SlideShare a Scribd company logo
1 of 31
SECURE MINING OF RULES
IN HORIZONTLLY
DISTRIBUTED DATABASE
BY Mr. BAMANE VINAY VISHNU
UNDER THE GUIDANCE OF Prof. VIPUL BAG
Outline
 Introduction
 Literature Survey
 Problem Statement
 Necessity of Proposed System
 Proposed System
 Detail Design
 Implementation
 Conclusion and Future Scope
2
Introduction
Secure mining of association rules in Horizontally Distributed databases
 Fast Distributed Mining (FDM) algorithm unsecured distributed version of the Apriori
algorithm.
 Two novel secure multi-party algorithms
1. The union of private subsets that each of the interacting players hold.
2. The inclusion of an element held by one player in a subset held by another.
 Simpler and is significantly more efficient in terms of communication rounds,
communication cost and computational costs.
3
Literature Survey
 Secure Mining of Association Rules in Horizontally Distribute Databases.
 Privacy-Preserving Distributed Mining of Association Rules on Horizontally Partitioned
Data
4
5
1. Databases that share the same schema but hold information on different entities.
2. Distributed association rule mining techniques can discover association rules
among multiple sites.
3. Each site faced problem of communication and computation overhead.
4. When computing global frequent item sets as number of sites increases overhead
also increases.
Secure Mining of Association Rules in Horizontally
Distribute Databases
Privacy-Preserving Distributed Mining of Association
Rules on Horizontally Partitioned Data
 Encryption technology to minimize the sharing of information.
 Privacy concerns may prevent the parties from directly sharing the data.
 Secure multi party computation protocol, holds frequent item sets globally.
6
Problem Statement
 It is a difficult task to securely mining association rules from horizontal distributed
database.
 In case need of efficient algorithms for mining frequent item sets are crucial for
mining association rules.
 The challenge found in frequent item sets mining is a large number of result
patterns are generated.
7
Necessity of Proposed System
 There is a need to optimize the process of finding patterns.
• Which should detect the important patterns and generate association rules in distributed
database.
 There is also need of a preserving privacy of transaction database
• Because data processed among databases in some business environments.
 Distributed among several sites, but none of the sites is allowed to expose its database
to another.
8
Proposed System
 The application is designed in such a way which secure mining of association rules
in distributed database and also protecting the data records.
 The application monitors during the time number of site should be able to learn
contents of transactions at any other site and also maintain security and data
efficiency.
9
Modules Design
 User Module.
 Admin Module.
 Privacy Preserving Data Mining.
 Distributed Computation.
10
User Module
 Privacy preserving data mining has considered two related settings
• The data owner and the data miner are two different entities.
• Data is distributed among several parties who aim to jointly perform data mining.
 In the first setting, the goal is to protect the data records from the data miner.
• General trends in the data, without revealing original record information.
 In the second setting the goal is to perform data mining
• While protecting the data records of each of the data owners from the other data owners.
11
User Module
12
 Home
 Fund Transfer
 Add Third Party
 Transitions
User Module
13
 Home
 Fund Transfer
 Add Third Party
 Transitions
User Module
14
 Home
 Fund Transfer
 Add Third Party
 Transitions
User Module
15
 Home
 Fund Transfer
 Add Third Party
 Transitions
Admin Module
 View user details
 The item set based on the user processing details using association role
with Apriori algorithm.
16
Admin Module
17
 Home
 Register
 Amount
 Verify Third party
 Transitions
Admin Module
18
 Home
 Register
 Amount
 Verify Third party
 Transitions
Admin SBI
19
 Home
 Register
 Amount
 Verify Third party
 Transitions
Admin IDBI
20
 Home
 Register
 Amount
 Verify Third party
 Transitions
Admin HDFC
21
 Home
 Register
 Amount
 Verify Third party
 Transitions
Privacy Preserving Data Mining
 The data owner and the data miner are two
different entities
• To protect the data records from the data
miner.
• The data owner aims at anonym zing the data
prior to its release.
• Perform data mining while protecting the data
records of each of the data owners from the
other data owners.
22
Privacy Preserving Data Mining
23
Distributed Computation
24
 The two implementations with respect to
three measures:
1) Total computation time of the complete
protocols . The Apriori computation time, and
the time to identify the globally s-frequent item
sets.
2) Total computation time of the unification
protocols all players.
3) Total message size. • N — the number of
transactions in the unified database.
Detail Design
 Activity Diagram
 Sequence Diagram
25
Activity Diagram
26
Sequence Diagram
27
Fig. Sequence Diagram Admin
Sequence Diagram
28
Fig. Sequence Diagram User
Conclusion and Future Work
 As the algorithm generate strong association rules from different data sets
spread over various sites and also preserving privacy of data.
 This application can be used for Business Analysis in Banking Sector.
 The research can be also extended association rules from different area
like stock market, college, school and medical datasets.
29
Publications
 Secure Extraction Of Association Rules In Parallel Disseminated Data
Paper ID – IJCSN-2016-5-5-111
30
31
THANK YOU…THANK YOU…

More Related Content

Similar to Vinay bamane (20)

Bi4201403406
Bi4201403406Bi4201403406
Bi4201403406
 
Pp1t
Pp1tPp1t
Pp1t
 
Pp1t
Pp1tPp1t
Pp1t
 
Ppt1 130410095050-phpapp01
Ppt1 130410095050-phpapp01Ppt1 130410095050-phpapp01
Ppt1 130410095050-phpapp01
 
Pp1t
Pp1tPp1t
Pp1t
 
Pp1t
Pp1tPp1t
Pp1t
 
Ppt1 130410095050-phpapp01
Ppt1 130410095050-phpapp01Ppt1 130410095050-phpapp01
Ppt1 130410095050-phpapp01
 
Pp1t
Pp1tPp1t
Pp1t
 
Ppt1 130410095050-phpapp01
Ppt1 130410095050-phpapp01Ppt1 130410095050-phpapp01
Ppt1 130410095050-phpapp01
 
Ppt1 130410095050-phpapp01
Ppt1 130410095050-phpapp01Ppt1 130410095050-phpapp01
Ppt1 130410095050-phpapp01
 
Pp1t
Pp1tPp1t
Pp1t
 
82ugszwcqn29itkwai2q 140424034504-phpapp01
82ugszwcqn29itkwai2q 140424034504-phpapp0182ugszwcqn29itkwai2q 140424034504-phpapp01
82ugszwcqn29itkwai2q 140424034504-phpapp01
 
Pp1t
Pp1tPp1t
Pp1t
 
Pp1t
Pp1tPp1t
Pp1t
 
Pp1t
Pp1tPp1t
Pp1t
 
82ugszwcqn29itkwai2q 140424034504-phpapp01
82ugszwcqn29itkwai2q 140424034504-phpapp0182ugszwcqn29itkwai2q 140424034504-phpapp01
82ugszwcqn29itkwai2q 140424034504-phpapp01
 
Pp1t
Pp1tPp1t
Pp1t
 
Pp1t
Pp1tPp1t
Pp1t
 
Big Data in Distributed Analytics,Cybersecurity And Digital Forensics
Big Data in Distributed Analytics,Cybersecurity And Digital ForensicsBig Data in Distributed Analytics,Cybersecurity And Digital Forensics
Big Data in Distributed Analytics,Cybersecurity And Digital Forensics
 
Ppt 1
Ppt 1Ppt 1
Ppt 1
 

Recently uploaded

ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfkalichargn70th171
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfPower Karaoke
 
XpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsXpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsMehedi Hasan Shohan
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
buds n tech IT solutions
buds n  tech IT                solutionsbuds n  tech IT                solutions
buds n tech IT solutionsmonugehlot87
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 

Recently uploaded (20)

Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdf
 
XpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsXpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software Solutions
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
buds n tech IT solutions
buds n  tech IT                solutionsbuds n  tech IT                solutions
buds n tech IT solutions
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 

Vinay bamane

  • 1. SECURE MINING OF RULES IN HORIZONTLLY DISTRIBUTED DATABASE BY Mr. BAMANE VINAY VISHNU UNDER THE GUIDANCE OF Prof. VIPUL BAG
  • 2. Outline  Introduction  Literature Survey  Problem Statement  Necessity of Proposed System  Proposed System  Detail Design  Implementation  Conclusion and Future Scope 2
  • 3. Introduction Secure mining of association rules in Horizontally Distributed databases  Fast Distributed Mining (FDM) algorithm unsecured distributed version of the Apriori algorithm.  Two novel secure multi-party algorithms 1. The union of private subsets that each of the interacting players hold. 2. The inclusion of an element held by one player in a subset held by another.  Simpler and is significantly more efficient in terms of communication rounds, communication cost and computational costs. 3
  • 4. Literature Survey  Secure Mining of Association Rules in Horizontally Distribute Databases.  Privacy-Preserving Distributed Mining of Association Rules on Horizontally Partitioned Data 4
  • 5. 5 1. Databases that share the same schema but hold information on different entities. 2. Distributed association rule mining techniques can discover association rules among multiple sites. 3. Each site faced problem of communication and computation overhead. 4. When computing global frequent item sets as number of sites increases overhead also increases. Secure Mining of Association Rules in Horizontally Distribute Databases
  • 6. Privacy-Preserving Distributed Mining of Association Rules on Horizontally Partitioned Data  Encryption technology to minimize the sharing of information.  Privacy concerns may prevent the parties from directly sharing the data.  Secure multi party computation protocol, holds frequent item sets globally. 6
  • 7. Problem Statement  It is a difficult task to securely mining association rules from horizontal distributed database.  In case need of efficient algorithms for mining frequent item sets are crucial for mining association rules.  The challenge found in frequent item sets mining is a large number of result patterns are generated. 7
  • 8. Necessity of Proposed System  There is a need to optimize the process of finding patterns. • Which should detect the important patterns and generate association rules in distributed database.  There is also need of a preserving privacy of transaction database • Because data processed among databases in some business environments.  Distributed among several sites, but none of the sites is allowed to expose its database to another. 8
  • 9. Proposed System  The application is designed in such a way which secure mining of association rules in distributed database and also protecting the data records.  The application monitors during the time number of site should be able to learn contents of transactions at any other site and also maintain security and data efficiency. 9
  • 10. Modules Design  User Module.  Admin Module.  Privacy Preserving Data Mining.  Distributed Computation. 10
  • 11. User Module  Privacy preserving data mining has considered two related settings • The data owner and the data miner are two different entities. • Data is distributed among several parties who aim to jointly perform data mining.  In the first setting, the goal is to protect the data records from the data miner. • General trends in the data, without revealing original record information.  In the second setting the goal is to perform data mining • While protecting the data records of each of the data owners from the other data owners. 11
  • 12. User Module 12  Home  Fund Transfer  Add Third Party  Transitions
  • 13. User Module 13  Home  Fund Transfer  Add Third Party  Transitions
  • 14. User Module 14  Home  Fund Transfer  Add Third Party  Transitions
  • 15. User Module 15  Home  Fund Transfer  Add Third Party  Transitions
  • 16. Admin Module  View user details  The item set based on the user processing details using association role with Apriori algorithm. 16
  • 17. Admin Module 17  Home  Register  Amount  Verify Third party  Transitions
  • 18. Admin Module 18  Home  Register  Amount  Verify Third party  Transitions
  • 19. Admin SBI 19  Home  Register  Amount  Verify Third party  Transitions
  • 20. Admin IDBI 20  Home  Register  Amount  Verify Third party  Transitions
  • 21. Admin HDFC 21  Home  Register  Amount  Verify Third party  Transitions
  • 22. Privacy Preserving Data Mining  The data owner and the data miner are two different entities • To protect the data records from the data miner. • The data owner aims at anonym zing the data prior to its release. • Perform data mining while protecting the data records of each of the data owners from the other data owners. 22
  • 24. Distributed Computation 24  The two implementations with respect to three measures: 1) Total computation time of the complete protocols . The Apriori computation time, and the time to identify the globally s-frequent item sets. 2) Total computation time of the unification protocols all players. 3) Total message size. • N — the number of transactions in the unified database.
  • 25. Detail Design  Activity Diagram  Sequence Diagram 25
  • 29. Conclusion and Future Work  As the algorithm generate strong association rules from different data sets spread over various sites and also preserving privacy of data.  This application can be used for Business Analysis in Banking Sector.  The research can be also extended association rules from different area like stock market, college, school and medical datasets. 29
  • 30. Publications  Secure Extraction Of Association Rules In Parallel Disseminated Data Paper ID – IJCSN-2016-5-5-111 30