SlideShare a Scribd company logo
1 of 6
Download to read offline
International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 6, Nov-Dec 2019
Available at www.ijsred.com
ISSN : 2581-7175 ©IJSRED:All Rights are Reserved Page 612
Privacy Preserving Data Mining Technique to Recover Association
Rules Using Homomorphic Encryption Technique
Varsha Patel*, NamrataTapaswi**
*(Computer Science and Engineering, IPS Academy, Institute of Engineeringand Science Indore
Email: varsha1993patel@gmail.com)
** (Computer Science and Engineering, IPS Academy, Institute of Engineeringand Science Indore
Email: hod.compsc@ipsacademy.org)
----------------------------------------************************----------------------------------
Abstract:
The data mining is a technique which is used for analysing the data and recovering the patterns for
applications. A number of applications are available where the data mining techniques are being used such
as for classification, decision making, pattern learning, etc. In this presented work the privacy preserving
data mining techniques are explored and a new technique for privacy preserving rule mining is introduced.
That technique usage the contributed data from different data suppliers and mine the association rules
securely. In order to mine the association rules the apriori algorithm is used. Additionally to secure the
data at client end the Homomorphic encryption algorithm is used. After mining the required association
rules from encrypted data it is delivered to the associated parties. The received encrypted rules are
decrypted at the end of client and decryption algorithm is implemented here to recover the decision rules
based on contributed part of data. The implementation of the proposed system is given in client server
approach. That technique is developed with the help of java technology. Finally using the different
experiments the performance of system is measured in terms of time and space complexity. The results
demonstrate the proposed technique is acceptable and secure due to Homomorphic encryption.
Additionally for extending the given concept the future plan is also proposed in this work.
Keywords — association rule mining, privacy preserving rule mining, apriori algorithm, Homomorphic
encryption, client end privacy management.
----------------------------------------************************----------------------------------
I. INTRODUCTION
Data mining is an approach for mining the
centralized database for extracting the valuable
patterns from data. This process needs to implement
the different computational algorithms for finding
the required patterns. But sometimes when we work
with the real world datasets the privacy and
sensitivity of data are needed to be maintained [1].
The branch of data mining which preserves privacy
during the mining of data is known as privacy-
preserving data mining techniques [2]. In this work,
the main area of study is privacy-preserving data
mining. In this context, the multiparty data
association and association rule mining technique is
tried to implement and explore. In literature where a
number of parties want the conclusion from the
aggregated data, the rules are mining for ease of
mining and recovery of contributed attributes.
However, for mining effective techniques are
available for extracting the conclusion from data
such as statistical approaches, opaque data models
and others.
But the rule mining technique much suitable in such
kinds of applications. Thus to mine, the association
rules the apriori algorithm is selected for providing
the security and privacy the Homomorphic
encryption technique is used. However, the
Homomorphic encryption techniques are cost-
effective but the security is very sound. These
RESEARCH ARTICLE OPEN ACCESS
International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 6, Nov-Dec 2019
Available at www.ijsred.com
ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 613
techniques are very valuable where the multiple
parties are agreed for combining their data and
mine common decision for planning and business
purpose. But not a single party wants to disclose
their data for securing the data owner’s privacy.
Thus such kinds of data mining techniques are
suitable for the medical industry, education,
hospitality, etc. now in these, a number of other
industries are following the concept of PPDM.
II. PROPOSED WORK
The proposed work for privacy-preserving data
mining using association rule techniques is detailed
in this chapter. The proposed model and the
relevant algorithm is described in this chapter.
A. System Overview
The privacy-preserving data mining technique is a
sub-domain of data mining where the data analysis
securely is the primary aim of the system. Here the
data mining techniques are mostly applied in
various source-based collected data. In this
technique, the multiple parties are agreed to
combine their data at the trusted party and mine
them for preparing the common decisions based on
data. That technique is frequently used in various
business intelligence applications, medical domain
data management, and many more. The different
kinds of data mining algorithms are applicable but
the rule mining techniques are suitable for
understanding and providing the decision rules.
Using these rules any organization can understand
and recover the decisions by traversing the rules
using the available attributes.
The proposed work is motivated for designing a
secure and efficient technique for mining
association rules from the multi-party data supplier.
Each party contributes a part of data which are
communicated at the server and the server first
aggregates that data for further processing. In this
context for providing security at the party end, the
Homomorphic encryption technique is applied.
Additionally over the encrypted data the association
rule mining namely apriori algorithm is applied. In
this technique, the entire data is processed at the
server end and the client is responsible for data
security. After data processing or association rule
generation the rules are distributed to all the
associated parties. The contributed part of data
which are used for generating rule is recoverable at
the same party end who contributed that part of data.
Therefore the proposed privacy-preserving data
mining technique is providing the service for
controlling security and privacy at the data owner’s
end.
B. Methodology
The proposed system is described in this section;
figure 2.1, contains the phases of data processing
using the proposed privacy preserving data
mining technique.
Fig.2.1 Proposed System
According to the given diagram 2.1, the proposed
system is divided into three modules. The client
selects their data at their own end and then connects
to the server when the connection is established the
user key is obtained by the client. The client is
usages that key and produces the cipher text for the
data. The server accepts the connection, collect the
data, the process using the apriori algorithm
generate rules. And finally, at the client end, the
rules are extracted and recovered using the
decryption process. The details of the proposed
modules for privacy-preserving data modelling are
described as:
No more than 3 levels of headings should be
used.All headings must be in 10pt font.Every word
International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 6, Nov-Dec 2019
Available at www.ijsred.com
ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 614
in a heading must be capitalized except for short
minor words as listed in Section III-B.
1) Client End P:The client end process is simulated to the
figure 2.2, The model contains the required steps of data
processing and their relationship among the server and client.
Fig. 2.2 Client End Process
Input dataset: all the concerned parties who want to combine
their data with other parties confidentially and mine the data
for concluding the decision rules. In this context, the user
selects the part of their own data for sharing with the trusted
server. The selected data is first read by the system and then
the next processes are initiated.
Connect to server: the entire process is a client-server data
management system therefore the processed data from the
client end is needed to be forward at the server end. Therefore
first need to establish connectivity from the server thus client
creates a request to the server for accepting the connection and
data. As the connectivity established the next process of
encryption is taken place.
Encrypt data: the encryption is a technique which is used for
securing the confidential data. That is a low cost and low
maintenance technique for offering security and privacy over
data. That transforms data from readable format to unreadable
format. In this work, a Homomorphic algorithm namely
Paillier algorithm is applied for preserving data confidentiality
and privacy.
Transmit to server: the encrypted data attributes are
reorganized into a file and transmitted to the server, where the
server combines the obtained data from different parties are
preparing a combined data set for processing.
2) Server End Process:The server side process of system
is demonstrated in figure 3.1, which provide the flow of steps
which are involved for processing the data.
Fig. 3 Server End Process
Accept connection: the system is prepared to work in a
multiple party environment therefore more than one client can
connect with the server, when a data contributor is connected
the server help to establish a connection. During this, the
server system generates a unique ID for the connected party
and sends the acknowledgment for the connection.
Accept data: after connection establishment, the client is able
to communicate the data. The data is secured previously when
they make a request for connection. After encryption of data,
the server accepts the data from all the parties.
Re-produce dataset: the accepted data from all the data
sources are combined together according to the available class
labels and other parties’ data. This process of combining all
party data is termed here as the reproduction of the dataset.
Apriori algorithm: in literature different kinds of techniques
available for mining the association rules. Among them, the
apriori algorithm is much popular for association rule mining.
The proposed technique here applies the apriori algorithm for
International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 6, Nov-Dec 2019
Available at www.ijsred.com
ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 615
mining association rules. The apriori algorithm is explained in
the previous chapter. The classical format of the apriori
algorithm is used in this experimentation.
Rule generation: the computed frequent patterns are used in
this phase for generating association rules. These rules are
used for classification and prediction purposes.
Rule distribution: the generated rules are available at the
client end and can be used by different parties. Therefore the
server opens their connections for all the concerned parties to
extract the rules from their own end.
3) Client End Decision Recovery:The extracted rules from
the server are distributed equally to all the connected data
parties. These rules are used with the decryption process for
recovering the contributed part of data and decisions. The
encrypted part of the information is recovered due to the
cryptographic algorithm by the target party. But the parties
can only view the part of the decision variable which are
contributed by own.
C. Proposed Algorithm
The algorithm is basic steps that are used for processing the
data and generating the security and privacy-preserving rules.
Thus two different activities using the algorithms are
described in tables 2.1 and 2.2 First here for the server system
and second is used for client end.
Table 2.1 Proposed Algorithm
Input: accepted dataset D
Output: generated association rules
Process:
1. 	( )	
a. . ()	
b. . ( )
c. = 	 ( )
d. . ( )
2.
3. = . ! ( )
4. Return
Table 2.2 Proposed Algorithm for Client
Input: data set D
Output: recovered rule
Process:
1. " ()
2. " ()
3. = ( )
4. = # $ ℎ . & ' ( )
5. " ( )
6. ( ( )
7. ( == ) )
a. = !
b. = ' ! ( )
8.
9. Return
III. RESULTS ANALYSIS
This chapter provides the performance evaluation
of the proposed privacy-preserving association rule
mining technique. Therefore, two key parameters
are focused on evaluation namely time
requirements and memory usages. Both the
performance factors are reported in this chapter.
A. Time Requirements
The time requirements of an algorithm are also known as the
time complexity for algorithms. In this work for processing
the input dataset and obtaining the association rules time
requirements are measured. That is computed using the
following Eq.
*! = + ℎ −
International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 6, Nov-Dec 2019
Available at www.ijsred.com
ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 616
Fig. 3.1 Server End Process
The time requirement of the proposed privacy-preserving
association rule mining technique using secure Paillier’s
algorithm is reported in table 3.1, additionally, their line graph
representation is given in figure 3.1. In order to provide a line
graph, the X-axis contains the number of attributes used for
rule mining and the corresponding consumed time is notified
on Y-axis. The time requirements of the algorithm are given
here in terms of milliseconds. According to observed results
as the number of time requirements, is increased when the
number of attributes for processing and the number of
transactions for processing is increased
Fig. 3.2Memory Usages
Table 3.1 Time Requirement
Number of Attributes Time in milliseconds (MS)
4 46
6 83
8 132
10 175
12 197
14 224
16 269
Table 3.2 Memory Requirement
Number of
attributes
Memory Usages
kilobytes (KB)
4 14284
6 14826
8 15372
10 15778
12 16031
14 16594
16 17082
The obtained results for the proposed privacy-preserving
association rule mining technique is provided using table 3.2
additionally that is visually represented in a line graph as
given in figure 3.2. The X-axis of the line graph prepared on
the basis of the number of attributes involved in association
rule mining and the Y-axis shows the corresponding measured
main memory usages. The measurement of main memory
utilization is given here in terms of kilobytes (KB). According
to the developed results, the association rule mining space
requirements are increases with the number of attributes and
number of transactions.
0
50
100
150
200
250
300
4 6 8 10 12 14 16
TimeinMS
Number of Attributes
Time in milliseconds (MS)
12500
13000
13500
14000
14500
15000
15500
16000
16500
17000
17500
4 6 8 10 12 14 16
MemoryinKB
Number of Attributes
Memory Usages kilobytes (KB)
International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 6, Nov-Dec 2019
Available at www.ijsred.com
ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 617
IV. CONCLUSION
The implemented system for the privacy-preserving
association rule mining is accomplished
successfully. That offers security at the client end
by using Homomorphic encryption; in addition to
that server-side there is no probability to be data
leak due to association rule mining is processed
over the encrypted data. Therefore the proposed
technique is fully secure and trusted.
A. Future Work
The aim of the proposed work is to understand the privacy-
preserving data mining technique for discovering the
association rules. In this context, the model is developed and
evaluated successfully. In the near future, the following work
is proposed for designing a new and enhanced system.
1. The work is aimed for multiparty based decision rule
mining which increases the amount of data
dimensions significantly, therefore need to handle the
data dimensions,
2. The association rules are accurate for prediction and
classification but it is computationally expensive
therefore need to explore more rule mining
techniques for improving the resource complexity.
REFERENCES
[1] D. A. Adeniyi, Z. Wei, Y. Yongquan, “Automated web usage data
mining and recommendation system using K-Nearest Neighbor (KNN)
classification method”, Applied Computing and Informatics (2016) 12,
90–108
[2] R. Mendes, J. P. Vilela, “Privacy-Preserving Data Mining: Methods,
Metrics, and Applications”, Vol. 5, 2017, 2169-3536, 2017 IEEE
[3] M. V. Ahluwalia, A. Gangopadhyay, Z. Chen, Y. Yesha, “Target-
Based, Privacy Preserving, and Incremental Association Rule Mining”,
IEEE Transaction on Services Computing, DOI
10.1109/TSC.2015.2484318, IEEE
[4] “Chapter 3: Data Mining: an Overview”
[5] M. J. Zaki, W. MeiraJr, “Data Mining and Analysis Fundamental
Concepts and Algorithms”, Cambridge University Press Hardback,
2014 [Book]
[6] M. Goebel, L. Gruenwald, “A Survey of Data Mining and Knowledge
Discovery Software Tools”, ACM, 1999
[7] N. adhabPadhy, Dr. P. Mishra, “The Survey of Data Mining
Applications and Feature Scope”, International Journal of Computer
Science, Engineering and Information Technology (IJCSEIT), PP. 43-
58 Vol.2, No.3, June 2012.
[8] N. Sundaravaradan, M. Marwah, A. Shah, N. Ramakrishnan, "Data
mining approaches for life cycle assessment", In Sustainable Systems
and Technology (ISSST), 2011 IEEE International Symposium on, pp.
1-6. IEEE, 2011.
[9] F. Gorunescu, “Data Mining: Concepts, Models, and Techniques”,
Springer, 2011.
[10] Zhao, Yijun. "Data mining techniques." (2015).
[11] “Data Mining Tutorial: Process, Techniques, Tools & Examples”
[12] M. Tiwari, R. Singh, S. K. Singh, “Association–Rule Mining
Techniques: A general survey and empirical comparative evaluation”,
International Journal of Advanced Research in Computer and
Communication Engineering, Vol. 1, Issue 10, Dec. 2012
[13] A. Mittal, A. Nagar, K. Gupta, R. Nahar, “Comparative Study of
Various Frequent Pattern Mining Algorithms”, International Journal of
Advanced Research in Computer and Communication Engineering Vol.
4, Issue 4, April 2015
[14] “Laboratory Module 8: Mining Frequent Itemsets – Apriori
Algorithm”, available online at:
http://software.ucv.ro/~cmihaescu/ro/teaching/AIR/docs/Lab8-
Apriori.pdf
[15] F. Armknecht, "A Guide to Fully Homomorphic Encryption", IACR
Cryptology ePrint Archive 2015 (2015): 1192.
[16] J. Sen, "Homomorphic encryption: theory & applications",arXiv
preprint arXiv: 1305.5886 (2013).

More Related Content

What's hot

IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET Journal
 
Building confidential and efficient query services in the cloud with rasp dat...
Building confidential and efficient query services in the cloud with rasp dat...Building confidential and efficient query services in the cloud with rasp dat...
Building confidential and efficient query services in the cloud with rasp dat...eSAT Journals
 
IRJET- Efficient Data Access Control for Multi-authority Cloud Storage
IRJET-  	  Efficient Data Access Control for Multi-authority Cloud StorageIRJET-  	  Efficient Data Access Control for Multi-authority Cloud Storage
IRJET- Efficient Data Access Control for Multi-authority Cloud StorageIRJET Journal
 
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...IRJET Journal
 
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET-  	  Ensuring Security in Cloud Computing Cryptography using CryptographyIRJET-  	  Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET- Ensuring Security in Cloud Computing Cryptography using CryptographyIRJET Journal
 
Secure Key Encapsulation and Distribution Mechanism for Real Time Secure Mobi...
Secure Key Encapsulation and Distribution Mechanism for Real Time Secure Mobi...Secure Key Encapsulation and Distribution Mechanism for Real Time Secure Mobi...
Secure Key Encapsulation and Distribution Mechanism for Real Time Secure Mobi...IRJET Journal
 
An Approach towards Shuffling of Data to Avoid Tampering in Cloud
An Approach towards Shuffling of Data to Avoid Tampering in CloudAn Approach towards Shuffling of Data to Avoid Tampering in Cloud
An Approach towards Shuffling of Data to Avoid Tampering in CloudIRJET Journal
 
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud StorageIRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud StorageIRJET Journal
 
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingSurvey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingIRJET Journal
 
Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240Editor IJARCET
 
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageBio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageIJERA Editor
 
Enabling Secure and Efficient Multi-Keyword Ranked Search Scheme
Enabling Secure and Efficient Multi-Keyword Ranked Search SchemeEnabling Secure and Efficient Multi-Keyword Ranked Search Scheme
Enabling Secure and Efficient Multi-Keyword Ranked Search SchemeIRJET Journal
 
A Secure & Scalable Access Method in Cloud Computing
A Secure & Scalable Access Method in Cloud ComputingA Secure & Scalable Access Method in Cloud Computing
A Secure & Scalable Access Method in Cloud Computingijsrd.com
 
A proposed Solution: Data Availability and Error Correction in Cloud Computing
A proposed Solution: Data Availability and Error Correction in Cloud ComputingA proposed Solution: Data Availability and Error Correction in Cloud Computing
A proposed Solution: Data Availability and Error Correction in Cloud ComputingCSCJournals
 
Survey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudSurvey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudeSAT Publishing House
 
Survey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudSurvey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudeSAT Journals
 
Remote data integrity checking with a third party auditor in public cloud usi...
Remote data integrity checking with a third party auditor in public cloud usi...Remote data integrity checking with a third party auditor in public cloud usi...
Remote data integrity checking with a third party auditor in public cloud usi...IJSRED
 
IRJET- Medical Data Sharing for Protection and Intrusion Avoidance in Cloudlet
IRJET- Medical Data Sharing for Protection and Intrusion Avoidance in CloudletIRJET- Medical Data Sharing for Protection and Intrusion Avoidance in Cloudlet
IRJET- Medical Data Sharing for Protection and Intrusion Avoidance in CloudletIRJET Journal
 

What's hot (20)

IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
 
Building confidential and efficient query services in the cloud with rasp dat...
Building confidential and efficient query services in the cloud with rasp dat...Building confidential and efficient query services in the cloud with rasp dat...
Building confidential and efficient query services in the cloud with rasp dat...
 
IRJET- Efficient Data Access Control for Multi-authority Cloud Storage
IRJET-  	  Efficient Data Access Control for Multi-authority Cloud StorageIRJET-  	  Efficient Data Access Control for Multi-authority Cloud Storage
IRJET- Efficient Data Access Control for Multi-authority Cloud Storage
 
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
 
21 muhammad ahmadjan_8
21 muhammad ahmadjan_821 muhammad ahmadjan_8
21 muhammad ahmadjan_8
 
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET-  	  Ensuring Security in Cloud Computing Cryptography using CryptographyIRJET-  	  Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
 
Secure Key Encapsulation and Distribution Mechanism for Real Time Secure Mobi...
Secure Key Encapsulation and Distribution Mechanism for Real Time Secure Mobi...Secure Key Encapsulation and Distribution Mechanism for Real Time Secure Mobi...
Secure Key Encapsulation and Distribution Mechanism for Real Time Secure Mobi...
 
An Approach towards Shuffling of Data to Avoid Tampering in Cloud
An Approach towards Shuffling of Data to Avoid Tampering in CloudAn Approach towards Shuffling of Data to Avoid Tampering in Cloud
An Approach towards Shuffling of Data to Avoid Tampering in Cloud
 
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud StorageIRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
 
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingSurvey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
 
Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240
 
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageBio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
 
R180203114117
R180203114117R180203114117
R180203114117
 
Enabling Secure and Efficient Multi-Keyword Ranked Search Scheme
Enabling Secure and Efficient Multi-Keyword Ranked Search SchemeEnabling Secure and Efficient Multi-Keyword Ranked Search Scheme
Enabling Secure and Efficient Multi-Keyword Ranked Search Scheme
 
A Secure & Scalable Access Method in Cloud Computing
A Secure & Scalable Access Method in Cloud ComputingA Secure & Scalable Access Method in Cloud Computing
A Secure & Scalable Access Method in Cloud Computing
 
A proposed Solution: Data Availability and Error Correction in Cloud Computing
A proposed Solution: Data Availability and Error Correction in Cloud ComputingA proposed Solution: Data Availability and Error Correction in Cloud Computing
A proposed Solution: Data Availability and Error Correction in Cloud Computing
 
Survey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudSurvey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloud
 
Survey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudSurvey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloud
 
Remote data integrity checking with a third party auditor in public cloud usi...
Remote data integrity checking with a third party auditor in public cloud usi...Remote data integrity checking with a third party auditor in public cloud usi...
Remote data integrity checking with a third party auditor in public cloud usi...
 
IRJET- Medical Data Sharing for Protection and Intrusion Avoidance in Cloudlet
IRJET- Medical Data Sharing for Protection and Intrusion Avoidance in CloudletIRJET- Medical Data Sharing for Protection and Intrusion Avoidance in Cloudlet
IRJET- Medical Data Sharing for Protection and Intrusion Avoidance in Cloudlet
 

Similar to Privacy Preserving Data Mining Technique to Recover Association Rules Using Homomorphic Encryption Technique

IRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key ExposureIRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key ExposureIRJET Journal
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET Journal
 
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...IRJET Journal
 
Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235Editor IJARCET
 
Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235Editor IJARCET
 
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...IRJET Journal
 
IRJET- Secure Data Protection in Cloud Computing
IRJET-  	  Secure Data Protection in Cloud ComputingIRJET-  	  Secure Data Protection in Cloud Computing
IRJET- Secure Data Protection in Cloud ComputingIRJET Journal
 
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET Journal
 
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET Journal
 
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
IRJET-  	  Efficient Privacy-Preserving using Novel Based Secure Protocol in SVMIRJET-  	  Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVMIRJET Journal
 
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesIRJET Journal
 
Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240Editor IJARCET
 
“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”
“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”
“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”IRJET Journal
 
IRJET- Key Exchange Privacy Preserving Technique in Cloud Computing
IRJET-  	  Key Exchange Privacy Preserving Technique in Cloud ComputingIRJET-  	  Key Exchange Privacy Preserving Technique in Cloud Computing
IRJET- Key Exchange Privacy Preserving Technique in Cloud ComputingIRJET Journal
 
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud DataA Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud DataIRJET Journal
 
Public Auditing for Regenerating Code Based Cloud Storage
Public Auditing for Regenerating Code Based Cloud StoragePublic Auditing for Regenerating Code Based Cloud Storage
Public Auditing for Regenerating Code Based Cloud StorageIRJET Journal
 
IRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
IRJET- Compress and Secure Data Sharing for Mobile Cloud ComputingIRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
IRJET- Compress and Secure Data Sharing for Mobile Cloud ComputingIRJET Journal
 
IRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
IRJET- Security Enhance using Hash and Chaostic Algorithm in CloudIRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
IRJET- Security Enhance using Hash and Chaostic Algorithm in CloudIRJET Journal
 
IRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
IRJET- Security Enhance using Hash and Chaostic Algorithm in CloudIRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
IRJET- Security Enhance using Hash and Chaostic Algorithm in CloudIRJET Journal
 
IRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on CloudIRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on CloudIRJET Journal
 

Similar to Privacy Preserving Data Mining Technique to Recover Association Rules Using Homomorphic Encryption Technique (20)

IRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key ExposureIRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key Exposure
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
 
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...
 
Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235
 
Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235
 
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
 
IRJET- Secure Data Protection in Cloud Computing
IRJET-  	  Secure Data Protection in Cloud ComputingIRJET-  	  Secure Data Protection in Cloud Computing
IRJET- Secure Data Protection in Cloud Computing
 
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
 
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
 
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
IRJET-  	  Efficient Privacy-Preserving using Novel Based Secure Protocol in SVMIRJET-  	  Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
 
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed Services
 
Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240
 
“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”
“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”
“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”
 
IRJET- Key Exchange Privacy Preserving Technique in Cloud Computing
IRJET-  	  Key Exchange Privacy Preserving Technique in Cloud ComputingIRJET-  	  Key Exchange Privacy Preserving Technique in Cloud Computing
IRJET- Key Exchange Privacy Preserving Technique in Cloud Computing
 
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud DataA Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
 
Public Auditing for Regenerating Code Based Cloud Storage
Public Auditing for Regenerating Code Based Cloud StoragePublic Auditing for Regenerating Code Based Cloud Storage
Public Auditing for Regenerating Code Based Cloud Storage
 
IRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
IRJET- Compress and Secure Data Sharing for Mobile Cloud ComputingIRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
IRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
 
IRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
IRJET- Security Enhance using Hash and Chaostic Algorithm in CloudIRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
IRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
 
IRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
IRJET- Security Enhance using Hash and Chaostic Algorithm in CloudIRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
IRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
 
IRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on CloudIRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on Cloud
 

More from IJSRED

IJSRED-V3I6P13
IJSRED-V3I6P13IJSRED-V3I6P13
IJSRED-V3I6P13IJSRED
 
School Bus Tracking and Security System
School Bus Tracking and Security SystemSchool Bus Tracking and Security System
School Bus Tracking and Security SystemIJSRED
 
BigBasket encashing the Demonetisation: A big opportunity
BigBasket encashing the Demonetisation: A big opportunityBigBasket encashing the Demonetisation: A big opportunity
BigBasket encashing the Demonetisation: A big opportunityIJSRED
 
Quantitative and Qualitative Analysis of Plant Leaf Disease
Quantitative and Qualitative Analysis of Plant Leaf DiseaseQuantitative and Qualitative Analysis of Plant Leaf Disease
Quantitative and Qualitative Analysis of Plant Leaf DiseaseIJSRED
 
DC Fast Charger and Battery Management System for Electric Vehicles
DC Fast Charger and Battery Management System for Electric VehiclesDC Fast Charger and Battery Management System for Electric Vehicles
DC Fast Charger and Battery Management System for Electric VehiclesIJSRED
 
Growth Path Followed by France
Growth Path Followed by FranceGrowth Path Followed by France
Growth Path Followed by FranceIJSRED
 
Acquisition System
Acquisition SystemAcquisition System
Acquisition SystemIJSRED
 
Parallelization of Graceful Labeling Using Open MP
Parallelization of Graceful Labeling Using Open MPParallelization of Graceful Labeling Using Open MP
Parallelization of Graceful Labeling Using Open MPIJSRED
 
Study of Phenotypic Plasticity of Fruits of Luffa Acutangula Var. Amara
Study of Phenotypic Plasticity of  Fruits of Luffa Acutangula Var. AmaraStudy of Phenotypic Plasticity of  Fruits of Luffa Acutangula Var. Amara
Study of Phenotypic Plasticity of Fruits of Luffa Acutangula Var. AmaraIJSRED
 
Understanding Architecture of Internet of Things
Understanding Architecture of Internet of ThingsUnderstanding Architecture of Internet of Things
Understanding Architecture of Internet of ThingsIJSRED
 
Smart shopping cart
Smart shopping cartSmart shopping cart
Smart shopping cartIJSRED
 
An Emperical Study of Learning How Soft Skills is Essential for Management St...
An Emperical Study of Learning How Soft Skills is Essential for Management St...An Emperical Study of Learning How Soft Skills is Essential for Management St...
An Emperical Study of Learning How Soft Skills is Essential for Management St...IJSRED
 
Smart Canteen Management
Smart Canteen ManagementSmart Canteen Management
Smart Canteen ManagementIJSRED
 
Gandhian trusteeship and Economic Ethics
Gandhian trusteeship and Economic EthicsGandhian trusteeship and Economic Ethics
Gandhian trusteeship and Economic EthicsIJSRED
 
Impacts of a New Spatial Variable on a Black Hole Metric Solution
Impacts of a New Spatial Variable on a Black Hole Metric SolutionImpacts of a New Spatial Variable on a Black Hole Metric Solution
Impacts of a New Spatial Variable on a Black Hole Metric SolutionIJSRED
 
A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...
A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...
A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...IJSRED
 
Inginious Trafalgar Contrivition System
Inginious Trafalgar Contrivition SystemInginious Trafalgar Contrivition System
Inginious Trafalgar Contrivition SystemIJSRED
 
Farmer's Analytical assistant
Farmer's Analytical assistantFarmer's Analytical assistant
Farmer's Analytical assistantIJSRED
 
Functions of Forensic Engineering Investigator in India
Functions of Forensic Engineering Investigator in IndiaFunctions of Forensic Engineering Investigator in India
Functions of Forensic Engineering Investigator in IndiaIJSRED
 
Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....
Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....
Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....IJSRED
 

More from IJSRED (20)

IJSRED-V3I6P13
IJSRED-V3I6P13IJSRED-V3I6P13
IJSRED-V3I6P13
 
School Bus Tracking and Security System
School Bus Tracking and Security SystemSchool Bus Tracking and Security System
School Bus Tracking and Security System
 
BigBasket encashing the Demonetisation: A big opportunity
BigBasket encashing the Demonetisation: A big opportunityBigBasket encashing the Demonetisation: A big opportunity
BigBasket encashing the Demonetisation: A big opportunity
 
Quantitative and Qualitative Analysis of Plant Leaf Disease
Quantitative and Qualitative Analysis of Plant Leaf DiseaseQuantitative and Qualitative Analysis of Plant Leaf Disease
Quantitative and Qualitative Analysis of Plant Leaf Disease
 
DC Fast Charger and Battery Management System for Electric Vehicles
DC Fast Charger and Battery Management System for Electric VehiclesDC Fast Charger and Battery Management System for Electric Vehicles
DC Fast Charger and Battery Management System for Electric Vehicles
 
Growth Path Followed by France
Growth Path Followed by FranceGrowth Path Followed by France
Growth Path Followed by France
 
Acquisition System
Acquisition SystemAcquisition System
Acquisition System
 
Parallelization of Graceful Labeling Using Open MP
Parallelization of Graceful Labeling Using Open MPParallelization of Graceful Labeling Using Open MP
Parallelization of Graceful Labeling Using Open MP
 
Study of Phenotypic Plasticity of Fruits of Luffa Acutangula Var. Amara
Study of Phenotypic Plasticity of  Fruits of Luffa Acutangula Var. AmaraStudy of Phenotypic Plasticity of  Fruits of Luffa Acutangula Var. Amara
Study of Phenotypic Plasticity of Fruits of Luffa Acutangula Var. Amara
 
Understanding Architecture of Internet of Things
Understanding Architecture of Internet of ThingsUnderstanding Architecture of Internet of Things
Understanding Architecture of Internet of Things
 
Smart shopping cart
Smart shopping cartSmart shopping cart
Smart shopping cart
 
An Emperical Study of Learning How Soft Skills is Essential for Management St...
An Emperical Study of Learning How Soft Skills is Essential for Management St...An Emperical Study of Learning How Soft Skills is Essential for Management St...
An Emperical Study of Learning How Soft Skills is Essential for Management St...
 
Smart Canteen Management
Smart Canteen ManagementSmart Canteen Management
Smart Canteen Management
 
Gandhian trusteeship and Economic Ethics
Gandhian trusteeship and Economic EthicsGandhian trusteeship and Economic Ethics
Gandhian trusteeship and Economic Ethics
 
Impacts of a New Spatial Variable on a Black Hole Metric Solution
Impacts of a New Spatial Variable on a Black Hole Metric SolutionImpacts of a New Spatial Variable on a Black Hole Metric Solution
Impacts of a New Spatial Variable on a Black Hole Metric Solution
 
A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...
A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...
A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...
 
Inginious Trafalgar Contrivition System
Inginious Trafalgar Contrivition SystemInginious Trafalgar Contrivition System
Inginious Trafalgar Contrivition System
 
Farmer's Analytical assistant
Farmer's Analytical assistantFarmer's Analytical assistant
Farmer's Analytical assistant
 
Functions of Forensic Engineering Investigator in India
Functions of Forensic Engineering Investigator in IndiaFunctions of Forensic Engineering Investigator in India
Functions of Forensic Engineering Investigator in India
 
Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....
Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....
Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....
 

Recently uploaded

Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 

Recently uploaded (20)

Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 

Privacy Preserving Data Mining Technique to Recover Association Rules Using Homomorphic Encryption Technique

  • 1. International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 6, Nov-Dec 2019 Available at www.ijsred.com ISSN : 2581-7175 ©IJSRED:All Rights are Reserved Page 612 Privacy Preserving Data Mining Technique to Recover Association Rules Using Homomorphic Encryption Technique Varsha Patel*, NamrataTapaswi** *(Computer Science and Engineering, IPS Academy, Institute of Engineeringand Science Indore Email: varsha1993patel@gmail.com) ** (Computer Science and Engineering, IPS Academy, Institute of Engineeringand Science Indore Email: hod.compsc@ipsacademy.org) ----------------------------------------************************---------------------------------- Abstract: The data mining is a technique which is used for analysing the data and recovering the patterns for applications. A number of applications are available where the data mining techniques are being used such as for classification, decision making, pattern learning, etc. In this presented work the privacy preserving data mining techniques are explored and a new technique for privacy preserving rule mining is introduced. That technique usage the contributed data from different data suppliers and mine the association rules securely. In order to mine the association rules the apriori algorithm is used. Additionally to secure the data at client end the Homomorphic encryption algorithm is used. After mining the required association rules from encrypted data it is delivered to the associated parties. The received encrypted rules are decrypted at the end of client and decryption algorithm is implemented here to recover the decision rules based on contributed part of data. The implementation of the proposed system is given in client server approach. That technique is developed with the help of java technology. Finally using the different experiments the performance of system is measured in terms of time and space complexity. The results demonstrate the proposed technique is acceptable and secure due to Homomorphic encryption. Additionally for extending the given concept the future plan is also proposed in this work. Keywords — association rule mining, privacy preserving rule mining, apriori algorithm, Homomorphic encryption, client end privacy management. ----------------------------------------************************---------------------------------- I. INTRODUCTION Data mining is an approach for mining the centralized database for extracting the valuable patterns from data. This process needs to implement the different computational algorithms for finding the required patterns. But sometimes when we work with the real world datasets the privacy and sensitivity of data are needed to be maintained [1]. The branch of data mining which preserves privacy during the mining of data is known as privacy- preserving data mining techniques [2]. In this work, the main area of study is privacy-preserving data mining. In this context, the multiparty data association and association rule mining technique is tried to implement and explore. In literature where a number of parties want the conclusion from the aggregated data, the rules are mining for ease of mining and recovery of contributed attributes. However, for mining effective techniques are available for extracting the conclusion from data such as statistical approaches, opaque data models and others. But the rule mining technique much suitable in such kinds of applications. Thus to mine, the association rules the apriori algorithm is selected for providing the security and privacy the Homomorphic encryption technique is used. However, the Homomorphic encryption techniques are cost- effective but the security is very sound. These RESEARCH ARTICLE OPEN ACCESS
  • 2. International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 6, Nov-Dec 2019 Available at www.ijsred.com ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 613 techniques are very valuable where the multiple parties are agreed for combining their data and mine common decision for planning and business purpose. But not a single party wants to disclose their data for securing the data owner’s privacy. Thus such kinds of data mining techniques are suitable for the medical industry, education, hospitality, etc. now in these, a number of other industries are following the concept of PPDM. II. PROPOSED WORK The proposed work for privacy-preserving data mining using association rule techniques is detailed in this chapter. The proposed model and the relevant algorithm is described in this chapter. A. System Overview The privacy-preserving data mining technique is a sub-domain of data mining where the data analysis securely is the primary aim of the system. Here the data mining techniques are mostly applied in various source-based collected data. In this technique, the multiple parties are agreed to combine their data at the trusted party and mine them for preparing the common decisions based on data. That technique is frequently used in various business intelligence applications, medical domain data management, and many more. The different kinds of data mining algorithms are applicable but the rule mining techniques are suitable for understanding and providing the decision rules. Using these rules any organization can understand and recover the decisions by traversing the rules using the available attributes. The proposed work is motivated for designing a secure and efficient technique for mining association rules from the multi-party data supplier. Each party contributes a part of data which are communicated at the server and the server first aggregates that data for further processing. In this context for providing security at the party end, the Homomorphic encryption technique is applied. Additionally over the encrypted data the association rule mining namely apriori algorithm is applied. In this technique, the entire data is processed at the server end and the client is responsible for data security. After data processing or association rule generation the rules are distributed to all the associated parties. The contributed part of data which are used for generating rule is recoverable at the same party end who contributed that part of data. Therefore the proposed privacy-preserving data mining technique is providing the service for controlling security and privacy at the data owner’s end. B. Methodology The proposed system is described in this section; figure 2.1, contains the phases of data processing using the proposed privacy preserving data mining technique. Fig.2.1 Proposed System According to the given diagram 2.1, the proposed system is divided into three modules. The client selects their data at their own end and then connects to the server when the connection is established the user key is obtained by the client. The client is usages that key and produces the cipher text for the data. The server accepts the connection, collect the data, the process using the apriori algorithm generate rules. And finally, at the client end, the rules are extracted and recovered using the decryption process. The details of the proposed modules for privacy-preserving data modelling are described as: No more than 3 levels of headings should be used.All headings must be in 10pt font.Every word
  • 3. International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 6, Nov-Dec 2019 Available at www.ijsred.com ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 614 in a heading must be capitalized except for short minor words as listed in Section III-B. 1) Client End P:The client end process is simulated to the figure 2.2, The model contains the required steps of data processing and their relationship among the server and client. Fig. 2.2 Client End Process Input dataset: all the concerned parties who want to combine their data with other parties confidentially and mine the data for concluding the decision rules. In this context, the user selects the part of their own data for sharing with the trusted server. The selected data is first read by the system and then the next processes are initiated. Connect to server: the entire process is a client-server data management system therefore the processed data from the client end is needed to be forward at the server end. Therefore first need to establish connectivity from the server thus client creates a request to the server for accepting the connection and data. As the connectivity established the next process of encryption is taken place. Encrypt data: the encryption is a technique which is used for securing the confidential data. That is a low cost and low maintenance technique for offering security and privacy over data. That transforms data from readable format to unreadable format. In this work, a Homomorphic algorithm namely Paillier algorithm is applied for preserving data confidentiality and privacy. Transmit to server: the encrypted data attributes are reorganized into a file and transmitted to the server, where the server combines the obtained data from different parties are preparing a combined data set for processing. 2) Server End Process:The server side process of system is demonstrated in figure 3.1, which provide the flow of steps which are involved for processing the data. Fig. 3 Server End Process Accept connection: the system is prepared to work in a multiple party environment therefore more than one client can connect with the server, when a data contributor is connected the server help to establish a connection. During this, the server system generates a unique ID for the connected party and sends the acknowledgment for the connection. Accept data: after connection establishment, the client is able to communicate the data. The data is secured previously when they make a request for connection. After encryption of data, the server accepts the data from all the parties. Re-produce dataset: the accepted data from all the data sources are combined together according to the available class labels and other parties’ data. This process of combining all party data is termed here as the reproduction of the dataset. Apriori algorithm: in literature different kinds of techniques available for mining the association rules. Among them, the apriori algorithm is much popular for association rule mining. The proposed technique here applies the apriori algorithm for
  • 4. International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 6, Nov-Dec 2019 Available at www.ijsred.com ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 615 mining association rules. The apriori algorithm is explained in the previous chapter. The classical format of the apriori algorithm is used in this experimentation. Rule generation: the computed frequent patterns are used in this phase for generating association rules. These rules are used for classification and prediction purposes. Rule distribution: the generated rules are available at the client end and can be used by different parties. Therefore the server opens their connections for all the concerned parties to extract the rules from their own end. 3) Client End Decision Recovery:The extracted rules from the server are distributed equally to all the connected data parties. These rules are used with the decryption process for recovering the contributed part of data and decisions. The encrypted part of the information is recovered due to the cryptographic algorithm by the target party. But the parties can only view the part of the decision variable which are contributed by own. C. Proposed Algorithm The algorithm is basic steps that are used for processing the data and generating the security and privacy-preserving rules. Thus two different activities using the algorithms are described in tables 2.1 and 2.2 First here for the server system and second is used for client end. Table 2.1 Proposed Algorithm Input: accepted dataset D Output: generated association rules Process: 1. ( ) a. . () b. . ( ) c. = ( ) d. . ( ) 2. 3. = . ! ( ) 4. Return Table 2.2 Proposed Algorithm for Client Input: data set D Output: recovered rule Process: 1. " () 2. " () 3. = ( ) 4. = # $ ℎ . & ' ( ) 5. " ( ) 6. ( ( ) 7. ( == ) ) a. = ! b. = ' ! ( ) 8. 9. Return III. RESULTS ANALYSIS This chapter provides the performance evaluation of the proposed privacy-preserving association rule mining technique. Therefore, two key parameters are focused on evaluation namely time requirements and memory usages. Both the performance factors are reported in this chapter. A. Time Requirements The time requirements of an algorithm are also known as the time complexity for algorithms. In this work for processing the input dataset and obtaining the association rules time requirements are measured. That is computed using the following Eq. *! = + ℎ −
  • 5. International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 6, Nov-Dec 2019 Available at www.ijsred.com ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 616 Fig. 3.1 Server End Process The time requirement of the proposed privacy-preserving association rule mining technique using secure Paillier’s algorithm is reported in table 3.1, additionally, their line graph representation is given in figure 3.1. In order to provide a line graph, the X-axis contains the number of attributes used for rule mining and the corresponding consumed time is notified on Y-axis. The time requirements of the algorithm are given here in terms of milliseconds. According to observed results as the number of time requirements, is increased when the number of attributes for processing and the number of transactions for processing is increased Fig. 3.2Memory Usages Table 3.1 Time Requirement Number of Attributes Time in milliseconds (MS) 4 46 6 83 8 132 10 175 12 197 14 224 16 269 Table 3.2 Memory Requirement Number of attributes Memory Usages kilobytes (KB) 4 14284 6 14826 8 15372 10 15778 12 16031 14 16594 16 17082 The obtained results for the proposed privacy-preserving association rule mining technique is provided using table 3.2 additionally that is visually represented in a line graph as given in figure 3.2. The X-axis of the line graph prepared on the basis of the number of attributes involved in association rule mining and the Y-axis shows the corresponding measured main memory usages. The measurement of main memory utilization is given here in terms of kilobytes (KB). According to the developed results, the association rule mining space requirements are increases with the number of attributes and number of transactions. 0 50 100 150 200 250 300 4 6 8 10 12 14 16 TimeinMS Number of Attributes Time in milliseconds (MS) 12500 13000 13500 14000 14500 15000 15500 16000 16500 17000 17500 4 6 8 10 12 14 16 MemoryinKB Number of Attributes Memory Usages kilobytes (KB)
  • 6. International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 6, Nov-Dec 2019 Available at www.ijsred.com ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 617 IV. CONCLUSION The implemented system for the privacy-preserving association rule mining is accomplished successfully. That offers security at the client end by using Homomorphic encryption; in addition to that server-side there is no probability to be data leak due to association rule mining is processed over the encrypted data. Therefore the proposed technique is fully secure and trusted. A. Future Work The aim of the proposed work is to understand the privacy- preserving data mining technique for discovering the association rules. In this context, the model is developed and evaluated successfully. In the near future, the following work is proposed for designing a new and enhanced system. 1. The work is aimed for multiparty based decision rule mining which increases the amount of data dimensions significantly, therefore need to handle the data dimensions, 2. The association rules are accurate for prediction and classification but it is computationally expensive therefore need to explore more rule mining techniques for improving the resource complexity. REFERENCES [1] D. A. Adeniyi, Z. Wei, Y. Yongquan, “Automated web usage data mining and recommendation system using K-Nearest Neighbor (KNN) classification method”, Applied Computing and Informatics (2016) 12, 90–108 [2] R. Mendes, J. P. Vilela, “Privacy-Preserving Data Mining: Methods, Metrics, and Applications”, Vol. 5, 2017, 2169-3536, 2017 IEEE [3] M. V. Ahluwalia, A. Gangopadhyay, Z. Chen, Y. Yesha, “Target- Based, Privacy Preserving, and Incremental Association Rule Mining”, IEEE Transaction on Services Computing, DOI 10.1109/TSC.2015.2484318, IEEE [4] “Chapter 3: Data Mining: an Overview” [5] M. J. Zaki, W. MeiraJr, “Data Mining and Analysis Fundamental Concepts and Algorithms”, Cambridge University Press Hardback, 2014 [Book] [6] M. Goebel, L. Gruenwald, “A Survey of Data Mining and Knowledge Discovery Software Tools”, ACM, 1999 [7] N. adhabPadhy, Dr. P. Mishra, “The Survey of Data Mining Applications and Feature Scope”, International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), PP. 43- 58 Vol.2, No.3, June 2012. [8] N. Sundaravaradan, M. Marwah, A. Shah, N. Ramakrishnan, "Data mining approaches for life cycle assessment", In Sustainable Systems and Technology (ISSST), 2011 IEEE International Symposium on, pp. 1-6. IEEE, 2011. [9] F. Gorunescu, “Data Mining: Concepts, Models, and Techniques”, Springer, 2011. [10] Zhao, Yijun. "Data mining techniques." (2015). [11] “Data Mining Tutorial: Process, Techniques, Tools & Examples” [12] M. Tiwari, R. Singh, S. K. Singh, “Association–Rule Mining Techniques: A general survey and empirical comparative evaluation”, International Journal of Advanced Research in Computer and Communication Engineering, Vol. 1, Issue 10, Dec. 2012 [13] A. Mittal, A. Nagar, K. Gupta, R. Nahar, “Comparative Study of Various Frequent Pattern Mining Algorithms”, International Journal of Advanced Research in Computer and Communication Engineering Vol. 4, Issue 4, April 2015 [14] “Laboratory Module 8: Mining Frequent Itemsets – Apriori Algorithm”, available online at: http://software.ucv.ro/~cmihaescu/ro/teaching/AIR/docs/Lab8- Apriori.pdf [15] F. Armknecht, "A Guide to Fully Homomorphic Encryption", IACR Cryptology ePrint Archive 2015 (2015): 1192. [16] J. Sen, "Homomorphic encryption: theory & applications",arXiv preprint arXiv: 1305.5886 (2013).