SlideShare une entreprise Scribd logo
1  sur  3
Integrated Intelligent Research (IIR) International Journal of Data Mining Techniques and Applications
Volume: 06 Issue: 01 June 2017, Page No.33-35
ISSN: 2278-2419
33
A Novel Cryptographic Approach for Privacy
Preserving in Big Data Analysis for Sensitive Data
Sujatha K1
, Rajesh.N2
, Udayarani V3
1
Research Scholar, School of computing& IT, REVA University, Bangalore, India.
2
Lecturer, Information Technology, Shinas college of Technology, Sultanate of Oman
3
Senior Associate Professor, School of computing& IT, REVA University, Bangalore, India
sujathak@reva.edu.in, rajesh.natarajan@shct.edu.om, udayaraniv@reva.edu.in
Abstract : Privacy preservation of data mining has developed
as a widespread study area in order to secure the private
information over the network. Privacy preserving methods like
L-diversity, Randomization, Data distribution, and
Kanonymity have been recommended in directive to perform
privacy preservation of data mining. The Privacy preservation
of data mining (PPDM) methods protects data by masking or
by erasing the original sensitive one to be masked. The private
data can be preserved efficiently using cryptographic
techniques .In our work we propose a modified two fish
algorithm with 256 keys as a cryptographic approach to
provide security for PPDM.
Keywords: Privacy Preserving Data Mining (PPDM), Big
data, cryptographic, Data privacy
I. INTRODUCION
Big data plays a crucial role in all the fields of engineering .In
the area of developing an internet based applications in which
big data faces information security risks and privacy protection
while accumulating, storing, analyzing and utilizing. Big data
applications are very crucial assets to organizations, business,
and companies. The accumulating of big data certainly
increases the risk of leakage of user privacy. Big data [1]
contains a huge amount of user’s information in which the
development and usages of big data is certainly crucial and
easy to break the privacy by technical loopholes. Generally,
when big data is transmitted over various areas and
department, it causes the leakage of sensitive data which is a
threat to privacy. In most of the organizations such as medical
databases it is very crucial to keep some of the confidential
data as private, and this type of data needs to be preserved. The
private data can be preserved efficiently using cryptographic
techniques [2]. In most of the organizations such as medical
databases it is very much crucial to keep some of the
confidential data as private, and this type of data needs to be
preserved. The private data can be preserved efficiently using
cryptographic techniques [2]. The Privacy preservation of data
mining (PPDM) methods[3] protects the data by masking or by
erasing the original sensitive one to be masked In our work we
propose a modified two fish algorithm with 256 keys as a
cryptographic approach to provide security for PPDM.
II. BACKGROUND OF RESEARCH
Privacy preservation of data mining has developed as a
widespread study area in directive to secure the sensitivity
information over the network. Data mining is a process of
mining useful patterns of data. Usually data mining is very
much essential because of pattern recognition on huge data
storage in either organizations or in the storage networks. The
data storage contains several terabytes of data or petabytes of
data especially in hospital databases or in social network
databases, sales data etc. It is very important to classify the
data based on some criteria i.e. pattern so that we can easily
arrange the data access and retrieval. Privacy-preservation is
considered as a problem of securing private data of data mining
systems. The core considerations of privacy preservation are
two ways: In the early stage [4] sensitive raw data like personal
information including name, address, age so on, should be
transformed or clipped out from the database, in order ,not to
compromise another entity’s privacy. Next, sensitive
information is not supposed to be mined using familiar data
mining techniques from a database, failing which leads to a
compromise in data privacy. At present, many privacy
preservation methods [5] for data mining are presented. These
include K-anonymity [6], classification, cluster analysis,
association rules, distributing privacy preservation, Ldiversity,
randomization, taxonomy tree, condensation techniques [4, 7].
The Privacy Preservation of Data Mining methods secures the
data by masking or erasing the sensitive data from the original.
Privacy preservation is based on the concepts of privacy
failure, the ability to determine the unique user data from the
changed one, data loss and estimate the data accuracy loss. The
primary purpose of these methods is to reduce a trade-off
among accuracy and privacy [8]. New approaches that employ
cryptographic techniques to avoid information leakage are
computationally very classy. Similarly, PPDMs use data
distribution methods and it also includes partitioned data in
longitude or in latitude fashion through multiple individuals.
Beside with these techniques Two fish Algorithm [9] is very
useful in securing private data .It consists of 128-bit block
cipher [4, 2] that accepts a variable length key up to 256 bits.
The cipher is a 16-round Feistel system through a bijective
function made up of four key-dependent 8-by-8-bit S-boxes,a
static 4-by-4 maximum distance distinguishable matrix over
GF(28), a pseudo-Hadamard transform, bitwise rotations, and a
reasonably designed key schedule. The strategy of both the
round function and the key schedule permits a wide variety of
balances among speed, [3] software size, key setup time, gate
count, and memory.
III. CRITICAL REVIEW OF LITERATURES AND
IDENTIFICATION OF RESEARCH GAPS
Various societies like banking, medical treatment
organizations, and search engines accumulate huge data. This
data can be shared for the purpose of analysis which in turn
helps the organization to gain valuable knowledge which might
contain sensitive information about any individual. For
Integrated Intelligent Research (IIR) International Journal of Data Mining Techniques and Applications
Volume: 06 Issue: 01 June 2017, Page No.33-35
ISSN: 2278-2419
34
example, organizations such as hospitals contains health
records of the recipients admitted as patients. They share these
health records with the scholars for purpose analysis [9]. There
is a chance that the person/scholar availing the data which may
be sensitive may obtain individuals information. When we
speak of sensitive data privacy is of a major concern. As a
result, a new path in the field of data mining is created
,known as privacy preservation in data mining (PPDM)
[5,9].
In the literature review and in the summary we have stated the
importance of privacy preservation. Privacy preservation of
data mining [10] has been developed as a wide spread research
study in order to secure sensitive information .Such as
anonymization should not only satisfy original privacy
requirements but also safeguard the utility of the data.
Certainly, K-anonymity is an efficient means of privacy
preservation in data mining. However, several demonstrated
that the data processed by this system often failed to overcome
some attacks and are susceptible to internet phishing. As a
result, further privacy preservation in data mining using K-
anonymity needs an advance data infrastructure to support the
combination of present data functionality. This would certainly
fulfill the requirements of different kinds of clients and
communities. Even though the present search algorithms are
capable to speed up the retrieval process, they do not scale up
to large volume of data since the linear increase in response
time with the amount of the searched datasets. The proposed
technique for the searching of distributed large data amongst
many cloud providers must possess the ability to preserve
privacy, and must be scalable, efficient, well-suited, and good
for utility as well as integrity.
The objective of this technique is to secure the sensitive
information while retrieving the data. Privacy preservation of
data mining methods are separated and split into widespread
zones, data securing and information securing. Data securing
is elimination or changing sensitive data from the database
before revealing it to an external entity. Knowledge security
focuses securing the important data which can be extracted
from the databank by several data mining systems [8]. Current
methods for preserving security in data mining [7] are
classified as follows: Data Discomposure, Cryptography
techniques and Query auditing [11]. The main constraint lies in
the altered data concentrating on the noise that is being added.
Usually in the data discomposure method, the transformation
of the sensitive data is carried out once the noise is added to
the original data. Encryption and decryption contains the use of
key for original data. In order to overcome the drawbacks of
the existing techniques we are introducing a modified Two fish
Algorithm.
Table-1: PPDM METHODS
PPDM: Methods Description
Data distribution:
This might include partitioned data
in longitude or in latitude fashion.
Data falsification:
Includes discomposure, delaying,
combining or gathering,
interchanging and selection.
Knowledge mining
algorithms
Includes classifying, Associating,
cluster analysis.
Data or rules hidden: Points to secure main data or rule
of creative or new facts.
Kanonymity: Obtain anonymization.
Ldiversity:
Preserve the diversity of the
private data.
Classification Tree: Attribute are generalized to bind
the info leak.
Randomization: An un-sophisticated and important
technique to hide the individual
data in PPDM.
Protecting Private
data:
Protects the confidentiality, it
should adjust data cautiously to
achieve ideal data utility.
IV. STATEMENT OF RESEARCH PROBLEM
Identify the data which needs to be preserved from Big Data
which is collected by data collector. We propose a modified
Two-Fish algorithm in order to preserve the privacy of
individual sensitive information.
V. METHODOLOGY OR APPROACH INTENDED TO
BE ADOPTED IN THE EXECUTION OF THE
RESEARCH
Privacy preservation of data mining [10] is a wide spread
research study in order to secure the sensitive information .The
Methodology is shown in figure 1.
Figure 1. Methodology
VI. OBJECTIVES OF RESEARCH
The main considerations of privacy preservation are in two
fields. In the early stage [4] sensitive raw data like personal
information including name, address, age so on, should be
transformed or clipped out from the original database, in order
for the beneficiary of the data to not compromise another
entity’s privacy.
 Next, sensitive knowledge is not supposed to be
mined using familiar data mining techniques from a
database, failing which leads to a compromise in data
privacy.
 Identify the data which needs to be preserved from
big data which is collected by data collector.
Integrated Intelligent Research (IIR) International Journal of Data Mining Techniques and Applications
Volume: 06 Issue: 01 June 2017, Page No.33-35
ISSN: 2278-2419
35
 We propose a modified Two-Fish algorithm in order
to preserve the sensitive information.
 We try to increase the key length from 256 to 512.
 Verify the results.
VII. EXPECTED OUTCOMES
The main goal is to protect data privacy and confidentiality.
Develop a modified two fish algorithm to secure the sensitive
data.
Big data analysis for privacy preservation of sensitive
information.
References
[1] Big Data Privacy Preservation, Ericsson
Labs,http://labs.ericsson.com/blog/privacy-preservation-
in-big-data-analytics.
[2] Benny Pinkas HP Labs benny.pinkas@hp.com ,
“Cryptographic techniques for privacy-preserving data
mining”, SIGKDD Explorations, Volume 4, Issue 2 - page
12
[3] Sharma, Manish, Atul Chaudhary, Manish Mathuria,
Shalini Chaudhary, and Santosh Kumar. "An efficient
approach for privacy preserving in data mining", 2014
International Conference on Signal Propagation and
Computer Technology (ICSPCT 2014), 2014.
[4] S.Bhanumathi and Sakthivel “A New Model for Privacy
Preserving Multiparty Collaborative Data Mining”
ICCPCT-2013, (845).
[5] Agarwal, R. and Shrikant, R. "Privacy Preserving Data
Mining", Proceeding of special interest group on
management of data pp.439-450, 2000.
[6] L. Sweeney, "k-anonymity: A model for protecting
privacy," International Journal on Uncertainty, Fuzziness
and Knowledge-Based Systems, pp. 557–570, 2002.
[7] Elisa Bertino, Dan Lin, and Wei Jiang, A Survey of
Quantification of Privacy Preserving Data Mining
Algorithms, Springer ,volume 34 pp183-205
[8] V.S Verykios, A.K Elmagarmid, E. Bertino, Y. Saygin and
E. Dasseni, "Association Rule Hiding", IEEE Transaction
Knowledge and Data Engineering, 16(4): 434 - 447, 2004.
[9] Jian Wang, Yong Cheng Lou, Yen Zh Jiajin Le, "A
Survey on Privacy Preserving Data Mining",International
Workshop on Database Technology and Application pp.
III - 114, 2009.
[10]Anjana Go Sain, Nikita chugh ,”Privacy Preservation in
Big Data”,IJCA,Volume 100-No 17,August 2014.
[11]R.L. Rivest, A. Shamir, and L. Adleman , A Method for
Obtaining Digital Signatures and Public-Key
Cryptosystems

Contenu connexe

Similaire à A Novel Cryptographic Approach for Privacy Preserving in Big Data Analysis for Sensitive Data

A Review on Privacy Preservation in Data Mining
A Review on Privacy Preservation in Data MiningA Review on Privacy Preservation in Data Mining
A Review on Privacy Preservation in Data Miningijujournal
 
A Review on Privacy Preservation in Data Mining
A Review on Privacy Preservation in Data MiningA Review on Privacy Preservation in Data Mining
A Review on Privacy Preservation in Data Miningijujournal
 
A Review on Privacy Preservation in Data Mining
A Review on Privacy Preservation in Data MiningA Review on Privacy Preservation in Data Mining
A Review on Privacy Preservation in Data Miningijujournal
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Multilevel Privacy Preserving by Linear and Non Linear Data Distortion
Multilevel Privacy Preserving by Linear and Non Linear Data DistortionMultilevel Privacy Preserving by Linear and Non Linear Data Distortion
Multilevel Privacy Preserving by Linear and Non Linear Data DistortionIOSR Journals
 
AN EFFICIENT SOLUTION FOR PRIVACYPRESERVING, SECURE REMOTE ACCESS TO SENSITIV...
AN EFFICIENT SOLUTION FOR PRIVACYPRESERVING, SECURE REMOTE ACCESS TO SENSITIV...AN EFFICIENT SOLUTION FOR PRIVACYPRESERVING, SECURE REMOTE ACCESS TO SENSITIV...
AN EFFICIENT SOLUTION FOR PRIVACYPRESERVING, SECURE REMOTE ACCESS TO SENSITIV...cscpconf
 
Cluster Based Access Privilege Management Scheme for Databases
Cluster Based Access Privilege Management Scheme for DatabasesCluster Based Access Privilege Management Scheme for Databases
Cluster Based Access Privilege Management Scheme for DatabasesEditor IJMTER
 
Performance Analysis of Hybrid Approach for Privacy Preserving in Data Mining
Performance Analysis of Hybrid Approach for Privacy Preserving in Data MiningPerformance Analysis of Hybrid Approach for Privacy Preserving in Data Mining
Performance Analysis of Hybrid Approach for Privacy Preserving in Data Miningidescitation
 
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT A privacy leakage upper bound con...
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT A privacy leakage upper bound con...JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT A privacy leakage upper bound con...
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT A privacy leakage upper bound con...IEEEGLOBALSOFTTECHNOLOGIES
 
Data Transformation Technique for Protecting Private Information in Privacy P...
Data Transformation Technique for Protecting Private Information in Privacy P...Data Transformation Technique for Protecting Private Information in Privacy P...
Data Transformation Technique for Protecting Private Information in Privacy P...acijjournal
 
IRJET- Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...
IRJET-  	  Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...IRJET-  	  Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...
IRJET- Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...IRJET Journal
 
Paper id 252014139
Paper id 252014139Paper id 252014139
Paper id 252014139IJRAT
 
Two-Phase TDS Approach for Data Anonymization To Preserving Bigdata Privacy
Two-Phase TDS Approach for Data Anonymization To Preserving Bigdata PrivacyTwo-Phase TDS Approach for Data Anonymization To Preserving Bigdata Privacy
Two-Phase TDS Approach for Data Anonymization To Preserving Bigdata Privacydbpublications
 
A privacy leakage upper bound constraint based approach for cost-effective pr...
A privacy leakage upper bound constraint based approach for cost-effective pr...A privacy leakage upper bound constraint based approach for cost-effective pr...
A privacy leakage upper bound constraint based approach for cost-effective pr...JPINFOTECH JAYAPRAKASH
 
A Survey on Features and Techniques Description for Privacy of Sensitive Info...
A Survey on Features and Techniques Description for Privacy of Sensitive Info...A Survey on Features and Techniques Description for Privacy of Sensitive Info...
A Survey on Features and Techniques Description for Privacy of Sensitive Info...IRJET Journal
 

Similaire à A Novel Cryptographic Approach for Privacy Preserving in Big Data Analysis for Sensitive Data (20)

A Review on Privacy Preservation in Data Mining
A Review on Privacy Preservation in Data MiningA Review on Privacy Preservation in Data Mining
A Review on Privacy Preservation in Data Mining
 
A Review on Privacy Preservation in Data Mining
A Review on Privacy Preservation in Data MiningA Review on Privacy Preservation in Data Mining
A Review on Privacy Preservation in Data Mining
 
A Review on Privacy Preservation in Data Mining
A Review on Privacy Preservation in Data MiningA Review on Privacy Preservation in Data Mining
A Review on Privacy Preservation in Data Mining
 
J017536064
J017536064J017536064
J017536064
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
1699 1704
1699 17041699 1704
1699 1704
 
1699 1704
1699 17041699 1704
1699 1704
 
Multilevel Privacy Preserving by Linear and Non Linear Data Distortion
Multilevel Privacy Preserving by Linear and Non Linear Data DistortionMultilevel Privacy Preserving by Linear and Non Linear Data Distortion
Multilevel Privacy Preserving by Linear and Non Linear Data Distortion
 
Ej24856861
Ej24856861Ej24856861
Ej24856861
 
AN EFFICIENT SOLUTION FOR PRIVACYPRESERVING, SECURE REMOTE ACCESS TO SENSITIV...
AN EFFICIENT SOLUTION FOR PRIVACYPRESERVING, SECURE REMOTE ACCESS TO SENSITIV...AN EFFICIENT SOLUTION FOR PRIVACYPRESERVING, SECURE REMOTE ACCESS TO SENSITIV...
AN EFFICIENT SOLUTION FOR PRIVACYPRESERVING, SECURE REMOTE ACCESS TO SENSITIV...
 
Cluster Based Access Privilege Management Scheme for Databases
Cluster Based Access Privilege Management Scheme for DatabasesCluster Based Access Privilege Management Scheme for Databases
Cluster Based Access Privilege Management Scheme for Databases
 
Performance Analysis of Hybrid Approach for Privacy Preserving in Data Mining
Performance Analysis of Hybrid Approach for Privacy Preserving in Data MiningPerformance Analysis of Hybrid Approach for Privacy Preserving in Data Mining
Performance Analysis of Hybrid Approach for Privacy Preserving in Data Mining
 
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT A privacy leakage upper bound con...
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT A privacy leakage upper bound con...JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT A privacy leakage upper bound con...
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT A privacy leakage upper bound con...
 
Data Transformation Technique for Protecting Private Information in Privacy P...
Data Transformation Technique for Protecting Private Information in Privacy P...Data Transformation Technique for Protecting Private Information in Privacy P...
Data Transformation Technique for Protecting Private Information in Privacy P...
 
IRJET- Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...
IRJET-  	  Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...IRJET-  	  Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...
IRJET- Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...
 
Data security and privacy
Data security and privacyData security and privacy
Data security and privacy
 
Paper id 252014139
Paper id 252014139Paper id 252014139
Paper id 252014139
 
Two-Phase TDS Approach for Data Anonymization To Preserving Bigdata Privacy
Two-Phase TDS Approach for Data Anonymization To Preserving Bigdata PrivacyTwo-Phase TDS Approach for Data Anonymization To Preserving Bigdata Privacy
Two-Phase TDS Approach for Data Anonymization To Preserving Bigdata Privacy
 
A privacy leakage upper bound constraint based approach for cost-effective pr...
A privacy leakage upper bound constraint based approach for cost-effective pr...A privacy leakage upper bound constraint based approach for cost-effective pr...
A privacy leakage upper bound constraint based approach for cost-effective pr...
 
A Survey on Features and Techniques Description for Privacy of Sensitive Info...
A Survey on Features and Techniques Description for Privacy of Sensitive Info...A Survey on Features and Techniques Description for Privacy of Sensitive Info...
A Survey on Features and Techniques Description for Privacy of Sensitive Info...
 

Plus de IIRindia

An Investigation into Brain Tumor Segmentation Techniques
An Investigation into Brain Tumor Segmentation Techniques An Investigation into Brain Tumor Segmentation Techniques
An Investigation into Brain Tumor Segmentation Techniques IIRindia
 
E-Agriculture - A Way to Digitalization
E-Agriculture - A Way to DigitalizationE-Agriculture - A Way to Digitalization
E-Agriculture - A Way to DigitalizationIIRindia
 
A Survey on the Analysis of Dissolved Oxygen Level in Water using Data Mining...
A Survey on the Analysis of Dissolved Oxygen Level in Water using Data Mining...A Survey on the Analysis of Dissolved Oxygen Level in Water using Data Mining...
A Survey on the Analysis of Dissolved Oxygen Level in Water using Data Mining...IIRindia
 
Kidney Failure Due to Diabetics – Detection using Classification Algorithm in...
Kidney Failure Due to Diabetics – Detection using Classification Algorithm in...Kidney Failure Due to Diabetics – Detection using Classification Algorithm in...
Kidney Failure Due to Diabetics – Detection using Classification Algorithm in...IIRindia
 
Silhouette Threshold Based Text Clustering for Log Analysis
Silhouette Threshold Based Text Clustering for Log AnalysisSilhouette Threshold Based Text Clustering for Log Analysis
Silhouette Threshold Based Text Clustering for Log AnalysisIIRindia
 
Analysis and Representation of Igbo Text Document for a Text-Based System
Analysis and Representation of Igbo Text Document for a Text-Based SystemAnalysis and Representation of Igbo Text Document for a Text-Based System
Analysis and Representation of Igbo Text Document for a Text-Based SystemIIRindia
 
A Survey on E-Learning System with Data Mining
A Survey on E-Learning System with Data MiningA Survey on E-Learning System with Data Mining
A Survey on E-Learning System with Data MiningIIRindia
 
Image Segmentation Based Survey on the Lung Cancer MRI Images
Image Segmentation Based Survey on the Lung Cancer MRI ImagesImage Segmentation Based Survey on the Lung Cancer MRI Images
Image Segmentation Based Survey on the Lung Cancer MRI ImagesIIRindia
 
The Preface Layer for Auditing Sensual Interacts of Primary Distress Conceali...
The Preface Layer for Auditing Sensual Interacts of Primary Distress Conceali...The Preface Layer for Auditing Sensual Interacts of Primary Distress Conceali...
The Preface Layer for Auditing Sensual Interacts of Primary Distress Conceali...IIRindia
 
Feature Based Underwater Fish Recognition Using SVM Classifier
Feature Based Underwater Fish Recognition Using SVM ClassifierFeature Based Underwater Fish Recognition Using SVM Classifier
Feature Based Underwater Fish Recognition Using SVM ClassifierIIRindia
 
A Survey on Educational Data Mining Techniques
A Survey on Educational Data Mining TechniquesA Survey on Educational Data Mining Techniques
A Survey on Educational Data Mining TechniquesIIRindia
 
V5_I2_2016_Paper11.docx
V5_I2_2016_Paper11.docxV5_I2_2016_Paper11.docx
V5_I2_2016_Paper11.docxIIRindia
 
A Study on MRI Liver Image Segmentation using Fuzzy Connected and Watershed T...
A Study on MRI Liver Image Segmentation using Fuzzy Connected and Watershed T...A Study on MRI Liver Image Segmentation using Fuzzy Connected and Watershed T...
A Study on MRI Liver Image Segmentation using Fuzzy Connected and Watershed T...IIRindia
 
A Clustering Based Collaborative and Pattern based Filtering approach for Big...
A Clustering Based Collaborative and Pattern based Filtering approach for Big...A Clustering Based Collaborative and Pattern based Filtering approach for Big...
A Clustering Based Collaborative and Pattern based Filtering approach for Big...IIRindia
 
Hadoop and Hive Inspecting Maintenance of Mobile Application for Groceries Ex...
Hadoop and Hive Inspecting Maintenance of Mobile Application for Groceries Ex...Hadoop and Hive Inspecting Maintenance of Mobile Application for Groceries Ex...
Hadoop and Hive Inspecting Maintenance of Mobile Application for Groceries Ex...IIRindia
 
Performance Evaluation of Feature Selection Algorithms in Educational Data Mi...
Performance Evaluation of Feature Selection Algorithms in Educational Data Mi...Performance Evaluation of Feature Selection Algorithms in Educational Data Mi...
Performance Evaluation of Feature Selection Algorithms in Educational Data Mi...IIRindia
 
A Review of Edge Detection Techniques for Image Segmentation
A Review of Edge Detection Techniques for Image SegmentationA Review of Edge Detection Techniques for Image Segmentation
A Review of Edge Detection Techniques for Image SegmentationIIRindia
 
Leanness Assessment using Fuzzy Logic Approach: A Case of Indian Horn Manufac...
Leanness Assessment using Fuzzy Logic Approach: A Case of Indian Horn Manufac...Leanness Assessment using Fuzzy Logic Approach: A Case of Indian Horn Manufac...
Leanness Assessment using Fuzzy Logic Approach: A Case of Indian Horn Manufac...IIRindia
 
Comparative Analysis of Weighted Emphirical Optimization Algorithm and Lazy C...
Comparative Analysis of Weighted Emphirical Optimization Algorithm and Lazy C...Comparative Analysis of Weighted Emphirical Optimization Algorithm and Lazy C...
Comparative Analysis of Weighted Emphirical Optimization Algorithm and Lazy C...IIRindia
 
Survey on Segmentation Techniques for Spinal Cord Images
Survey on Segmentation Techniques for Spinal Cord ImagesSurvey on Segmentation Techniques for Spinal Cord Images
Survey on Segmentation Techniques for Spinal Cord ImagesIIRindia
 

Plus de IIRindia (20)

An Investigation into Brain Tumor Segmentation Techniques
An Investigation into Brain Tumor Segmentation Techniques An Investigation into Brain Tumor Segmentation Techniques
An Investigation into Brain Tumor Segmentation Techniques
 
E-Agriculture - A Way to Digitalization
E-Agriculture - A Way to DigitalizationE-Agriculture - A Way to Digitalization
E-Agriculture - A Way to Digitalization
 
A Survey on the Analysis of Dissolved Oxygen Level in Water using Data Mining...
A Survey on the Analysis of Dissolved Oxygen Level in Water using Data Mining...A Survey on the Analysis of Dissolved Oxygen Level in Water using Data Mining...
A Survey on the Analysis of Dissolved Oxygen Level in Water using Data Mining...
 
Kidney Failure Due to Diabetics – Detection using Classification Algorithm in...
Kidney Failure Due to Diabetics – Detection using Classification Algorithm in...Kidney Failure Due to Diabetics – Detection using Classification Algorithm in...
Kidney Failure Due to Diabetics – Detection using Classification Algorithm in...
 
Silhouette Threshold Based Text Clustering for Log Analysis
Silhouette Threshold Based Text Clustering for Log AnalysisSilhouette Threshold Based Text Clustering for Log Analysis
Silhouette Threshold Based Text Clustering for Log Analysis
 
Analysis and Representation of Igbo Text Document for a Text-Based System
Analysis and Representation of Igbo Text Document for a Text-Based SystemAnalysis and Representation of Igbo Text Document for a Text-Based System
Analysis and Representation of Igbo Text Document for a Text-Based System
 
A Survey on E-Learning System with Data Mining
A Survey on E-Learning System with Data MiningA Survey on E-Learning System with Data Mining
A Survey on E-Learning System with Data Mining
 
Image Segmentation Based Survey on the Lung Cancer MRI Images
Image Segmentation Based Survey on the Lung Cancer MRI ImagesImage Segmentation Based Survey on the Lung Cancer MRI Images
Image Segmentation Based Survey on the Lung Cancer MRI Images
 
The Preface Layer for Auditing Sensual Interacts of Primary Distress Conceali...
The Preface Layer for Auditing Sensual Interacts of Primary Distress Conceali...The Preface Layer for Auditing Sensual Interacts of Primary Distress Conceali...
The Preface Layer for Auditing Sensual Interacts of Primary Distress Conceali...
 
Feature Based Underwater Fish Recognition Using SVM Classifier
Feature Based Underwater Fish Recognition Using SVM ClassifierFeature Based Underwater Fish Recognition Using SVM Classifier
Feature Based Underwater Fish Recognition Using SVM Classifier
 
A Survey on Educational Data Mining Techniques
A Survey on Educational Data Mining TechniquesA Survey on Educational Data Mining Techniques
A Survey on Educational Data Mining Techniques
 
V5_I2_2016_Paper11.docx
V5_I2_2016_Paper11.docxV5_I2_2016_Paper11.docx
V5_I2_2016_Paper11.docx
 
A Study on MRI Liver Image Segmentation using Fuzzy Connected and Watershed T...
A Study on MRI Liver Image Segmentation using Fuzzy Connected and Watershed T...A Study on MRI Liver Image Segmentation using Fuzzy Connected and Watershed T...
A Study on MRI Liver Image Segmentation using Fuzzy Connected and Watershed T...
 
A Clustering Based Collaborative and Pattern based Filtering approach for Big...
A Clustering Based Collaborative and Pattern based Filtering approach for Big...A Clustering Based Collaborative and Pattern based Filtering approach for Big...
A Clustering Based Collaborative and Pattern based Filtering approach for Big...
 
Hadoop and Hive Inspecting Maintenance of Mobile Application for Groceries Ex...
Hadoop and Hive Inspecting Maintenance of Mobile Application for Groceries Ex...Hadoop and Hive Inspecting Maintenance of Mobile Application for Groceries Ex...
Hadoop and Hive Inspecting Maintenance of Mobile Application for Groceries Ex...
 
Performance Evaluation of Feature Selection Algorithms in Educational Data Mi...
Performance Evaluation of Feature Selection Algorithms in Educational Data Mi...Performance Evaluation of Feature Selection Algorithms in Educational Data Mi...
Performance Evaluation of Feature Selection Algorithms in Educational Data Mi...
 
A Review of Edge Detection Techniques for Image Segmentation
A Review of Edge Detection Techniques for Image SegmentationA Review of Edge Detection Techniques for Image Segmentation
A Review of Edge Detection Techniques for Image Segmentation
 
Leanness Assessment using Fuzzy Logic Approach: A Case of Indian Horn Manufac...
Leanness Assessment using Fuzzy Logic Approach: A Case of Indian Horn Manufac...Leanness Assessment using Fuzzy Logic Approach: A Case of Indian Horn Manufac...
Leanness Assessment using Fuzzy Logic Approach: A Case of Indian Horn Manufac...
 
Comparative Analysis of Weighted Emphirical Optimization Algorithm and Lazy C...
Comparative Analysis of Weighted Emphirical Optimization Algorithm and Lazy C...Comparative Analysis of Weighted Emphirical Optimization Algorithm and Lazy C...
Comparative Analysis of Weighted Emphirical Optimization Algorithm and Lazy C...
 
Survey on Segmentation Techniques for Spinal Cord Images
Survey on Segmentation Techniques for Spinal Cord ImagesSurvey on Segmentation Techniques for Spinal Cord Images
Survey on Segmentation Techniques for Spinal Cord Images
 

Dernier

(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...ranjana rawat
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 

Dernier (20)

(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 

A Novel Cryptographic Approach for Privacy Preserving in Big Data Analysis for Sensitive Data

  • 1. Integrated Intelligent Research (IIR) International Journal of Data Mining Techniques and Applications Volume: 06 Issue: 01 June 2017, Page No.33-35 ISSN: 2278-2419 33 A Novel Cryptographic Approach for Privacy Preserving in Big Data Analysis for Sensitive Data Sujatha K1 , Rajesh.N2 , Udayarani V3 1 Research Scholar, School of computing& IT, REVA University, Bangalore, India. 2 Lecturer, Information Technology, Shinas college of Technology, Sultanate of Oman 3 Senior Associate Professor, School of computing& IT, REVA University, Bangalore, India sujathak@reva.edu.in, rajesh.natarajan@shct.edu.om, udayaraniv@reva.edu.in Abstract : Privacy preservation of data mining has developed as a widespread study area in order to secure the private information over the network. Privacy preserving methods like L-diversity, Randomization, Data distribution, and Kanonymity have been recommended in directive to perform privacy preservation of data mining. The Privacy preservation of data mining (PPDM) methods protects data by masking or by erasing the original sensitive one to be masked. The private data can be preserved efficiently using cryptographic techniques .In our work we propose a modified two fish algorithm with 256 keys as a cryptographic approach to provide security for PPDM. Keywords: Privacy Preserving Data Mining (PPDM), Big data, cryptographic, Data privacy I. INTRODUCION Big data plays a crucial role in all the fields of engineering .In the area of developing an internet based applications in which big data faces information security risks and privacy protection while accumulating, storing, analyzing and utilizing. Big data applications are very crucial assets to organizations, business, and companies. The accumulating of big data certainly increases the risk of leakage of user privacy. Big data [1] contains a huge amount of user’s information in which the development and usages of big data is certainly crucial and easy to break the privacy by technical loopholes. Generally, when big data is transmitted over various areas and department, it causes the leakage of sensitive data which is a threat to privacy. In most of the organizations such as medical databases it is very crucial to keep some of the confidential data as private, and this type of data needs to be preserved. The private data can be preserved efficiently using cryptographic techniques [2]. In most of the organizations such as medical databases it is very much crucial to keep some of the confidential data as private, and this type of data needs to be preserved. The private data can be preserved efficiently using cryptographic techniques [2]. The Privacy preservation of data mining (PPDM) methods[3] protects the data by masking or by erasing the original sensitive one to be masked In our work we propose a modified two fish algorithm with 256 keys as a cryptographic approach to provide security for PPDM. II. BACKGROUND OF RESEARCH Privacy preservation of data mining has developed as a widespread study area in directive to secure the sensitivity information over the network. Data mining is a process of mining useful patterns of data. Usually data mining is very much essential because of pattern recognition on huge data storage in either organizations or in the storage networks. The data storage contains several terabytes of data or petabytes of data especially in hospital databases or in social network databases, sales data etc. It is very important to classify the data based on some criteria i.e. pattern so that we can easily arrange the data access and retrieval. Privacy-preservation is considered as a problem of securing private data of data mining systems. The core considerations of privacy preservation are two ways: In the early stage [4] sensitive raw data like personal information including name, address, age so on, should be transformed or clipped out from the database, in order ,not to compromise another entity’s privacy. Next, sensitive information is not supposed to be mined using familiar data mining techniques from a database, failing which leads to a compromise in data privacy. At present, many privacy preservation methods [5] for data mining are presented. These include K-anonymity [6], classification, cluster analysis, association rules, distributing privacy preservation, Ldiversity, randomization, taxonomy tree, condensation techniques [4, 7]. The Privacy Preservation of Data Mining methods secures the data by masking or erasing the sensitive data from the original. Privacy preservation is based on the concepts of privacy failure, the ability to determine the unique user data from the changed one, data loss and estimate the data accuracy loss. The primary purpose of these methods is to reduce a trade-off among accuracy and privacy [8]. New approaches that employ cryptographic techniques to avoid information leakage are computationally very classy. Similarly, PPDMs use data distribution methods and it also includes partitioned data in longitude or in latitude fashion through multiple individuals. Beside with these techniques Two fish Algorithm [9] is very useful in securing private data .It consists of 128-bit block cipher [4, 2] that accepts a variable length key up to 256 bits. The cipher is a 16-round Feistel system through a bijective function made up of four key-dependent 8-by-8-bit S-boxes,a static 4-by-4 maximum distance distinguishable matrix over GF(28), a pseudo-Hadamard transform, bitwise rotations, and a reasonably designed key schedule. The strategy of both the round function and the key schedule permits a wide variety of balances among speed, [3] software size, key setup time, gate count, and memory. III. CRITICAL REVIEW OF LITERATURES AND IDENTIFICATION OF RESEARCH GAPS Various societies like banking, medical treatment organizations, and search engines accumulate huge data. This data can be shared for the purpose of analysis which in turn helps the organization to gain valuable knowledge which might contain sensitive information about any individual. For
  • 2. Integrated Intelligent Research (IIR) International Journal of Data Mining Techniques and Applications Volume: 06 Issue: 01 June 2017, Page No.33-35 ISSN: 2278-2419 34 example, organizations such as hospitals contains health records of the recipients admitted as patients. They share these health records with the scholars for purpose analysis [9]. There is a chance that the person/scholar availing the data which may be sensitive may obtain individuals information. When we speak of sensitive data privacy is of a major concern. As a result, a new path in the field of data mining is created ,known as privacy preservation in data mining (PPDM) [5,9]. In the literature review and in the summary we have stated the importance of privacy preservation. Privacy preservation of data mining [10] has been developed as a wide spread research study in order to secure sensitive information .Such as anonymization should not only satisfy original privacy requirements but also safeguard the utility of the data. Certainly, K-anonymity is an efficient means of privacy preservation in data mining. However, several demonstrated that the data processed by this system often failed to overcome some attacks and are susceptible to internet phishing. As a result, further privacy preservation in data mining using K- anonymity needs an advance data infrastructure to support the combination of present data functionality. This would certainly fulfill the requirements of different kinds of clients and communities. Even though the present search algorithms are capable to speed up the retrieval process, they do not scale up to large volume of data since the linear increase in response time with the amount of the searched datasets. The proposed technique for the searching of distributed large data amongst many cloud providers must possess the ability to preserve privacy, and must be scalable, efficient, well-suited, and good for utility as well as integrity. The objective of this technique is to secure the sensitive information while retrieving the data. Privacy preservation of data mining methods are separated and split into widespread zones, data securing and information securing. Data securing is elimination or changing sensitive data from the database before revealing it to an external entity. Knowledge security focuses securing the important data which can be extracted from the databank by several data mining systems [8]. Current methods for preserving security in data mining [7] are classified as follows: Data Discomposure, Cryptography techniques and Query auditing [11]. The main constraint lies in the altered data concentrating on the noise that is being added. Usually in the data discomposure method, the transformation of the sensitive data is carried out once the noise is added to the original data. Encryption and decryption contains the use of key for original data. In order to overcome the drawbacks of the existing techniques we are introducing a modified Two fish Algorithm. Table-1: PPDM METHODS PPDM: Methods Description Data distribution: This might include partitioned data in longitude or in latitude fashion. Data falsification: Includes discomposure, delaying, combining or gathering, interchanging and selection. Knowledge mining algorithms Includes classifying, Associating, cluster analysis. Data or rules hidden: Points to secure main data or rule of creative or new facts. Kanonymity: Obtain anonymization. Ldiversity: Preserve the diversity of the private data. Classification Tree: Attribute are generalized to bind the info leak. Randomization: An un-sophisticated and important technique to hide the individual data in PPDM. Protecting Private data: Protects the confidentiality, it should adjust data cautiously to achieve ideal data utility. IV. STATEMENT OF RESEARCH PROBLEM Identify the data which needs to be preserved from Big Data which is collected by data collector. We propose a modified Two-Fish algorithm in order to preserve the privacy of individual sensitive information. V. METHODOLOGY OR APPROACH INTENDED TO BE ADOPTED IN THE EXECUTION OF THE RESEARCH Privacy preservation of data mining [10] is a wide spread research study in order to secure the sensitive information .The Methodology is shown in figure 1. Figure 1. Methodology VI. OBJECTIVES OF RESEARCH The main considerations of privacy preservation are in two fields. In the early stage [4] sensitive raw data like personal information including name, address, age so on, should be transformed or clipped out from the original database, in order for the beneficiary of the data to not compromise another entity’s privacy.  Next, sensitive knowledge is not supposed to be mined using familiar data mining techniques from a database, failing which leads to a compromise in data privacy.  Identify the data which needs to be preserved from big data which is collected by data collector.
  • 3. Integrated Intelligent Research (IIR) International Journal of Data Mining Techniques and Applications Volume: 06 Issue: 01 June 2017, Page No.33-35 ISSN: 2278-2419 35  We propose a modified Two-Fish algorithm in order to preserve the sensitive information.  We try to increase the key length from 256 to 512.  Verify the results. VII. EXPECTED OUTCOMES The main goal is to protect data privacy and confidentiality. Develop a modified two fish algorithm to secure the sensitive data. Big data analysis for privacy preservation of sensitive information. References [1] Big Data Privacy Preservation, Ericsson Labs,http://labs.ericsson.com/blog/privacy-preservation- in-big-data-analytics. [2] Benny Pinkas HP Labs benny.pinkas@hp.com , “Cryptographic techniques for privacy-preserving data mining”, SIGKDD Explorations, Volume 4, Issue 2 - page 12 [3] Sharma, Manish, Atul Chaudhary, Manish Mathuria, Shalini Chaudhary, and Santosh Kumar. "An efficient approach for privacy preserving in data mining", 2014 International Conference on Signal Propagation and Computer Technology (ICSPCT 2014), 2014. [4] S.Bhanumathi and Sakthivel “A New Model for Privacy Preserving Multiparty Collaborative Data Mining” ICCPCT-2013, (845). [5] Agarwal, R. and Shrikant, R. "Privacy Preserving Data Mining", Proceeding of special interest group on management of data pp.439-450, 2000. [6] L. Sweeney, "k-anonymity: A model for protecting privacy," International Journal on Uncertainty, Fuzziness and Knowledge-Based Systems, pp. 557–570, 2002. [7] Elisa Bertino, Dan Lin, and Wei Jiang, A Survey of Quantification of Privacy Preserving Data Mining Algorithms, Springer ,volume 34 pp183-205 [8] V.S Verykios, A.K Elmagarmid, E. Bertino, Y. Saygin and E. Dasseni, "Association Rule Hiding", IEEE Transaction Knowledge and Data Engineering, 16(4): 434 - 447, 2004. [9] Jian Wang, Yong Cheng Lou, Yen Zh Jiajin Le, "A Survey on Privacy Preserving Data Mining",International Workshop on Database Technology and Application pp. III - 114, 2009. [10]Anjana Go Sain, Nikita chugh ,”Privacy Preservation in Big Data”,IJCA,Volume 100-No 17,August 2014. [11]R.L. Rivest, A. Shamir, and L. Adleman , A Method for Obtaining Digital Signatures and Public-Key Cryptosystems