416 Secure Mining Of Association Rules In Horizantally Distributed Data...
JPD1416   Secure Mining Of Association Rules In Horizantally Distributed Data...JPD1416   Secure Mining Of Association Rules In Horizantally Distributed Data...
JPD1416 Secure Mining Of Association Rules In Horizantally Distributed Data...
 
Secure mining of association rules in horizontally distributed databases
Secure mining of association rules in horizontally distributed databasesSecure mining of association rules in horizontally distributed databases
Secure mining of association rules in horizontally distributed databases
 
Secure mining-of-association-rules-in-horizontally-distributed-databases-docx
Secure mining-of-association-rules-in-horizontally-distributed-databases-docxSecure mining-of-association-rules-in-horizontally-distributed-databases-docx
Secure mining-of-association-rules-in-horizontally-distributed-databases-docx
 
secure mining of association rules in horizontally distributed databases
secure mining of association rules in horizontally distributed databasessecure mining of association rules in horizontally distributed databases
secure mining of association rules in horizontally distributed databases
 
Multi-Server Authentication Key Exchange Approach in BIGDATA Environment
Multi-Server Authentication Key Exchange Approach in BIGDATA EnvironmentMulti-Server Authentication Key Exchange Approach in BIGDATA Environment
Multi-Server Authentication Key Exchange Approach in BIGDATA Environment
 
Secure mining of association rules in horizontally distributed databases
Secure mining of association rules in horizontally distributed databasesSecure mining of association rules in horizontally distributed databases
Secure mining of association rules in horizontally distributed databases
 
Data Sharing: Ensure Accountability Distribution in the Cloud
Data Sharing: Ensure Accountability Distribution in the CloudData Sharing: Ensure Accountability Distribution in the Cloud
Data Sharing: Ensure Accountability Distribution in the Cloud
 
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
 
Exchange Protocols on Network File Systems Using Parallel Sessions Authentica...
Exchange Protocols on Network File Systems Using Parallel Sessions Authentica...Exchange Protocols on Network File Systems Using Parallel Sessions Authentica...
Exchange Protocols on Network File Systems Using Parallel Sessions Authentica...
 
1670 1673
1670 16731670 1673
1670 1673
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
 
Providing user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure cloudsProviding user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure clouds
 
An Auditing Protocol for Protected Data Storage in Cloud Computing
An Auditing Protocol for Protected Data Storage in Cloud ComputingAn Auditing Protocol for Protected Data Storage in Cloud Computing
An Auditing Protocol for Protected Data Storage in Cloud Computing
 
Secured Authorized Deduplication Based Hybrid Cloud
Secured Authorized Deduplication Based Hybrid CloudSecured Authorized Deduplication Based Hybrid Cloud
Secured Authorized Deduplication Based Hybrid Cloud
 
E031102034039
E031102034039E031102034039
E031102034039
 
Paper id 27201448
Paper id 27201448Paper id 27201448
Paper id 27201448
 
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTINGSECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
 
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTINGSECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
 
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
 

Plus de ijircee

Cyclic Sleep Wake Up Scenario for Wireless Body Area Sensor Networks
Cyclic Sleep Wake Up Scenario for Wireless Body Area Sensor NetworksCyclic Sleep Wake Up Scenario for Wireless Body Area Sensor Networks
Cyclic Sleep Wake Up Scenario for Wireless Body Area Sensor Networksijircee
 
Efficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETS
Efficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETSEfficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETS
Efficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETSijircee
 
Mobile Relay in Data-Intensive using Routing Tree WSN
Mobile Relay in Data-Intensive using Routing Tree WSNMobile Relay in Data-Intensive using Routing Tree WSN
Mobile Relay in Data-Intensive using Routing Tree WSNijircee
 
A Nobel Approach On Educational Data Mining
A Nobel Approach On Educational Data MiningA Nobel Approach On Educational Data Mining
A Nobel Approach On Educational Data Miningijircee
 
Finding Critical Link and Critical Node Vulnerability for Network
Finding Critical Link and Critical Node Vulnerability for NetworkFinding Critical Link and Critical Node Vulnerability for Network
Finding Critical Link and Critical Node Vulnerability for Networkijircee
 
Big Data with Rough Set Using Map- Reduce
Big Data with Rough Set Using Map- ReduceBig Data with Rough Set Using Map- Reduce
Big Data with Rough Set Using Map- Reduceijircee
 
Ijircee paper-template
Ijircee paper-templateIjircee paper-template
Ijircee paper-templateijircee
 
ijircee_Template
ijircee_Templateijircee_Template
ijircee_Templateijircee
 

Plus de ijircee (8)

Cyclic Sleep Wake Up Scenario for Wireless Body Area Sensor Networks
Cyclic Sleep Wake Up Scenario for Wireless Body Area Sensor NetworksCyclic Sleep Wake Up Scenario for Wireless Body Area Sensor Networks
Cyclic Sleep Wake Up Scenario for Wireless Body Area Sensor Networks
 
Efficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETS
Efficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETSEfficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETS
Efficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETS
 
Mobile Relay in Data-Intensive using Routing Tree WSN
Mobile Relay in Data-Intensive using Routing Tree WSNMobile Relay in Data-Intensive using Routing Tree WSN
Mobile Relay in Data-Intensive using Routing Tree WSN
 
A Nobel Approach On Educational Data Mining
A Nobel Approach On Educational Data MiningA Nobel Approach On Educational Data Mining
A Nobel Approach On Educational Data Mining
 
Finding Critical Link and Critical Node Vulnerability for Network
Finding Critical Link and Critical Node Vulnerability for NetworkFinding Critical Link and Critical Node Vulnerability for Network
Finding Critical Link and Critical Node Vulnerability for Network
 
Big Data with Rough Set Using Map- Reduce
Big Data with Rough Set Using Map- ReduceBig Data with Rough Set Using Map- Reduce
Big Data with Rough Set Using Map- Reduce
 
Ijircee paper-template
Ijircee paper-templateIjircee paper-template
Ijircee paper-template
 
ijircee_Template
ijircee_Templateijircee_Template
ijircee_Template
 

Dernier

Energy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxEnergy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxsiddharthjain2303
 
Transport layer issues and challenges - Guide
Transport layer issues and challenges - GuideTransport layer issues and challenges - Guide
Transport layer issues and challenges - GuideGOPINATHS437943
 
Input Output Management in Operating System
Input Output Management in Operating SystemInput Output Management in Operating System
Input Output Management in Operating SystemRashmi Bhat
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleAlluxio, Inc.
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
home automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasadhome automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasadaditya806802
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Katarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School CourseKatarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School Coursebim.edu.pl
 
welding defects observed during the welding
welding defects observed during the weldingwelding defects observed during the welding
welding defects observed during the weldingMuhammadUzairLiaqat
 
National Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdfNational Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdfRajuKanojiya4
 
Indian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptIndian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptMadan Karki
 
Autonomous emergency braking system (aeb) ppt.ppt
Autonomous emergency braking system (aeb) ppt.pptAutonomous emergency braking system (aeb) ppt.ppt
Autonomous emergency braking system (aeb) ppt.pptbibisarnayak0
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxRomil Mishra
 
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgUnit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgsaravananr517913
 
Ch10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdfCh10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdfChristianCDAM
 
Internet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptxInternet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptxVelmuruganTECE
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substationstephanwindworld
 

Dernier (20)

Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
Energy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxEnergy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptx
 
Transport layer issues and challenges - Guide
Transport layer issues and challenges - GuideTransport layer issues and challenges - Guide
Transport layer issues and challenges - Guide
 
Input Output Management in Operating System
Input Output Management in Operating SystemInput Output Management in Operating System
Input Output Management in Operating System
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at Scale
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
home automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasadhome automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasad
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Katarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School CourseKatarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School Course
 
welding defects observed during the welding
welding defects observed during the weldingwelding defects observed during the welding
welding defects observed during the welding
 
National Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdfNational Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdf
 
Indian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptIndian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.ppt
 
Autonomous emergency braking system (aeb) ppt.ppt
Autonomous emergency braking system (aeb) ppt.pptAutonomous emergency braking system (aeb) ppt.ppt
Autonomous emergency braking system (aeb) ppt.ppt
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptx
 
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgUnit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
 
Ch10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdfCh10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdf
 
Internet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptxInternet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptx
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substation
 

Efficient Data Mining Of Association Rules in Horizontally Distributed Databases

  • 1. ISSN(Online): 2395-xxxx International Journal of Innovative Research in Computer and Electronics Engineering Vol. 1, Issue 5, May 2015 Copyright to IJIRCEE www.ijircee.com 11 Efficient Data Mining Of Association Rules in Horizontally Distributed Databases Vasanthakumar P1, Jayasudha R2, Prof Srinivasan R3 M.Tech (IT) Student, Department of IT, PSV College of Engg & Tech, Krishnagiri, TN.India1 Assistant Professor, Department of IT, PSV College of Engg & Tech, Krishnagiri, TN,India2 Head of Department , Department of IT, PSV College of Engg & Tech, Krishnagiri, TN, India3 ABSTRACT: This paper proposes a protocol to perform secure mining of association rules in horizontally distributed databases. The current leading protocol is that of Kantarcioglu and Clifton. This protocol, like theirs, is based on the Fast Distributed Mining (FDM) algorithm of Cheung et al. which is an unsecured distributed version of the Apriori algorithm. The main ingredients in this protocol are two novel secure multi-party algorithms one that computes the union of private subsets that each of the interacting players hold, and another that tests the inclusion of an element held by one player in a subset held by another. The secure multi-party computation definitions from the cryptography domain may be too restrictive for our purpose. A specific example of the need for more flexible definitions can be seen in Protocol it is possible to mine globally valid results from distributed data without revealing information that compromises the privacy of the individual sources. This protocol offers enhanced privacy with respect to the protocol. In addition, it is simpler and is significantly more efficient in terms of communication rounds, communication cost and computational cost. KEYWORDS: Privacy Preserving Data Mining; Distributed Computation; Frequent Item sets; Association Rules. I. INTRODUCTION We study here the problem of secure mining of association rules in horizontally partitioned databases. In that setting, There are several sites (or players) that hold homogeneous databases, i.e., databases that share the same schema but hold information on different entities. The goal is to find all association rules with support at least s and confidence at least c, for some given minimal support size s and confidence level c, that hold in the unified database, while minimizing the information disclosed about the private databases held by those players. The information that we would like to protect in this context is not only individual transactions in the different databases, but also more global information such as what association rules are supported locally in each of those databases. That goal defines a problem of secure multi-party computation. In such problems, there are M players that hold private inputs, x1, . . . , x M, and they wish to securely compute y = f(x1, . . . , xM) for some public function f. If there existed a trusted third party, the players could surrender to him their inputs and he would perform the function evaluation and send to them the resulting output. In the absence of such a trusted third party, it is needed to devise a protocol that the players can run on their own in order to arrive at the required output y. Such a protocol is considered perfectly secure if no player can learn from his view of the protocol more than what he would have learnt in the idealized setting where the computation is carried out by a trusted third party. Yao [2] was the first to propose a generic solution for this problem in the case of two players. The main part of the protocol is a sub-protocol for the secure computation of the union of private subsets that are held by the different players. The most costly part of the protocol and its implementation relies upon cryptographic primitives such as commutative encryption, oblivious transfer, and hash functions. In particular, our protocol does not depend on commutative encryption and oblivious transfer (what simplifies it significantly and contributes towards much reduced communication and computational costs). While our solution is still not perfectly secure, it leaks excess information only to a small number (three) of possible coalitions. Here in we propose an alternative protocol for the secure computation of the union of private subsets. The proposed protocol improves upon that in [1] in terms of simplicity and efficiency as well as privacy. In particular, our protocol does not depend on commutative encryption and oblivious transfer (what simplifies it significantly and contributes towards much reduced communication and computational costs). While our solution is still not perfectly secure, it leaks excess information only to a small number (three) of possible coalitions, unlike the protocol of [1] that discloses information also to some single players. In addition, we claim that the excess information that our protocol may leak is less sensitive than the excess information leaked by the protocol.
  • 2. ISSN(Online): 2395-xxxx International Journal of Innovative Research in Computer and Electronics Engineering Vol. 1, Issue 5, May 2015 Copyright to IJIRCEE www.ijircee.com 12 II. RELATED WORK In [1] the use of cryptographic hash functions like MD5 or SHA-1 for message authentication has become a standard approach in many applications, particularly Internet security protocols. Though very easy to implement, these mechanisms are usually based on ad hoc techniques that lack a sound security analysis. We present new, simple, and practical constructions of message authentication schemes based on a cryptographic hash function. Our schemes, NMAC and HMAC, are proven to be secure as long as the underlying hash function has some reasonable cryptographic strength. Moreover we show, in a quantitative way, that the schemes retain almost all the security of the underlying hash function. The performance of our schemes is essentially that of the underlying hash function. Moreover they use the hash function (or its compression function) as a black box, so that widely available library code or hardware can be used to implement them in a simple way, and replace ability of the underlying hash function is easily supported. In [2] system for secure multi-party computation. Secure computation is one of the great achievements of modern cryptography, enabling a set of untrusting parties to compute any function of their private inputs while revealing nothing but the result of the function. In a sense, FairplayMP lets the parties run a joint computation that emulates a trusted party which receives the inputs from the parties, computes the function, and privately informs the parties of their outputs. FairplayMP operates by receiving a high-level language description of a function and a configuration file describing the participating parties. The system compiles the function into a description as a Boolean circuit, and performs a distributed evaluation of the circuit while revealing nothing else. FairplayMP supplements the Fairplay system, which supported secure computation between two parties. The underlying protocol of FairplayMP is the Beaver-Micali-Rogaway (BMR) protocol which runs in a constant number of communication rounds (eight rounds in our implementation). We modified the BMR protocol in a novel way and considerably improved its performance by using the Ben-Or-Goldwasser-Wigderson (BGW) protocol for the purpose of constructing gate tables. We chose to use this protocol since we believe that the number of communication rounds is a major factor on the overall performance of the protocol. We conducted different experiments which measure the effect of different parameters on the performance of the system and demonstrate its scalability. In [3] this paper describes a homomorphism property attained by these and several other secret sharing schemes which allow multiple secrets to be combined by direct computation on shares. This property reduces the need for trust among agents and allows secret sharing to be applied to many new problems. One application described gives a method of verifiable secret sharing which is much simpler and more efficient than previous schemes. A second application is described which gives a fault-tolerant method of holding verifiable secret- ballot elections. In [4] file distribution and storage in a cloud storage environment is usually handled by storage device providers or physical storage devices rented from third parties.Files can be integrated into useful resources that users are then able to access via centralized management and virtualization. Nevertheless, when the number of files continues to increase, the condition of every storage node cannot be guaranteed by the manager. High volumes of files will result in wasted hardware resources, increased control complexity of the data centre, and a less efficient cloud storage system. III. PROBLEM DEFINITION Kantarcioglu and Clifton studied that problems and devised a protocol for its solution. The main part of the protocol is a sub-protocol for the secure computation of the union of private subsets that are held by the different players. (The private subset of a given player, as we explain below, includes the item sets that are s-frequent in his partial database. That is the most costly part of the protocol and its implementation relies upon cryptographic primitives such as commutative encryption, oblivious transfer, and hash functions. This is also the only part in the protocol in which the players may extract from their view of the protocol information on other databases, beyond what is implied by the final output and their own input. While such leakage of information renders the protocol not perfectly secure, the perimeter of the excess information is explicitly bounded and it is argued there that such information leakage is innocuous, whence acceptable from a practical point of view. The protocol that we propose here computes a parameterized family of functions, which we call threshold functions, in which the two extreme cases correspond to the problems of computing the union and intersection of private subsets. Those are in fact general-purpose protocols that can be used in other contexts as well. Another problem of secure multiparty computation that we solve here as part of our discussion is the set inclusion problem; namely, the problem where Alice holds a private subset of some ground set, and Bob holds an element in the ground set, and they wish to determine whether Bob’s element is within Alice’s subset, without revealing to either of them information about the other party’s input beyond the above described inclusion.
  • 3. ISSN(Online): 2395-xxxx International Journal of Innovative Research in Computer and Electronics Engineering Vol. 1, Issue 5, May 2015 Copyright to IJIRCEE www.ijircee.com 13 We proposed a protocol for secure mining of association rules in horizontally distributed databases that improves significantly upon the current leading protocol in terms of privacy and efficiency. The main ingredient in our proposed protocol is a novel secure multi-party protocol for computing the union (or intersection) of private subsets that each of the interacting players holds. IV.IMPLEMENTATION AND RESULT A: Privacy Preserving Data Mining One, in which the data owner and the data miner are two different entities, and another, in which the data is distributed among several parties who aim to jointly perform data mining on the unified corpus of data that they hold. In the first setting, the goal is to protect the data records from the data miner. Hence, the data owner aims at anonym zing the data prior to its release. The main approach in this context is to apply data perturbation. The idea is that. Computation and communication costs versus the number of transactions N the perturbed data can be used to infer general trends in the data, without revealing original record information. In the second setting, the goal is to perform data mining while protecting the data records of each of the data owners from the other data owners. This is a problem of secure multiparty computation. The usual approach here is cryptographic rather than probabilistic. B: Distributed Computation We compared the performance of two secure implementations of the FDM algorithm Section In the first implementation (denoted FDM-KC), we executed the unification step using Protocol UNIFI-KC, where the commutative cipher was 1024-bit RSA in the second implementation (denoted FDM) we used our Protocol UNIFI, where the keyed-hash function was HMAC. In both implementations, we implemented Step 5 of the FDM algorithm in the secure manner that was described in later. We tested the two implementations with respect to three measures: Total computation time of the complete protocols (FDMKC and FDM) over all players. That measure includes the Apriori computation time, and the time to identify the globally s-frequent item sets, as described in later.Total computation time of the unification protocols only (UNIFI-KC and UNIFI) over all players. Total message size. We ran three experiment sets, where each set tested the dependence of the above measures on a different parameter: N the number of transactions in the unified database. C: Frequent Itemsets We describe here the solution that was proposed by Kantarcioglu and Clifton. They considered two possible settings. If the required output includes all globally s-frequent item sets, as well as the sizes of their supports, then the values of Δ(x) can be revealed for all. In such a case, those values may be computed using a secure summation protocol, where the private addend of Pm is suppm(x), sNm. The more interesting setting, however, is the one where the support sizes are not part of the required output. We proceed to discuss it. D: Association Rules Once the set Fs of all s-frequent itemsets is found, we may proceed to look for all (s, c) association rules (rules with support at least sN and confidence at least c). In order to derive from Fs all (s, c)-association rules in an efficient manner we rely upon the straightforward lemma. Association Rules run on the server and find out the similarities of DNA data’s from the various trusted clients and it can collect the information from global data owners. V. CONCLUSION AND FUTURE WORK This paper proposed a protocol to perform secure mining of association rules in horizontally distributed databases that improves significantly upon the current leading protocol in terms of privacy and efficiency. One of the main ingredients in our proposed protocol is a novel secure multi-party protocol for computing the union (or intersection) of private subsets that each of the interacting players holds. Another ingredient is a protocol that tests the
  • 4. ISSN(Online): 2395-xxxx International Journal of Innovative Research in Computer and Electronics Engineering Vol. 1, Issue 5, May 2015 Copyright to IJIRCEE www.ijircee.com 14 inclusion of an element held by one player in a subset held by another. Those protocols exploit the fact that the underlying problem is of interest only when the number of players is greater than two. The secure multi-party computation definitions from the cryptography domain may be too restrictive for our purposes. A specific example of the need for more flexible definition scan be seen in Protocol it is possible to mine globally valid results from distributed data without revealing information that compromises the privacy of the individual sources. Such privacy preserving data mining can be done with a reasonable increase in cost over methods that do not maintain privacy. Continued research will expand the scope of privacy-preserving data mining, enabling most or all data mining methods to be applied in situations where privacy concerns would appear to restrict such mining. REFERENCES. 1. R. Agrawal and R. Srikant. Fast algorithms for mining association rules in large databases.In VLDB, pages 487–499, 1994. 2. R. Agrawal and R. Srikant. Privacy-preserving data mining. In SIGMOD Conference, pages 439–450, 2000. 3. D. Beaver, S. Micali, and P. Rogaway. The round complexity of secure protocols. In STOC, pages 503–513, 1990. 4. M. Bellare, R. Canetti, and H. Krawczyk. Keying hash functions for message authentication. In Crypto, pages 1–15, 1996. 5. A. Ben-David, N. Nisan, and B. Pinkas. FairplayMP - A system for secure multi-party computation. In CCS, pages 257–266, 2008. 6. J.C. Benaloh. Secret sharing homomorphisms: Keeping shares of a secret secret. In Crypto, pages 251–260, 1986. 7. J. Brickell and V. Shmatikov. Privacy-preserving graph algorithms in the semi-honest model. In ASIACRYPT, pages 236– 252, 2005. 8. D.W.L. Cheung, J. Han, V.T.Y. Ng, A.W.C. Fu, and Y. Fu. A fast distributed algorithm f or mining association rules. In PDIS, pages 31– 42, 1996. 9. D.W.L Cheung, V.T.Y. Ng, A.W.C. Fu, and Y. Fu. Efficient mining of association rules in distributed databases. IEEE Trans. Knowl. Data Eng., 8(6):911–922, 1996. 10. T. ElGamal. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, 31:469–472, 1985. 11. A.V. Evfimievski, R. Srikant, R. Agrawal, and J. Gehrke. Privacy preserving mining of association rules. In KDD, pages 217– 228, 2002. 12. M. Freedman, Y. Ishai, B. Pinkas, and O. Reingold. Keyword search and obliviou pseudorandom functions. In TCC, pages 303–324, 2005. 13. M.J. Freedman, K. Nissim, and B. Pinkas. Efficient private matching and set intersection . In EUROCRYPT, pages 1–19, 2004. 14. O. Goldreich, S. Micali, and A. Wigderson. How to play any mental game or A completeness theorem for protocols with honest majority. In STOC, pages 218–1987.