SlideShare a Scribd company logo
1 of 5
Download to read offline
Advanced Computing: An International Journal ( ACIJ ), Vol.4, No.2, March 2013
DOI : 10.5121/acij.2013.4201 1
SYMMETRIC-KEY BASED PRIVACY-
PRESERVING SCHEME FOR MINING
SUPPORT COUNTS
Yu Li1
and Sheng Zhong
1
Department of Computer Science and Engineering, University at Buffalo, NY, USA
yli32@buffalo.edu
ABSTRACT
In this paper we study the problem of mining support counts using symmetric-key crypto which is more
efficient than previous work. Consider a scenario that each user has an option (like or unlike) of the
specified product, and a third party wants to obtain the popularity of this product. We design a much more
efficient privacy-preserving scheme for users to prevent the loss of the personal interests. Unlike most
previous works, we do not use any exponential or modular algorithms, but we provide a symmetric-key
based method which can also protect the information. Specifically, our protocol uses a third party that
generates a number of matrixes as each user’s key. Then user uses these key to encrypt their data which is
more efficient to obtain the support counts of a given pattern.
KEYWORDS
Privacy-Preserving, Symmetric-key encryption, Support Counts
1. INTRODUCTION
With the rapid development of information technology, personal data should be protected in order
to respect the people's private information and prevent the inappropriate usage. Most Internet
users will be asked to provide an opinion that whether they support some pattern or not, then a
data miner can count the number of this support. However, some websites collect, store and share
these personal private data in order to benefit themselves despite users' desire. Privacy-preserving
data mining has received a lot of attention in the past few years. This kind problem can be mainly
divided into two categories: (a) the data is divided among more than one different party and the
privacy preserving method needs to protect each party's private data; (b) the data is to be
published for research, but due to its sensitivity the data should be modified [1].
A lot of typical privacy-preserving data mining problems include the scenario that mentioned
above belongs to the first category. This kind of privacy-preserving data mining problem is called
secure multiparty computation [1]. That means different party wants to jointly compute the
correct result without revealing any private data. The most common way to provide privacy-
preserving method is using cryptographic technology. Huge amounts of research have been
investigated in this field after [2] provided an elegant privacy preserving data mining method
using cryptographic tools.
Advanced Computing: An International Journal ( ACIJ ), Vol.4, No.2, March 2013
2
In this paper, we propose a symmetric-key crypto based privacy-preserving scheme for mining
support counts using symmetric-key encryption. Our scheme is more efficient than previous work
[3]. The rest of this paper is organized as follows. Section II describes the related work. We
introduce in symmetric-key cryptosystem and block cipher in Section III. In Section IV, we
describe our symmetric-key based privacy preserving support counts protocol and analyse our
correctness of our protocol. Section V gives the discussion of work. Last, Section VI gives the
conclusion of this paper.
2. RELATED WORK
Providing privacy-preserving for Internet data is a longstanding goal of the computer research
community. It is has received considerable attention with the development of data mining and
network technology. Cryptograph based privacy-preserving method can provide a better
guarantee of the privacy when different institute want to cooperate in a common goal. In [4], Lea
Kissner and Dawn Song propose efficient techniques for privacy-preserving operations on
multisets using cryptosystem. In [5], the authors proposed a security protocol for the IVC
applications based on group signature and ID-based signature schemes. In [3] the authors propose
an identity-based protocol for support count that preserves privacy using public key cryptosystem.
Different from the above reported schemes, we propose a symmetric-key based privacy-
preserving protocol, which cannot only guarantee the requirements of security and privacy but
can also provide a very good efficiency. Furthermore, the protocol and infrastructure are easy to
be implemented. Thus, the proposed protocol can practically be launched for enabling the
application of Internet website.
3. TECHNICAL PRELIMINARIES
In this section, we give a brief review of symmetric-key cryptosystem and block cipher that used
in our privacy-preserving scheme for mining support counts.
3.1. Symmetric-key Cryptosystem
A cryptosystem [6] can be defined as a tuple . The denotations are shown in
table 1. The cryptosystem must be efficient and must be sufficiently random so that it is hard to
guess. The encryption and decryption process must be efficient. We
must have . We have a symmetric-key cryptosystem when encryption key is
same with decryption key which means .Without the decryption key, there is no efficient
algorithm that can decrypt ciphertexts. There are two requirements for a symmetric cryptosystem.
The first one is that it is impractical to get a plaintext only known the ciphertext and encryption
scheme. Another one is that all users must obtain the key in a safe way and keep their keys
secure.
Table 1. Denotations of Cryptosystem
Summary of Denotations
M: cleartext space
C: ciphertext space
K: key space
G: key generating algorithm
E: encryption algorithm
D: decryption algorithm
G: generate a pair of encryption/decryption keys for a given length
Advanced Computing: An International Journal ( ACIJ ), Vol.4, No.2, March 2013
3
3.2. Blockcipher
A block cipher [7] is a function . There are two inputs in this
algorithm. The first input is the key whose length is . The second input is the plaintext whose
length is , and the output is the ciphertext whose length is same as the length of plaintext. The
length of the key and the length of the block are parameters associated to the blockcipher.
When using block cipher, a random key is assigned and kept secret between users. The function
is then used by a user to process data before she sends it to other user. Typically, we will
assume the adversary will be able to obtain some input-output examples for which are pairs of
where . But the adversary will not be shown the key because the security
relies on the secrecy of the key. So the goal of the adversary is recovering the key by given some
input-output examples of . However, a good blockcipher scheme should be designed to make
this task computationally difficult.
4. SYMMETRIC-KEY CRYPTO BASED SUPPORT COUNT PROTOCOL
In this section, we go into the detail of our symmetric-key crypto based support counts mining
protocol and prove its correctness.
4.1. Protocol
In our symmetric-key crypto based support count protocol, we use a third party key-generator.
First, let the generator generate two matrixes. The dimensions are based on the number of users.
Assume there are users in total, the dimension of the two matrixes should be . Then the
generator fills the first matrix with random numbers. After that, generator fills the second matrix
with the negative values of first one. Note that the filling order of the second matrix should be
permuted. Then we define the symmetric-key for each user as the row of and
column of .
Then each user performs our protocol shown in algorithm 1.
Algorithm 1 Symmetric-key based privacy preserving scheme
Initialize
Step 1
User 1 will be asked whether he support one given pattern or not. Define support as 1
and not support as 0. Then he uses the two keys distributed to him to encrypt his answer. He
will get the value of and sends the value to User 2.
Step 2
For each user , User receives User computes
and sends it to user
Step 3
User receives . User adds to the received
number, and sends the results to all other parties.
Step 4
Each user uses the block cipher to update their keys.
Advanced Computing: An International Journal ( ACIJ ), Vol.4, No.2, March 2013
4
Here, we specify that how to update user 's keys using blockcipher in step 4. Since is the
sum of elements in row in matrix which is . Therefore we use
algorithm 2 to update the .
Algorithm 2 Keys updating algorithm
Initialize
Step 1
Each user will be assigned a blockcipher as well as a key during the
initialization stage.
Step 2
Using blockcipher method, we define a function which makes
Step 3
User uses the same method to update the second key . First the user converts the
value of to absolute value. Then make them as negative after update the value use step 2.
Step 4
After mining rounds, the server reassigns another and to each user.
In keys updating process, blockcipher and key are chosen randomly by third party key-
generator and make known to all users. In order to enhance the security level of our protocol, we
let the generator create a new blockcipher and key and send them to all users after
rounds of support counts mining.
Unlike most previous works, we do not use any exponential or modular algorithms, we provide a
symmetric-key based method which can also protect the information and the execution time is
faster than public-key based algorithm. Since in modern network service, the number of user can
be as large as millions. Therefore the efficiency is most essential when designing of the privacy-
preserving algorithm.
4.2. Correctness
In this section, we prove the correctness of our symmetric-key crypto based support counts
mining protocol.
Theorem 1. Our symmetric-key crypto based support counts mining protocol correctly computes
the sum of all users' outputs.
Proof. Now, we prove that the user can obtain the final result by following our protocol.
Since we have
Therefor we can get
It is proved that .
Advanced Computing: An International Journal ( ACIJ ), Vol.4, No.2, March 2013
5
5. DISCUSSION
Our proposed symmetric-key crypto based protocol for mining support counts has the following
characteristics.
It preserves the data privacy for each user without revealing it to others in the process of mining
support counts. Our privacy-preserving protocol is accurate which means the result obtained by
our protocol is the same as those obtained by having all data collected without privacy-
preserving.
We are utilizing a symmetric-key based method in our models. The protocol is much more
efficient compared with public-key based approached. An existing work [3] in mining support
counts proposed the privacy-preserving was based on public-key based approach. Different from
their protocol, we focus on another cryptographic method---symmetric-key cryptosystem.
Furthermore, our protocol is more efficient than previous work.
6. CONCLUSION
In this paper, we proposed a symmetric-key crypto based privacy preserving protocol for mining
support counts, in order to obtain the result without revealing users' personal private information.
We provided a very efficient method based on symmetric-key cryptosystem and cipher block to
encrypt each user's data and proved the correctness of our protocol.
REFERENCES
[1] Y. Lindell & B. Pinkas, (2009) Secure multiparty computation for privacy-preserving data mining.
Journal of Privacy and Confidentiality, Vol. 1, No.1, pp5.
[2] Y. Lindell & B. Pinkas , (2000) Privacy preserving data mining. In Advances in Cryptology
CRYPTO, Springer, pp36-54.
[3] F.Wu, J. Liu & S. Zhong. (2009) An efficient protocol for private and accurate mining of support
counts. Pattern Recognition Letters, Vol. 30, No.1, pp80-86.
[4] L.Kissner & D.Song. (2005) Privacy-preserving set operations. In Advances in Cryptology
CRYPTO, Springer, pp241-257.
[5] X.Lin, X.Sun, P.H. Ho & X.Shen. (2007) Gsis: a secure and privacy-preserving protocol for vehicular
communications. Transactions on Vehicular Technology, IEEE, Vol. 56, No.6, pp3442-3456.
[6] H.Delfs & H.Knebl. (2007) Symmetric-key encryption. Introduction to Cryptography, Springer ,
pp11-31.
[7] T.W. Cusick & P.Stanica. (2009) Cryptographic Boolean functions and applications. Academic Press.

More Related Content

What's hot

Survey of Security Threats and Protection Techniques in Mobile Ad Hoc Networks
Survey of Security Threats and Protection Techniques in Mobile Ad Hoc NetworksSurvey of Security Threats and Protection Techniques in Mobile Ad Hoc Networks
Survey of Security Threats and Protection Techniques in Mobile Ad Hoc Networksdrsrinivasanvenkataramani
 
Iaetsd a survey on cloud storage security with
Iaetsd a survey on cloud storage security withIaetsd a survey on cloud storage security with
Iaetsd a survey on cloud storage security withIaetsd Iaetsd
 
Highly secure scalable compression of encrypted images
Highly secure scalable compression of encrypted imagesHighly secure scalable compression of encrypted images
Highly secure scalable compression of encrypted imageseSAT Journals
 
Vtu network security(10 ec832) unit 3 notes.
Vtu network security(10 ec832) unit 3 notes.Vtu network security(10 ec832) unit 3 notes.
Vtu network security(10 ec832) unit 3 notes.Jayanth Dwijesh H P
 
Security analysis of fbdk block cipher for digital images
Security analysis of fbdk block cipher for digital imagesSecurity analysis of fbdk block cipher for digital images
Security analysis of fbdk block cipher for digital imageseSAT Journals
 
ijircee_Template
ijircee_Templateijircee_Template
ijircee_Templateijircee
 
Image Cryptography using RSA Algorithm
Image Cryptography using RSA AlgorithmImage Cryptography using RSA Algorithm
Image Cryptography using RSA Algorithmijtsrd
 
Review on key predistribution schemes in wireless sensor networks
Review on key predistribution schemes in wireless sensor networksReview on key predistribution schemes in wireless sensor networks
Review on key predistribution schemes in wireless sensor networksijassn
 
IRJET- Comparative Analysis of Encryption Techniques
IRJET-  	  Comparative Analysis of Encryption TechniquesIRJET-  	  Comparative Analysis of Encryption Techniques
IRJET- Comparative Analysis of Encryption TechniquesIRJET Journal
 
MAJOR PROJECT FORMAT--2013(new 1)
MAJOR PROJECT FORMAT--2013(new 1)MAJOR PROJECT FORMAT--2013(new 1)
MAJOR PROJECT FORMAT--2013(new 1)Neelabja Manna
 
Secure E-voting System by Utilizing Homomorphic Properties of the Encryption ...
Secure E-voting System by Utilizing Homomorphic Properties of the Encryption ...Secure E-voting System by Utilizing Homomorphic Properties of the Encryption ...
Secure E-voting System by Utilizing Homomorphic Properties of the Encryption ...TELKOMNIKA JOURNAL
 
Securing Mobile Data using Cryptography
Securing Mobile Data using CryptographySecuring Mobile Data using Cryptography
Securing Mobile Data using CryptographyEswar Publications
 
TWO PHASE CLANDESTAIN IMAGE ENCRYPTION
TWO PHASE CLANDESTAIN IMAGE ENCRYPTION TWO PHASE CLANDESTAIN IMAGE ENCRYPTION
TWO PHASE CLANDESTAIN IMAGE ENCRYPTION acijjournal
 
IRJET- Data Transmission using RSA Algorithm
IRJET-  	  Data Transmission using RSA AlgorithmIRJET-  	  Data Transmission using RSA Algorithm
IRJET- Data Transmission using RSA AlgorithmIRJET Journal
 
Unit 1 Introducation
Unit 1 IntroducationUnit 1 Introducation
Unit 1 IntroducationTushar Rajput
 

What's hot (19)

Survey of Security Threats and Protection Techniques in Mobile Ad Hoc Networks
Survey of Security Threats and Protection Techniques in Mobile Ad Hoc NetworksSurvey of Security Threats and Protection Techniques in Mobile Ad Hoc Networks
Survey of Security Threats and Protection Techniques in Mobile Ad Hoc Networks
 
Iaetsd a survey on cloud storage security with
Iaetsd a survey on cloud storage security withIaetsd a survey on cloud storage security with
Iaetsd a survey on cloud storage security with
 
Highly secure scalable compression of encrypted images
Highly secure scalable compression of encrypted imagesHighly secure scalable compression of encrypted images
Highly secure scalable compression of encrypted images
 
G04944851
G04944851G04944851
G04944851
 
Vtu network security(10 ec832) unit 3 notes.
Vtu network security(10 ec832) unit 3 notes.Vtu network security(10 ec832) unit 3 notes.
Vtu network security(10 ec832) unit 3 notes.
 
Security analysis of fbdk block cipher for digital images
Security analysis of fbdk block cipher for digital imagesSecurity analysis of fbdk block cipher for digital images
Security analysis of fbdk block cipher for digital images
 
ijircee_Template
ijircee_Templateijircee_Template
ijircee_Template
 
Image Cryptography using RSA Algorithm
Image Cryptography using RSA AlgorithmImage Cryptography using RSA Algorithm
Image Cryptography using RSA Algorithm
 
Review on key predistribution schemes in wireless sensor networks
Review on key predistribution schemes in wireless sensor networksReview on key predistribution schemes in wireless sensor networks
Review on key predistribution schemes in wireless sensor networks
 
IRJET- Comparative Analysis of Encryption Techniques
IRJET-  	  Comparative Analysis of Encryption TechniquesIRJET-  	  Comparative Analysis of Encryption Techniques
IRJET- Comparative Analysis of Encryption Techniques
 
MAJOR PROJECT FORMAT--2013(new 1)
MAJOR PROJECT FORMAT--2013(new 1)MAJOR PROJECT FORMAT--2013(new 1)
MAJOR PROJECT FORMAT--2013(new 1)
 
call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...
 
82 86
82 8682 86
82 86
 
Secure E-voting System by Utilizing Homomorphic Properties of the Encryption ...
Secure E-voting System by Utilizing Homomorphic Properties of the Encryption ...Secure E-voting System by Utilizing Homomorphic Properties of the Encryption ...
Secure E-voting System by Utilizing Homomorphic Properties of the Encryption ...
 
Securing Mobile Data using Cryptography
Securing Mobile Data using CryptographySecuring Mobile Data using Cryptography
Securing Mobile Data using Cryptography
 
C0281010016
C0281010016C0281010016
C0281010016
 
TWO PHASE CLANDESTAIN IMAGE ENCRYPTION
TWO PHASE CLANDESTAIN IMAGE ENCRYPTION TWO PHASE CLANDESTAIN IMAGE ENCRYPTION
TWO PHASE CLANDESTAIN IMAGE ENCRYPTION
 
IRJET- Data Transmission using RSA Algorithm
IRJET-  	  Data Transmission using RSA AlgorithmIRJET-  	  Data Transmission using RSA Algorithm
IRJET- Data Transmission using RSA Algorithm
 
Unit 1 Introducation
Unit 1 IntroducationUnit 1 Introducation
Unit 1 Introducation
 

Similar to SYMMETRIC-KEY BASED PRIVACYPRESERVING SCHEME FOR MINING SUPPORT COUNTS

Different date block size using to evaluate the performance between different...
Different date block size using to evaluate the performance between different...Different date block size using to evaluate the performance between different...
Different date block size using to evaluate the performance between different...IJCNCJournal
 
Design and Implementation of New Encryption algorithm to Enhance Performance...
Design and Implementation of New Encryption algorithm to  Enhance Performance...Design and Implementation of New Encryption algorithm to  Enhance Performance...
Design and Implementation of New Encryption algorithm to Enhance Performance...IOSR Journals
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...IOSR Journals
 
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...Editor IJCATR
 
httpswww.youtube.comwatchtime_continue=8&v=rFV0aes0vYAN.docx
httpswww.youtube.comwatchtime_continue=8&v=rFV0aes0vYAN.docxhttpswww.youtube.comwatchtime_continue=8&v=rFV0aes0vYAN.docx
httpswww.youtube.comwatchtime_continue=8&v=rFV0aes0vYAN.docxpooleavelina
 
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...Editor IJCATR
 
Data security for any organization by using public key infrastructure compone...
Data security for any organization by using public key infrastructure compone...Data security for any organization by using public key infrastructure compone...
Data security for any organization by using public key infrastructure compone...eSAT Journals
 
Data security for any organization by using public key infrastructure compone...
Data security for any organization by using public key infrastructure compone...Data security for any organization by using public key infrastructure compone...
Data security for any organization by using public key infrastructure compone...eSAT Publishing House
 
IRJET- Cancelable Biometric based Key Generation for Symmetric Cryptography: ...
IRJET- Cancelable Biometric based Key Generation for Symmetric Cryptography: ...IRJET- Cancelable Biometric based Key Generation for Symmetric Cryptography: ...
IRJET- Cancelable Biometric based Key Generation for Symmetric Cryptography: ...IRJET Journal
 
Implementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithmImplementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithmeSAT Publishing House
 
The effect of Encryption algorithms Delay on TCP Traffic over data networks
The effect of Encryption algorithms Delay on TCP Traffic over data networksThe effect of Encryption algorithms Delay on TCP Traffic over data networks
The effect of Encryption algorithms Delay on TCP Traffic over data networksIOSR Journals
 
Improving Cloud Security Using Multi Level Encryption and Authentication
Improving Cloud Security Using Multi Level Encryption and AuthenticationImproving Cloud Security Using Multi Level Encryption and Authentication
Improving Cloud Security Using Multi Level Encryption and AuthenticationAM Publications,India
 
IRJET- A Work Paper on Email Server using 3DES
IRJET-  	  A Work Paper on Email Server using 3DESIRJET-  	  A Work Paper on Email Server using 3DES
IRJET- A Work Paper on Email Server using 3DESIRJET Journal
 
Essay On Cryptography
Essay On CryptographyEssay On Cryptography
Essay On CryptographyHaley Johnson
 

Similar to SYMMETRIC-KEY BASED PRIVACYPRESERVING SCHEME FOR MINING SUPPORT COUNTS (20)

Different date block size using to evaluate the performance between different...
Different date block size using to evaluate the performance between different...Different date block size using to evaluate the performance between different...
Different date block size using to evaluate the performance between different...
 
Design and Implementation of New Encryption algorithm to Enhance Performance...
Design and Implementation of New Encryption algorithm to  Enhance Performance...Design and Implementation of New Encryption algorithm to  Enhance Performance...
Design and Implementation of New Encryption algorithm to Enhance Performance...
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Mj3422172221
Mj3422172221Mj3422172221
Mj3422172221
 
Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...
 
L017136269
L017136269L017136269
L017136269
 
Ijtra150171
Ijtra150171Ijtra150171
Ijtra150171
 
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
 
httpswww.youtube.comwatchtime_continue=8&v=rFV0aes0vYAN.docx
httpswww.youtube.comwatchtime_continue=8&v=rFV0aes0vYAN.docxhttpswww.youtube.comwatchtime_continue=8&v=rFV0aes0vYAN.docx
httpswww.youtube.comwatchtime_continue=8&v=rFV0aes0vYAN.docx
 
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
 
Data security for any organization by using public key infrastructure compone...
Data security for any organization by using public key infrastructure compone...Data security for any organization by using public key infrastructure compone...
Data security for any organization by using public key infrastructure compone...
 
Data security for any organization by using public key infrastructure compone...
Data security for any organization by using public key infrastructure compone...Data security for any organization by using public key infrastructure compone...
Data security for any organization by using public key infrastructure compone...
 
IRJET- Cancelable Biometric based Key Generation for Symmetric Cryptography: ...
IRJET- Cancelable Biometric based Key Generation for Symmetric Cryptography: ...IRJET- Cancelable Biometric based Key Generation for Symmetric Cryptography: ...
IRJET- Cancelable Biometric based Key Generation for Symmetric Cryptography: ...
 
H42063743
H42063743H42063743
H42063743
 
Implementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithmImplementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithm
 
The effect of Encryption algorithms Delay on TCP Traffic over data networks
The effect of Encryption algorithms Delay on TCP Traffic over data networksThe effect of Encryption algorithms Delay on TCP Traffic over data networks
The effect of Encryption algorithms Delay on TCP Traffic over data networks
 
O017128591
O017128591O017128591
O017128591
 
Improving Cloud Security Using Multi Level Encryption and Authentication
Improving Cloud Security Using Multi Level Encryption and AuthenticationImproving Cloud Security Using Multi Level Encryption and Authentication
Improving Cloud Security Using Multi Level Encryption and Authentication
 
IRJET- A Work Paper on Email Server using 3DES
IRJET-  	  A Work Paper on Email Server using 3DESIRJET-  	  A Work Paper on Email Server using 3DES
IRJET- A Work Paper on Email Server using 3DES
 
Essay On Cryptography
Essay On CryptographyEssay On Cryptography
Essay On Cryptography
 

More from acijjournal

Jan_2024_Top_read_articles_in_ACIJ.pdf
Jan_2024_Top_read_articles_in_ACIJ.pdfJan_2024_Top_read_articles_in_ACIJ.pdf
Jan_2024_Top_read_articles_in_ACIJ.pdfacijjournal
 
Call for Papers - Advanced Computing An International Journal (ACIJ) (2).pdf
Call for Papers - Advanced Computing An International Journal (ACIJ) (2).pdfCall for Papers - Advanced Computing An International Journal (ACIJ) (2).pdf
Call for Papers - Advanced Computing An International Journal (ACIJ) (2).pdfacijjournal
 
cs - ACIJ (4) (1).pdf
cs - ACIJ (4) (1).pdfcs - ACIJ (4) (1).pdf
cs - ACIJ (4) (1).pdfacijjournal
 
cs - ACIJ (2).pdf
cs - ACIJ (2).pdfcs - ACIJ (2).pdf
cs - ACIJ (2).pdfacijjournal
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)acijjournal
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)acijjournal
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)acijjournal
 
4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)acijjournal
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)acijjournal
 
3rdInternational Conference on Natural Language Processingand Applications (N...
3rdInternational Conference on Natural Language Processingand Applications (N...3rdInternational Conference on Natural Language Processingand Applications (N...
3rdInternational Conference on Natural Language Processingand Applications (N...acijjournal
 
4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)acijjournal
 
Graduate School Cyber Portfolio: The Innovative Menu For Sustainable Development
Graduate School Cyber Portfolio: The Innovative Menu For Sustainable DevelopmentGraduate School Cyber Portfolio: The Innovative Menu For Sustainable Development
Graduate School Cyber Portfolio: The Innovative Menu For Sustainable Developmentacijjournal
 
Genetic Algorithms and Programming - An Evolutionary Methodology
Genetic Algorithms and Programming - An Evolutionary MethodologyGenetic Algorithms and Programming - An Evolutionary Methodology
Genetic Algorithms and Programming - An Evolutionary Methodologyacijjournal
 
Data Transformation Technique for Protecting Private Information in Privacy P...
Data Transformation Technique for Protecting Private Information in Privacy P...Data Transformation Technique for Protecting Private Information in Privacy P...
Data Transformation Technique for Protecting Private Information in Privacy P...acijjournal
 
Advanced Computing: An International Journal (ACIJ)
Advanced Computing: An International Journal (ACIJ) Advanced Computing: An International Journal (ACIJ)
Advanced Computing: An International Journal (ACIJ) acijjournal
 
E-Maintenance: Impact Over Industrial Processes, Its Dimensions & Principles
E-Maintenance: Impact Over Industrial Processes, Its Dimensions & PrinciplesE-Maintenance: Impact Over Industrial Processes, Its Dimensions & Principles
E-Maintenance: Impact Over Industrial Processes, Its Dimensions & Principlesacijjournal
 
10th International Conference on Software Engineering and Applications (SEAPP...
10th International Conference on Software Engineering and Applications (SEAPP...10th International Conference on Software Engineering and Applications (SEAPP...
10th International Conference on Software Engineering and Applications (SEAPP...acijjournal
 
10th International conference on Parallel, Distributed Computing and Applicat...
10th International conference on Parallel, Distributed Computing and Applicat...10th International conference on Parallel, Distributed Computing and Applicat...
10th International conference on Parallel, Distributed Computing and Applicat...acijjournal
 
DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...
DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...
DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...acijjournal
 
Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...
Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...
Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...acijjournal
 

More from acijjournal (20)

Jan_2024_Top_read_articles_in_ACIJ.pdf
Jan_2024_Top_read_articles_in_ACIJ.pdfJan_2024_Top_read_articles_in_ACIJ.pdf
Jan_2024_Top_read_articles_in_ACIJ.pdf
 
Call for Papers - Advanced Computing An International Journal (ACIJ) (2).pdf
Call for Papers - Advanced Computing An International Journal (ACIJ) (2).pdfCall for Papers - Advanced Computing An International Journal (ACIJ) (2).pdf
Call for Papers - Advanced Computing An International Journal (ACIJ) (2).pdf
 
cs - ACIJ (4) (1).pdf
cs - ACIJ (4) (1).pdfcs - ACIJ (4) (1).pdf
cs - ACIJ (4) (1).pdf
 
cs - ACIJ (2).pdf
cs - ACIJ (2).pdfcs - ACIJ (2).pdf
cs - ACIJ (2).pdf
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
 
4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
 
3rdInternational Conference on Natural Language Processingand Applications (N...
3rdInternational Conference on Natural Language Processingand Applications (N...3rdInternational Conference on Natural Language Processingand Applications (N...
3rdInternational Conference on Natural Language Processingand Applications (N...
 
4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)
 
Graduate School Cyber Portfolio: The Innovative Menu For Sustainable Development
Graduate School Cyber Portfolio: The Innovative Menu For Sustainable DevelopmentGraduate School Cyber Portfolio: The Innovative Menu For Sustainable Development
Graduate School Cyber Portfolio: The Innovative Menu For Sustainable Development
 
Genetic Algorithms and Programming - An Evolutionary Methodology
Genetic Algorithms and Programming - An Evolutionary MethodologyGenetic Algorithms and Programming - An Evolutionary Methodology
Genetic Algorithms and Programming - An Evolutionary Methodology
 
Data Transformation Technique for Protecting Private Information in Privacy P...
Data Transformation Technique for Protecting Private Information in Privacy P...Data Transformation Technique for Protecting Private Information in Privacy P...
Data Transformation Technique for Protecting Private Information in Privacy P...
 
Advanced Computing: An International Journal (ACIJ)
Advanced Computing: An International Journal (ACIJ) Advanced Computing: An International Journal (ACIJ)
Advanced Computing: An International Journal (ACIJ)
 
E-Maintenance: Impact Over Industrial Processes, Its Dimensions & Principles
E-Maintenance: Impact Over Industrial Processes, Its Dimensions & PrinciplesE-Maintenance: Impact Over Industrial Processes, Its Dimensions & Principles
E-Maintenance: Impact Over Industrial Processes, Its Dimensions & Principles
 
10th International Conference on Software Engineering and Applications (SEAPP...
10th International Conference on Software Engineering and Applications (SEAPP...10th International Conference on Software Engineering and Applications (SEAPP...
10th International Conference on Software Engineering and Applications (SEAPP...
 
10th International conference on Parallel, Distributed Computing and Applicat...
10th International conference on Parallel, Distributed Computing and Applicat...10th International conference on Parallel, Distributed Computing and Applicat...
10th International conference on Parallel, Distributed Computing and Applicat...
 
DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...
DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...
DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...
 
Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...
Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...
Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...
 

Recently uploaded

Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 

Recently uploaded (20)

Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 

SYMMETRIC-KEY BASED PRIVACYPRESERVING SCHEME FOR MINING SUPPORT COUNTS

  • 1. Advanced Computing: An International Journal ( ACIJ ), Vol.4, No.2, March 2013 DOI : 10.5121/acij.2013.4201 1 SYMMETRIC-KEY BASED PRIVACY- PRESERVING SCHEME FOR MINING SUPPORT COUNTS Yu Li1 and Sheng Zhong 1 Department of Computer Science and Engineering, University at Buffalo, NY, USA yli32@buffalo.edu ABSTRACT In this paper we study the problem of mining support counts using symmetric-key crypto which is more efficient than previous work. Consider a scenario that each user has an option (like or unlike) of the specified product, and a third party wants to obtain the popularity of this product. We design a much more efficient privacy-preserving scheme for users to prevent the loss of the personal interests. Unlike most previous works, we do not use any exponential or modular algorithms, but we provide a symmetric-key based method which can also protect the information. Specifically, our protocol uses a third party that generates a number of matrixes as each user’s key. Then user uses these key to encrypt their data which is more efficient to obtain the support counts of a given pattern. KEYWORDS Privacy-Preserving, Symmetric-key encryption, Support Counts 1. INTRODUCTION With the rapid development of information technology, personal data should be protected in order to respect the people's private information and prevent the inappropriate usage. Most Internet users will be asked to provide an opinion that whether they support some pattern or not, then a data miner can count the number of this support. However, some websites collect, store and share these personal private data in order to benefit themselves despite users' desire. Privacy-preserving data mining has received a lot of attention in the past few years. This kind problem can be mainly divided into two categories: (a) the data is divided among more than one different party and the privacy preserving method needs to protect each party's private data; (b) the data is to be published for research, but due to its sensitivity the data should be modified [1]. A lot of typical privacy-preserving data mining problems include the scenario that mentioned above belongs to the first category. This kind of privacy-preserving data mining problem is called secure multiparty computation [1]. That means different party wants to jointly compute the correct result without revealing any private data. The most common way to provide privacy- preserving method is using cryptographic technology. Huge amounts of research have been investigated in this field after [2] provided an elegant privacy preserving data mining method using cryptographic tools.
  • 2. Advanced Computing: An International Journal ( ACIJ ), Vol.4, No.2, March 2013 2 In this paper, we propose a symmetric-key crypto based privacy-preserving scheme for mining support counts using symmetric-key encryption. Our scheme is more efficient than previous work [3]. The rest of this paper is organized as follows. Section II describes the related work. We introduce in symmetric-key cryptosystem and block cipher in Section III. In Section IV, we describe our symmetric-key based privacy preserving support counts protocol and analyse our correctness of our protocol. Section V gives the discussion of work. Last, Section VI gives the conclusion of this paper. 2. RELATED WORK Providing privacy-preserving for Internet data is a longstanding goal of the computer research community. It is has received considerable attention with the development of data mining and network technology. Cryptograph based privacy-preserving method can provide a better guarantee of the privacy when different institute want to cooperate in a common goal. In [4], Lea Kissner and Dawn Song propose efficient techniques for privacy-preserving operations on multisets using cryptosystem. In [5], the authors proposed a security protocol for the IVC applications based on group signature and ID-based signature schemes. In [3] the authors propose an identity-based protocol for support count that preserves privacy using public key cryptosystem. Different from the above reported schemes, we propose a symmetric-key based privacy- preserving protocol, which cannot only guarantee the requirements of security and privacy but can also provide a very good efficiency. Furthermore, the protocol and infrastructure are easy to be implemented. Thus, the proposed protocol can practically be launched for enabling the application of Internet website. 3. TECHNICAL PRELIMINARIES In this section, we give a brief review of symmetric-key cryptosystem and block cipher that used in our privacy-preserving scheme for mining support counts. 3.1. Symmetric-key Cryptosystem A cryptosystem [6] can be defined as a tuple . The denotations are shown in table 1. The cryptosystem must be efficient and must be sufficiently random so that it is hard to guess. The encryption and decryption process must be efficient. We must have . We have a symmetric-key cryptosystem when encryption key is same with decryption key which means .Without the decryption key, there is no efficient algorithm that can decrypt ciphertexts. There are two requirements for a symmetric cryptosystem. The first one is that it is impractical to get a plaintext only known the ciphertext and encryption scheme. Another one is that all users must obtain the key in a safe way and keep their keys secure. Table 1. Denotations of Cryptosystem Summary of Denotations M: cleartext space C: ciphertext space K: key space G: key generating algorithm E: encryption algorithm D: decryption algorithm G: generate a pair of encryption/decryption keys for a given length
  • 3. Advanced Computing: An International Journal ( ACIJ ), Vol.4, No.2, March 2013 3 3.2. Blockcipher A block cipher [7] is a function . There are two inputs in this algorithm. The first input is the key whose length is . The second input is the plaintext whose length is , and the output is the ciphertext whose length is same as the length of plaintext. The length of the key and the length of the block are parameters associated to the blockcipher. When using block cipher, a random key is assigned and kept secret between users. The function is then used by a user to process data before she sends it to other user. Typically, we will assume the adversary will be able to obtain some input-output examples for which are pairs of where . But the adversary will not be shown the key because the security relies on the secrecy of the key. So the goal of the adversary is recovering the key by given some input-output examples of . However, a good blockcipher scheme should be designed to make this task computationally difficult. 4. SYMMETRIC-KEY CRYPTO BASED SUPPORT COUNT PROTOCOL In this section, we go into the detail of our symmetric-key crypto based support counts mining protocol and prove its correctness. 4.1. Protocol In our symmetric-key crypto based support count protocol, we use a third party key-generator. First, let the generator generate two matrixes. The dimensions are based on the number of users. Assume there are users in total, the dimension of the two matrixes should be . Then the generator fills the first matrix with random numbers. After that, generator fills the second matrix with the negative values of first one. Note that the filling order of the second matrix should be permuted. Then we define the symmetric-key for each user as the row of and column of . Then each user performs our protocol shown in algorithm 1. Algorithm 1 Symmetric-key based privacy preserving scheme Initialize Step 1 User 1 will be asked whether he support one given pattern or not. Define support as 1 and not support as 0. Then he uses the two keys distributed to him to encrypt his answer. He will get the value of and sends the value to User 2. Step 2 For each user , User receives User computes and sends it to user Step 3 User receives . User adds to the received number, and sends the results to all other parties. Step 4 Each user uses the block cipher to update their keys.
  • 4. Advanced Computing: An International Journal ( ACIJ ), Vol.4, No.2, March 2013 4 Here, we specify that how to update user 's keys using blockcipher in step 4. Since is the sum of elements in row in matrix which is . Therefore we use algorithm 2 to update the . Algorithm 2 Keys updating algorithm Initialize Step 1 Each user will be assigned a blockcipher as well as a key during the initialization stage. Step 2 Using blockcipher method, we define a function which makes Step 3 User uses the same method to update the second key . First the user converts the value of to absolute value. Then make them as negative after update the value use step 2. Step 4 After mining rounds, the server reassigns another and to each user. In keys updating process, blockcipher and key are chosen randomly by third party key- generator and make known to all users. In order to enhance the security level of our protocol, we let the generator create a new blockcipher and key and send them to all users after rounds of support counts mining. Unlike most previous works, we do not use any exponential or modular algorithms, we provide a symmetric-key based method which can also protect the information and the execution time is faster than public-key based algorithm. Since in modern network service, the number of user can be as large as millions. Therefore the efficiency is most essential when designing of the privacy- preserving algorithm. 4.2. Correctness In this section, we prove the correctness of our symmetric-key crypto based support counts mining protocol. Theorem 1. Our symmetric-key crypto based support counts mining protocol correctly computes the sum of all users' outputs. Proof. Now, we prove that the user can obtain the final result by following our protocol. Since we have Therefor we can get It is proved that .
  • 5. Advanced Computing: An International Journal ( ACIJ ), Vol.4, No.2, March 2013 5 5. DISCUSSION Our proposed symmetric-key crypto based protocol for mining support counts has the following characteristics. It preserves the data privacy for each user without revealing it to others in the process of mining support counts. Our privacy-preserving protocol is accurate which means the result obtained by our protocol is the same as those obtained by having all data collected without privacy- preserving. We are utilizing a symmetric-key based method in our models. The protocol is much more efficient compared with public-key based approached. An existing work [3] in mining support counts proposed the privacy-preserving was based on public-key based approach. Different from their protocol, we focus on another cryptographic method---symmetric-key cryptosystem. Furthermore, our protocol is more efficient than previous work. 6. CONCLUSION In this paper, we proposed a symmetric-key crypto based privacy preserving protocol for mining support counts, in order to obtain the result without revealing users' personal private information. We provided a very efficient method based on symmetric-key cryptosystem and cipher block to encrypt each user's data and proved the correctness of our protocol. REFERENCES [1] Y. Lindell & B. Pinkas, (2009) Secure multiparty computation for privacy-preserving data mining. Journal of Privacy and Confidentiality, Vol. 1, No.1, pp5. [2] Y. Lindell & B. Pinkas , (2000) Privacy preserving data mining. In Advances in Cryptology CRYPTO, Springer, pp36-54. [3] F.Wu, J. Liu & S. Zhong. (2009) An efficient protocol for private and accurate mining of support counts. Pattern Recognition Letters, Vol. 30, No.1, pp80-86. [4] L.Kissner & D.Song. (2005) Privacy-preserving set operations. In Advances in Cryptology CRYPTO, Springer, pp241-257. [5] X.Lin, X.Sun, P.H. Ho & X.Shen. (2007) Gsis: a secure and privacy-preserving protocol for vehicular communications. Transactions on Vehicular Technology, IEEE, Vol. 56, No.6, pp3442-3456. [6] H.Delfs & H.Knebl. (2007) Symmetric-key encryption. Introduction to Cryptography, Springer , pp11-31. [7] T.W. Cusick & P.Stanica. (2009) Cryptographic Boolean functions and applications. Academic Press.