SlideShare a Scribd company logo
1 of 6
Secure Mining of Association Rules in Horizontally Distributed Databases 
Secure Mining of Association Rules in Horizontally Distributed Databases 
ABSTRACT 
We propose a protocol for secure mining of association rules in horizontally 
distributed databases. The current leading protocol is that of Kantarcioglu and 
Clifton. Our protocol, like theirs, is based on the Fast Distributed Mining (FDM) 
algorithm of Cheung et al. which is an unsecured distributed version of the Apriori 
algorithm. The main ingredients in our protocol are two novel secure multi-party 
algorithms — one that computes the union of private subsets that each of the 
interacting players hold, and another that tests the inclusion of an element held by 
one player in a subset held by another. Our protocol offers enhanced privacy with 
respect to the protocol. In addition, it is simpler and is significantly more efficient 
in terms of communication rounds, communication cost and computational cost. 
EXISTING SYSTEM: 
Kantarcioglu and Clifton studied that problems and devised a protocol for its 
solution. The main part of the protocol is a sub-protocol for the secure computation 
of the union of private subsets that are held by the different players. (The private 
subset of a given player, as we explain below, includes the item sets that are s-frequent 
in his partial database. That is the most costly part of the protocol and its 
implementation relies upon cryptographic primitives such as commutative 
encryption, oblivious transfer, and hash functions. This is also the only part in the 
protocol in which the players may extract from their view of the protocol 
information on other databases, beyond what is implied by the final output and 
their own input. While such leakage of information renders the protocol not 
perfectly secure, the perimeter of the excess information is explicitly bounded and 
Contact: 9703109334, 9533694296 
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
Secure Mining of Association Rules in Horizontally Distributed Databases 
it is argued there that such information leakage is innocuous, whence acceptable 
from a practical point of view. 
DISADVANTAGES OF EXISTING SYSTEM: 
 Insufficient security, simplicity and efficiency are not well in the databases, not 
sure in privacy in an existing system. 
 While our solution is still not perfectly secure, it leaks excess information only 
to a small number (three) of possible coalitions, unlike the protocol of that 
discloses information also to some single players. 
 Our protocol may leak is less sensitive than the excess information leaked by 
PROPOSED SYSTEM: 
The protocol that we propose here computes a parameterized family of functions, 
which we call threshold functions, in which the two extreme cases correspond to 
the problems of computing the union and intersection of private subsets. Those are 
in fact general-purpose protocols that can be used in other contexts as well. 
Another problem of secure multiparty computation that we solve here as part of 
our discussion is the set inclusion problem; namely, the problem where Alice holds 
a private subset of some ground set, and Bob holds an element in the ground set, 
and they wish to determine whether Bob’s element is within Alice’s subset, 
without revealing to either of them information about the other party’s input 
beyond the above described inclusion. 
Contact: 9703109334, 9533694296 
the protocol. 
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
Secure Mining of Association Rules in Horizontally Distributed Databases 
ADVANTAGES OF PROPOSED SYSTEM: 
 We proposed a protocol for secure mining of association rules in horizontally 
distributed databases that improves significantly upon the current leading 
protocol in terms of privacy and efficiency. 
 The main ingredient in our proposed protocol is a novel secure multi-party 
protocol for computing the union (or intersection) of private subsets that each of 
the interacting players holds. 
1. Privacy Preserving Data Mining 
2. Distributed Computation 
MODULES DESCRIPTION: 
1. Privacy Preserving Data Mining: 
One, in which the data owner and the data miner are two different entities, and 
another, in which the data is distributed among several parties who aim to jointly 
perform data mining on the unified corpus of data that they hold. In the first 
setting, the goal is to protect the data records from the data miner. Hence, the data 
owner aims at anonym zing the data prior to its release. The main approach in this 
Contact: 9703109334, 9533694296 
MODULES: 
3. Frequent Itemsets 
4. Association Rules 
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
Secure Mining of Association Rules in Horizontally Distributed Databases 
context is to apply data perturbation. The idea is that. Computation and 
communication costs versus the number of transactions N the perturbed data can be 
used to infer general trends in the data, without revealing original record 
information. In the second setting, the goal is to perform data mining while 
protecting the data records of each of the data owners from the other data owners. 
This is a problem of secure multiparty computation. The usual approach here is 
cryptographic rather than probabilistic. 
2. Distributed Computation: 
We compared the performance of two secure implementations of the FDM 
algorithm Section In the first implementation (denoted FDM-KC), we executed the 
unification step using Protocol UNIFI-KC, where the commutative cipher was 
1024-bit RSA in the second implementation (denoted FDM) we used our Protocol 
UNIFI, where the keyed-hash function was HMAC. In both implementations, we 
implemented Step 5 of the FDM algorithm in the secure manner that was described 
in later. We tested the two implementations with respect to three measures: 
1) Total computation time of the complete protocols (FDMKC and FDM) over all 
players. That measure includes the Apriori computation time, and the time to 
identify the globally s-frequent item sets, as described in later. 
2) Total computation time of the unification protocols only (UNIFI-KC and 
UNIFI) over all players. 3) Total message size. We ran three experiment sets, 
where each set tested the dependence of the above measures on a different 
parameter: • N — the number of transactions in the unified database, 
Contact: 9703109334, 9533694296 
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
Secure Mining of Association Rules in Horizontally Distributed Databases 
We describe here the solution that was proposed by Kantarcioglu and Clifton. 
They onsidered two possible settings. If the required output includes all globally s-frequent 
item sets, as well as the sizes of their supports, then the values of Δ(x) can 
be revealed for all. In such a case, those values may be computed using a secure 
summation protocol, where the private addend of Pm is suppm(x) − sNm. The 
more interesting setting, however, is the one where the support sizes are not part of 
the required output. We proceed to discuss it. 
Once the set Fs of all s-frequent itemsets is found, we may proceed to look for all 
(s, c)-association rules (rules with support at least sN and confidence at least c). In 
order to derive from Fs all (s, c)-association rules in an efficient manner we rely 
upon the straightforward lemma. 
SYSTEM REQUIREMENTS: 
HARDWARE REQUIREMENTS: 
• System : Pentium IV 2.4 GHz. 
• Hard Disk : 40 GB. 
• Floppy Drive : 1.44 Mb. 
Contact: 9703109334, 9533694296 
3. Frequent Itemsets: 
4. Association Rules: 
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
Secure Mining of Association Rules in Horizontally Distributed Databases 
• Monitor : 15 VGA Colour. 
• Mouse : Logitech. 
• Ram : 512 Mb. 
SOFTWARE REQUIREMENTS: 
• Operating system : - Windows XP. 
• Coding Language : ASP.NET, C#.Net. 
• Data Base : SQL Server 2005 
Tamir Tassa “Secure Mining of Association Rules in Horizontally Distributed 
Databases” IEEE TRANSACTIONS ON KNOWLEDGE AND DATA 
ENGINEERING, VOL. 26, NO. 4, APRIL 2014 
Contact: 9703109334, 9533694296 
REFERENCE: 
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in

More Related Content

What's hot

Privacy Preserved Distributed Data Sharing with Load Balancing Scheme
Privacy Preserved Distributed Data Sharing with Load Balancing SchemePrivacy Preserved Distributed Data Sharing with Load Balancing Scheme
Privacy Preserved Distributed Data Sharing with Load Balancing Scheme
Editor IJMTER
 

What's hot (15)

secure mining of association rules in horizontally distributed databases
secure mining of association rules in horizontally distributed databasessecure mining of association rules in horizontally distributed databases
secure mining of association rules in horizontally distributed databases
 
Searchable Encryption Systems
Searchable Encryption SystemsSearchable Encryption Systems
Searchable Encryption Systems
 
Search on encrypted data
Search on encrypted dataSearch on encrypted data
Search on encrypted data
 
Enabling dynamic data and indirect mutual trust for cloud computing storage s...
Enabling dynamic data and indirect mutual trust for cloud computing storage s...Enabling dynamic data and indirect mutual trust for cloud computing storage s...
Enabling dynamic data and indirect mutual trust for cloud computing storage s...
 
JAVA projects 2014
JAVA projects 2014JAVA projects 2014
JAVA projects 2014
 
Oruta privacy preserving public auditing
Oruta privacy preserving public auditingOruta privacy preserving public auditing
Oruta privacy preserving public auditing
 
A new algorithm for implementing message authentication and integrity in soft...
A new algorithm for implementing message authentication and integrity in soft...A new algorithm for implementing message authentication and integrity in soft...
A new algorithm for implementing message authentication and integrity in soft...
 
Privacy Preserved Distributed Data Sharing with Load Balancing Scheme
Privacy Preserved Distributed Data Sharing with Load Balancing SchemePrivacy Preserved Distributed Data Sharing with Load Balancing Scheme
Privacy Preserved Distributed Data Sharing with Load Balancing Scheme
 
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS A hybrid cloud approach for secure au...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS A hybrid cloud approach for secure au...IEEE 2014 JAVA CLOUD COMPUTING PROJECTS A hybrid cloud approach for secure au...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS A hybrid cloud approach for secure au...
 
Free net
Free netFree net
Free net
 
Oruta privacy preserving public auditing for shared data in the cloud
Oruta privacy preserving public auditing for shared data in the cloud Oruta privacy preserving public auditing for shared data in the cloud
Oruta privacy preserving public auditing for shared data in the cloud
 
Privacy preserving data sharing with anonymous id assignment
Privacy preserving data sharing with anonymous id assignmentPrivacy preserving data sharing with anonymous id assignment
Privacy preserving data sharing with anonymous id assignment
 
The effect of Encryption algorithms Delay on TCP Traffic over data networks
The effect of Encryption algorithms Delay on TCP Traffic over data networksThe effect of Encryption algorithms Delay on TCP Traffic over data networks
The effect of Encryption algorithms Delay on TCP Traffic over data networks
 
Oruta privacy preserving public auditing for shared data in the cloud
Oruta privacy preserving public auditing for shared data in the cloudOruta privacy preserving public auditing for shared data in the cloud
Oruta privacy preserving public auditing for shared data in the cloud
 
SECURE OUTSOURCED CALCULATIONS WITH HOMOMORPHIC ENCRYPTION
SECURE OUTSOURCED CALCULATIONS WITH HOMOMORPHIC ENCRYPTIONSECURE OUTSOURCED CALCULATIONS WITH HOMOMORPHIC ENCRYPTION
SECURE OUTSOURCED CALCULATIONS WITH HOMOMORPHIC ENCRYPTION
 

Similar to secure mining of association rules in horizontally distributed databases

SPACE-EFFICIENT VERIFIABLE SECRET SHARING USING POLYNOMIAL INTERPOLATION
SPACE-EFFICIENT VERIFIABLE SECRET SHARING USING POLYNOMIAL INTERPOLATIONSPACE-EFFICIENT VERIFIABLE SECRET SHARING USING POLYNOMIAL INTERPOLATION
SPACE-EFFICIENT VERIFIABLE SECRET SHARING USING POLYNOMIAL INTERPOLATION
Shakas Technologies
 

Similar to secure mining of association rules in horizontally distributed databases (20)

Secure Mining of Association Rules in Horizontally Distributed Databases
Secure Mining of Association Rules in Horizontally Distributed DatabasesSecure Mining of Association Rules in Horizontally Distributed Databases
Secure Mining of Association Rules in Horizontally Distributed Databases
 
Secure mining of association rules in horizontally distributed databases
Secure mining of association rules in horizontally distributed databasesSecure mining of association rules in horizontally distributed databases
Secure mining of association rules in horizontally distributed databases
 
2014 IEEE JAVA DATA MINING PROJECT Secure mining of association rules in hori...
2014 IEEE JAVA DATA MINING PROJECT Secure mining of association rules in hori...2014 IEEE JAVA DATA MINING PROJECT Secure mining of association rules in hori...
2014 IEEE JAVA DATA MINING PROJECT Secure mining of association rules in hori...
 
IEEE 2014 JAVA DATA MINING PROJECTS Secure mining of association rules in hor...
IEEE 2014 JAVA DATA MINING PROJECTS Secure mining of association rules in hor...IEEE 2014 JAVA DATA MINING PROJECTS Secure mining of association rules in hor...
IEEE 2014 JAVA DATA MINING PROJECTS Secure mining of association rules in hor...
 
JAVA 2013 IEEE DATAMINING PROJECT Secure mining of association rules in horiz...
JAVA 2013 IEEE DATAMINING PROJECT Secure mining of association rules in horiz...JAVA 2013 IEEE DATAMINING PROJECT Secure mining of association rules in horiz...
JAVA 2013 IEEE DATAMINING PROJECT Secure mining of association rules in horiz...
 
Data Sharing: Ensure Accountability Distribution in the Cloud
Data Sharing: Ensure Accountability Distribution in the CloudData Sharing: Ensure Accountability Distribution in the Cloud
Data Sharing: Ensure Accountability Distribution in the Cloud
 
Bi4201403406
Bi4201403406Bi4201403406
Bi4201403406
 
SPACE-EFFICIENT VERIFIABLE SECRET SHARING USING POLYNOMIAL INTERPOLATION
SPACE-EFFICIENT VERIFIABLE SECRET SHARING USING POLYNOMIAL INTERPOLATIONSPACE-EFFICIENT VERIFIABLE SECRET SHARING USING POLYNOMIAL INTERPOLATION
SPACE-EFFICIENT VERIFIABLE SECRET SHARING USING POLYNOMIAL INTERPOLATION
 
COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...
COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...
COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...
 
COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...
COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...
COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...
 
Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation
Space-efficient Verifiable Secret Sharing Using Polynomial InterpolationSpace-efficient Verifiable Secret Sharing Using Polynomial Interpolation
Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation
 
Space efficient verifiable secret sharing
Space efficient verifiable secret sharingSpace efficient verifiable secret sharing
Space efficient verifiable secret sharing
 
Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation
Space-efficient Verifiable Secret Sharing Using Polynomial InterpolationSpace-efficient Verifiable Secret Sharing Using Polynomial Interpolation
Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation
 
SPACE-EFFICIENT VERIFIABLE SECRET SHARING USING POLYNOMIAL INTERPOLATION
 SPACE-EFFICIENT VERIFIABLE SECRET SHARING USING POLYNOMIAL INTERPOLATION SPACE-EFFICIENT VERIFIABLE SECRET SHARING USING POLYNOMIAL INTERPOLATION
SPACE-EFFICIENT VERIFIABLE SECRET SHARING USING POLYNOMIAL INTERPOLATION
 
Securing Personal Information in Data Mining
Securing Personal Information in Data MiningSecuring Personal Information in Data Mining
Securing Personal Information in Data Mining
 
01337277
0133727701337277
01337277
 
D-Eclat Association Rules on Vertically Partitioned Dynamic Data to Outsource...
D-Eclat Association Rules on Vertically Partitioned Dynamic Data to Outsource...D-Eclat Association Rules on Vertically Partitioned Dynamic Data to Outsource...
D-Eclat Association Rules on Vertically Partitioned Dynamic Data to Outsource...
 
secure data retrieval for decentralized disruption-tolerant military networks
secure data retrieval for decentralized disruption-tolerant military networkssecure data retrieval for decentralized disruption-tolerant military networks
secure data retrieval for decentralized disruption-tolerant military networks
 
Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt...
Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt...Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt...
Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt...
 
CNS_Solutions-Adi.pdf
CNS_Solutions-Adi.pdfCNS_Solutions-Adi.pdf
CNS_Solutions-Adi.pdf
 

More from swathi78

More from swathi78 (20)

a system for denial-of-service attack detection based on multivariate correla...
a system for denial-of-service attack detection based on multivariate correla...a system for denial-of-service attack detection based on multivariate correla...
a system for denial-of-service attack detection based on multivariate correla...
 
web service recommendation via exploiting location and qo s information
web service recommendation via exploiting location and qo s informationweb service recommendation via exploiting location and qo s information
web service recommendation via exploiting location and qo s information
 
privacy-enhanced web service composition
privacy-enhanced web service compositionprivacy-enhanced web service composition
privacy-enhanced web service composition
 
optimal distributed malware defense in mobile networks with heterogeneous dev...
optimal distributed malware defense in mobile networks with heterogeneous dev...optimal distributed malware defense in mobile networks with heterogeneous dev...
optimal distributed malware defense in mobile networks with heterogeneous dev...
 
friend book a semantic-based friend recommendation system for social networks
friend book a semantic-based friend recommendation system for social networksfriend book a semantic-based friend recommendation system for social networks
friend book a semantic-based friend recommendation system for social networks
 
efficient authentication for mobile and pervasive computing
efficient authentication for mobile and pervasive computingefficient authentication for mobile and pervasive computing
efficient authentication for mobile and pervasive computing
 
cooperative caching for efficient data access in disruption tolerant networks
cooperative caching for efficient data access in disruption tolerant networkscooperative caching for efficient data access in disruption tolerant networks
cooperative caching for efficient data access in disruption tolerant networks
 
an incentive framework for cellular traffic offloading
an incentive framework for cellular traffic offloadingan incentive framework for cellular traffic offloading
an incentive framework for cellular traffic offloading
 
secure outsourced attribute-based signatures
secure outsourced attribute-based signaturessecure outsourced attribute-based signatures
secure outsourced attribute-based signatures
 
traffic pattern-based content leakage detection for trusted content delivery ...
traffic pattern-based content leakage detection for trusted content delivery ...traffic pattern-based content leakage detection for trusted content delivery ...
traffic pattern-based content leakage detection for trusted content delivery ...
 
the design and evaluation of an information sharing system for human networks
the design and evaluation of an information sharing system for human networksthe design and evaluation of an information sharing system for human networks
the design and evaluation of an information sharing system for human networks
 
the client assignment problem for continuous distributed interactive applicat...
the client assignment problem for continuous distributed interactive applicat...the client assignment problem for continuous distributed interactive applicat...
the client assignment problem for continuous distributed interactive applicat...
 
sos a distributed mobile q&a system based on social networks
sos a distributed mobile q&a system based on social networkssos a distributed mobile q&a system based on social networks
sos a distributed mobile q&a system based on social networks
 
securing broker-less publish subscribe systems using identity-based encryption
securing broker-less publish subscribe systems using identity-based encryptionsecuring broker-less publish subscribe systems using identity-based encryption
securing broker-less publish subscribe systems using identity-based encryption
 
rre a game-theoretic intrusion response and recovery engine
rre a game-theoretic intrusion response and recovery enginerre a game-theoretic intrusion response and recovery engine
rre a game-theoretic intrusion response and recovery engine
 
on false data-injection attacks against power system state estimation modelin...
on false data-injection attacks against power system state estimation modelin...on false data-injection attacks against power system state estimation modelin...
on false data-injection attacks against power system state estimation modelin...
 
loca ward a security and privacy aware location-based rewarding system
loca ward a security and privacy aware location-based rewarding systemloca ward a security and privacy aware location-based rewarding system
loca ward a security and privacy aware location-based rewarding system
 
exploiting service similarity for privacy in location-based search queries
exploiting service similarity for privacy in location-based search queriesexploiting service similarity for privacy in location-based search queries
exploiting service similarity for privacy in location-based search queries
 
enabling trustworthy service evaluation in service-oriented mobile social net...
enabling trustworthy service evaluation in service-oriented mobile social net...enabling trustworthy service evaluation in service-oriented mobile social net...
enabling trustworthy service evaluation in service-oriented mobile social net...
 
secure data retrieval for decentralized disruption-tolerant military networks
secure data retrieval for decentralized disruption-tolerant military networkssecure data retrieval for decentralized disruption-tolerant military networks
secure data retrieval for decentralized disruption-tolerant military networks
 

Recently uploaded

AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ankushspencer015
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
amitlee9823
 

Recently uploaded (20)

The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 

secure mining of association rules in horizontally distributed databases

  • 1. Secure Mining of Association Rules in Horizontally Distributed Databases Secure Mining of Association Rules in Horizontally Distributed Databases ABSTRACT We propose a protocol for secure mining of association rules in horizontally distributed databases. The current leading protocol is that of Kantarcioglu and Clifton. Our protocol, like theirs, is based on the Fast Distributed Mining (FDM) algorithm of Cheung et al. which is an unsecured distributed version of the Apriori algorithm. The main ingredients in our protocol are two novel secure multi-party algorithms — one that computes the union of private subsets that each of the interacting players hold, and another that tests the inclusion of an element held by one player in a subset held by another. Our protocol offers enhanced privacy with respect to the protocol. In addition, it is simpler and is significantly more efficient in terms of communication rounds, communication cost and computational cost. EXISTING SYSTEM: Kantarcioglu and Clifton studied that problems and devised a protocol for its solution. The main part of the protocol is a sub-protocol for the secure computation of the union of private subsets that are held by the different players. (The private subset of a given player, as we explain below, includes the item sets that are s-frequent in his partial database. That is the most costly part of the protocol and its implementation relies upon cryptographic primitives such as commutative encryption, oblivious transfer, and hash functions. This is also the only part in the protocol in which the players may extract from their view of the protocol information on other databases, beyond what is implied by the final output and their own input. While such leakage of information renders the protocol not perfectly secure, the perimeter of the excess information is explicitly bounded and Contact: 9703109334, 9533694296 Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
  • 2. Secure Mining of Association Rules in Horizontally Distributed Databases it is argued there that such information leakage is innocuous, whence acceptable from a practical point of view. DISADVANTAGES OF EXISTING SYSTEM:  Insufficient security, simplicity and efficiency are not well in the databases, not sure in privacy in an existing system.  While our solution is still not perfectly secure, it leaks excess information only to a small number (three) of possible coalitions, unlike the protocol of that discloses information also to some single players.  Our protocol may leak is less sensitive than the excess information leaked by PROPOSED SYSTEM: The protocol that we propose here computes a parameterized family of functions, which we call threshold functions, in which the two extreme cases correspond to the problems of computing the union and intersection of private subsets. Those are in fact general-purpose protocols that can be used in other contexts as well. Another problem of secure multiparty computation that we solve here as part of our discussion is the set inclusion problem; namely, the problem where Alice holds a private subset of some ground set, and Bob holds an element in the ground set, and they wish to determine whether Bob’s element is within Alice’s subset, without revealing to either of them information about the other party’s input beyond the above described inclusion. Contact: 9703109334, 9533694296 the protocol. Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
  • 3. Secure Mining of Association Rules in Horizontally Distributed Databases ADVANTAGES OF PROPOSED SYSTEM:  We proposed a protocol for secure mining of association rules in horizontally distributed databases that improves significantly upon the current leading protocol in terms of privacy and efficiency.  The main ingredient in our proposed protocol is a novel secure multi-party protocol for computing the union (or intersection) of private subsets that each of the interacting players holds. 1. Privacy Preserving Data Mining 2. Distributed Computation MODULES DESCRIPTION: 1. Privacy Preserving Data Mining: One, in which the data owner and the data miner are two different entities, and another, in which the data is distributed among several parties who aim to jointly perform data mining on the unified corpus of data that they hold. In the first setting, the goal is to protect the data records from the data miner. Hence, the data owner aims at anonym zing the data prior to its release. The main approach in this Contact: 9703109334, 9533694296 MODULES: 3. Frequent Itemsets 4. Association Rules Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
  • 4. Secure Mining of Association Rules in Horizontally Distributed Databases context is to apply data perturbation. The idea is that. Computation and communication costs versus the number of transactions N the perturbed data can be used to infer general trends in the data, without revealing original record information. In the second setting, the goal is to perform data mining while protecting the data records of each of the data owners from the other data owners. This is a problem of secure multiparty computation. The usual approach here is cryptographic rather than probabilistic. 2. Distributed Computation: We compared the performance of two secure implementations of the FDM algorithm Section In the first implementation (denoted FDM-KC), we executed the unification step using Protocol UNIFI-KC, where the commutative cipher was 1024-bit RSA in the second implementation (denoted FDM) we used our Protocol UNIFI, where the keyed-hash function was HMAC. In both implementations, we implemented Step 5 of the FDM algorithm in the secure manner that was described in later. We tested the two implementations with respect to three measures: 1) Total computation time of the complete protocols (FDMKC and FDM) over all players. That measure includes the Apriori computation time, and the time to identify the globally s-frequent item sets, as described in later. 2) Total computation time of the unification protocols only (UNIFI-KC and UNIFI) over all players. 3) Total message size. We ran three experiment sets, where each set tested the dependence of the above measures on a different parameter: • N — the number of transactions in the unified database, Contact: 9703109334, 9533694296 Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
  • 5. Secure Mining of Association Rules in Horizontally Distributed Databases We describe here the solution that was proposed by Kantarcioglu and Clifton. They onsidered two possible settings. If the required output includes all globally s-frequent item sets, as well as the sizes of their supports, then the values of Δ(x) can be revealed for all. In such a case, those values may be computed using a secure summation protocol, where the private addend of Pm is suppm(x) − sNm. The more interesting setting, however, is the one where the support sizes are not part of the required output. We proceed to discuss it. Once the set Fs of all s-frequent itemsets is found, we may proceed to look for all (s, c)-association rules (rules with support at least sN and confidence at least c). In order to derive from Fs all (s, c)-association rules in an efficient manner we rely upon the straightforward lemma. SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS: • System : Pentium IV 2.4 GHz. • Hard Disk : 40 GB. • Floppy Drive : 1.44 Mb. Contact: 9703109334, 9533694296 3. Frequent Itemsets: 4. Association Rules: Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
  • 6. Secure Mining of Association Rules in Horizontally Distributed Databases • Monitor : 15 VGA Colour. • Mouse : Logitech. • Ram : 512 Mb. SOFTWARE REQUIREMENTS: • Operating system : - Windows XP. • Coding Language : ASP.NET, C#.Net. • Data Base : SQL Server 2005 Tamir Tassa “Secure Mining of Association Rules in Horizontally Distributed Databases” IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 26, NO. 4, APRIL 2014 Contact: 9703109334, 9533694296 REFERENCE: Email id: academicliveprojects@gmail.com, www.logicsystems.org.in