SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 6597
Achieving Data Truthfulness and Privacy Preservation in
Data Markets
Mrs. F. Mary Herin Fernandez1, R. Ramya2, P. Sreevarsha3
1Assistant Professor, Computer Science Department, Jeppiaar SRR Engineering College, Tamil Nadu
2,3Computer Science Department, Jeppiaar SRR Engineering College, Tamil Nadu
--------------------------------------------------------------------------***----------------------------------------------------------------------------
ABSTRACT:- A major business paradigm, several on line
info platform have emerged to satisfy society’s desires for
person specify knowledge, wherever a service supplier
collects information from data contributor, so supply
added knowledge services to data shopper. However,
within the knowledge commerce layer, the information
shopper faces a pressing downside, i.e., the way to verify
whether or not the service supplier has honestly collected
and method knowledge. What is more, the information
contributor are sometimes unwilling to revel their
sensitive personal data and real identity to data
contributors. In here, TPDM is been planned, that with
efficiency integrates honesties and privacy preservation in
knowledge market. Also it, instantiate TPDM with profile
matching service and an information distribution service,
and extensively judge the performances rating datasets.
This analysis and analysis results revels that TPDM
achieves many fascinating properties, whereas acquisition
low computation and commutation overheads once
supporting large-scale knowledge markets.
Keywords: Data market, TPDM, Privacy Preservation,
Message Authentication Code, Homomorphism
Encryption, Data Truthfulness.
1. INTRODUCTION
Data mining is that the method of analyzing
knowledge from totally different views and summarizing it
into helpful info. Data processing software package is one
in all variety of analytical tools for analyzing knowledge. It
permits users to investigate knowledge from many various
dimensions or angles, categorise it, and summarize the
relationships known. Technically, data mining is that the
process of finding correlations or patterns among dozens
of fields in massive relative databases. Data processing
involves six common categories of tasks: Anomaly
detection the identification of surprising knowledge
records, which may be attention grabbing or knowledge
errors that need more investigation. Dependency
modelling searches for relationships between variables.
For instance a grocery would possibly gather knowledge
on client buying habits. Exploitation association rule
learning, the grocery will confirm that merchandise are
often bought along and use this info for promoting
functions. This is often generally stated as market basket
analysis. Bunch is that the task of discovering teams and
structures within the knowledge that are in a way or
another "similar", while not exploitation better known
structures within the knowledge. Therefore, so as to
reduce the expenditure for knowledge acquisition,
associate timeserving method for the service supplier is to
mingle some imitative or artificial data into the
information sets. Yet, to scale back operation price, a
strategic service supplier could give data services
supported a set of the entire information set, or perhaps
come a faux result while not process the Classification is
that the task of generalizing better known structure to use
to new knowledge. For instance, associate e-mail program
would possibly try to classify an e-mail as "legitimate" or
as "spam". Regression makes an attempt to seek out a
operate that models the information with the smallest
amount error. Summarisation providing a lot of compact
illustration of the information set, together with image and
report generation. In the era of huge knowledge, society
has developed associate insatiable appetency for sharing
personal knowledge. Realizing the potential of non public
data’s value in higher cognitive process and user expertise
sweetening, many open info platforms have emerged to
change person specific knowledge to be changed on the
web. However, there exists a crucial security downside in
these market-based platforms, i.e., it's troublesome to
ensure the honesties in terms of information assortment
and processing, particularly once privacies of the
information contributors are required to be preserved.
Guaranteeing honesties and protective the privacies of
information contributors are each necessary to the long
run healthy development of data markets. On one hand,
the last word goal of the service supplier during
acknowledge market is to maximise information from
selected data sources. The service supplier ought to be
ready to collect data from an oversized range of
information contributors with low latency. Because of the
timeliness of some varieties of person-specific knowledge,
the service supplier should sporadically collect recent
information to satisfy the varied demands of high-quality
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 6598
data services. For instance, twenty five billion knowledge
assortment activities happen. Meanwhile, the service
supplier has to verify knowledge authentication and data
integrity. One basic approach is to let every data
contributor sign her information. However, classical digital
signature schemes, that verify the received signatures one
once another, could fail to satisfy the rigorous time
demand of information market.
2. RELATED WORK
The thorniest style challenge is that supportive the
honesties of information assortment and protective the
privacy appear to be contradictory objectives. This method
lies in the way to guarantee the honesties of information
process, below the data imbalance between the
information shopper and also the service supplier because
of data confidentiality. The potency demand of information
markets, particularly for knowledge acquisition, service
supplier should sporadically collect recent information to
satisfy the varied demands of prime quality data services.
3. PROPOSED SYSTEM
On two real-world during this project, we've got
planned the primary economical secure theme TPDM for
knowledge markets, that at the same time guarantees
knowledge honesties and privacy preservation. In TPDM,
the information contributors must honestly submit their
own data, however cannot impersonate others. Besides,
the service supplier is enforced to honestly collect and
method knowledge. What is more, each the in person
identifiable info and also the sensitive information of
information contributors are well protected. Additionally,
we've got instantiated TPDM with two totally different
knowledge services, and extensively evaluated their
performances datasets.
4. SYSTEM IMPLEMENTATION
The Achieving data truthfulness and privacy
preservations is illustrated as follows:
No Yes
Fig 1: Flow Diagram
Data Contributor
Create Profile
(Service)
Collects Profiles
From Provider
Collector
Generate
Authenticated
Database
Purchase
Authenticated
Database
Broker
Provide Requested
Service
Recommending
Service
User
Is
the
service
Access The
Service
Stop
Start
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 6599
Implementation of achieving data truthfulness
and privacy preservation in data markets is break down
into four models :
A. Data contributor
B. Data collector
C. Data provider
D. Data consumer.
A. DATA CONTRIBUTOR
The user undergoes registration method the
Registration centre can give the pseudo identity and
provides them to the user. We have a tendency to assume
that the registration centre sets up the system parameters
at the start of information commerce. The verification
conducted by each the service supplier and also the
knowledge shopper. Between the two-layer batch
verifications, we have a tendency to introduce processing
and signatures aggregation done by the service supplier.
At last, we have a tendency to gift outcome verifications
conducted by the information shopper. The information
contributors is in have to expose the service that provided
by them, in terms of the entire package of the service. The
package that comprises the small print like a product that
give by the contributor and also the various price for the
every product in commission. And a complete price of the
service. The information contributor is ready to turn out
any range (N numbers) of service and every are declared
as separate package. Data contributor login page as shown
in fig(1).
Fig2:DataContributor Login
B. DATA COLLECTOR
The collector surfs with the contributor services and
choose the required package of services. And also the
collector submits the resource request to the various CSP
of service. If the CSP acknowledge the collector request of
resource, currently the collector is prepared to access the
resource details and to supply the various resource to
requesting service supplier. Collector serves a
intermediate between the broker and also the CSP. Data
imported from contributor as shown in fig(2).
Fig 3: Data Imported from Contributor
C. DATA PROVIDER
The service provider will ready to choose the service
that in would like from the service provided by the
collector from the CSP. If the service supplier selects their
desired package of service, then the service supplier ought
to pay money for the various services. If the service
supplier is paid with the service the service provider will
access the service from collector. And currently the service
supplier is prepared to source the service that bought from
the collector to the user as shown in fig (3).
Fig 4: Broker collects Data
D. DATA CONSUMER
The buyer hunt for the service that they have from the
assorted service suppliers. And if the buyer finds the
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 6600
required service they request the service to the service
supplier and obtain use with the resource. And verify or
cross check the resource that bought from the service
supplier that whether or not service provider serves the
proper resource in cheap price.
Fig 5: Data provided by Broker
Fig 6: Cheated by Data Broker
Fig 7:Genunine service by Broker
Table Computing Metrics of SVM Classifier
Metrics Invalid
Product
SVM
Classifier
Output
True
Positive(TP)
Positive Data Positive Data
True
Negative(TN)
Negative Data Negative Data
False
Positive(FP)
Negative Data Positive Data
False
Negative(FN)
Positive Data Negative Data
Table 2 Comparative Analysis of Related Work
Performance Metrics
Invalid
Product
TP TN FP FN Precision Recall
10 5 3 2 1 0.714 0.833
30 10 12 5 3 0.666 0.769
50 21 11 9 9 0.7 0.7
70 30 25 11 4 0.731 0.882
100 45 39 8 8 0.849 0.849
Where , IP- Invalid Product
Fig 8. Sample bar grap
5. MERKLE HASH FUNCTION
This function is employed in achieving knowledge
honesties and privacy preservation is MERKLE HASH rule.
In cryptography and engineering, an Merkle tree could be
a tree within which each leaf node is tagged with the hash
of an information block ,and every non-leaf node is tagged
with the crypto logical hash of the labels of its kid nodes.
Hash tree permit economical and secure verification of the
0
0.2
0.4
0.6
0.8
1
10
RM
30
RM
50
RM
70
RM
100
RM
Precision Recall
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 6601
contents of enormous knowledge structures. Hash tree are
a generalization of hash lists and hash chains.
LIMITATIONS
Verification in digital signature schemes needs the
knowledge of information, and may simply leak an
information contributor’s real identity. Relating to a
message authentication code(MAC), the information
contributors and also the data customers have to agree on
a shared secret key, that is unpractical in knowledge
markets.
ADVANTAGES
TPDM is structured internally during a method of
encipher then sign exploitation partly similarity
cryptography and identity-based signature. Its to verify
honesties of privacy preservation in knowledge market.
6. CONCLUSION AND FUTUREWORK
This paper, the information contributors must
honestly submit their own data, however cannot
impersonate others. Besides, the service supplier is
enforced to honestly collect and method knowledge. What
is more, each the in person known info and also the
sensitive information and data contributor are well
protected. additionally, we've got instantiated TPDM with
two totally different knowledge services, and extensively
evaluated their performances on two real-world datasets.
System analysis results have the contest in the
measurability of TPDM within the context of enormous
user base, particularly from computation and
communication overheads. At last, we've got shown the
practicable of introducing the semi-honest registration
centre with elaborated theoretical analysis and substantial
analysis.
7. REFERENCES
[1] M. Barbara, T. Zeller, and S. Hansel, A Face is Exposed
for AOL Searcher no. 4417749, New York, NY, USA:
ny Times, Aug. 2006.
[2] B.C.M. Fung, K. Wang, R. Chen, P. S. Yu, "Privacy-
preserving knowledge publishing: A survey of
recent developments", ACM computation Surveys,
vol. 42, no. 4, pp.
[3] G.Ghinita, P. Kalnis, Y. Tao, "Anonymous publication
of sensitive transactional data1-53, Jun. 2010.
[4] T.W. Chim, S. Yiu, L. C. K. Hui, V. O. K ZLi, "SPECS:
Secure and privacy enhancing communicatiing
scheme for VANETs", Ad Hoc Network, vol. 9, no. 2,
pp. 189-203, 2011. ", IEEE dealings data knowledge
Eng., vol. 23, no. 2, pp. 161-174, Feb. 2011.
[5] Z. Erkin, T. Veugen, T. Toft, and R. L. Lagendijk,
“Generating personal recommendations with
efficiency exploitation similarity cryptography and
knowledge packing”, IEEE dealings info Forensics
Security, vol. 7, no. 3, pp. 1053–1066, Jun. 2012.
[6] Z. Zheng, Y. Peng, F. Wu, S. Tang, and G. Chemm,
“Trading data within the crowd : Profit-driven data
acquisition for mobile crowd sensing ”, IEEE J. Sel.
Areas Communication, vol. 35, no. 2, pp. 486–
501,Feb. 2017.

More Related Content

What's hot

Information systems and it's types
Information systems and it's typesInformation systems and it's types
Information systems and it's types
Jaipal Dhobale
 
Data warehouse,data mining & Big Data
Data warehouse,data mining & Big DataData warehouse,data mining & Big Data
Data warehouse,data mining & Big Data
Ravinder Kamboj
 
An efficient data pre processing frame work for loan credibility prediction s...
An efficient data pre processing frame work for loan credibility prediction s...An efficient data pre processing frame work for loan credibility prediction s...
An efficient data pre processing frame work for loan credibility prediction s...
eSAT Journals
 
Bloor Research Comparative costs and uses for data integration platforms
Bloor Research Comparative costs and uses for data integration platformsBloor Research Comparative costs and uses for data integration platforms
Bloor Research Comparative costs and uses for data integration platformsFiona Lew
 
Mca & diplamo java titles
Mca & diplamo java titlesMca & diplamo java titles
Mca & diplamo java titlestema_solution
 
IRJET- Improving the Performance of Smart Heterogeneous Big Data
IRJET- Improving the Performance of Smart Heterogeneous Big DataIRJET- Improving the Performance of Smart Heterogeneous Big Data
IRJET- Improving the Performance of Smart Heterogeneous Big Data
IRJET Journal
 
Dn31538540
Dn31538540Dn31538540
Dn31538540IJMER
 
CXAIR for Data Migration
CXAIR for Data MigrationCXAIR for Data Migration
CXAIR for Data Migration
Connexica
 
Hybrid distributed application in banking transaction using remote method inv...
Hybrid distributed application in banking transaction using remote method inv...Hybrid distributed application in banking transaction using remote method inv...
Hybrid distributed application in banking transaction using remote method inv...
TELKOMNIKA JOURNAL
 

What's hot (9)

Information systems and it's types
Information systems and it's typesInformation systems and it's types
Information systems and it's types
 
Data warehouse,data mining & Big Data
Data warehouse,data mining & Big DataData warehouse,data mining & Big Data
Data warehouse,data mining & Big Data
 
An efficient data pre processing frame work for loan credibility prediction s...
An efficient data pre processing frame work for loan credibility prediction s...An efficient data pre processing frame work for loan credibility prediction s...
An efficient data pre processing frame work for loan credibility prediction s...
 
Bloor Research Comparative costs and uses for data integration platforms
Bloor Research Comparative costs and uses for data integration platformsBloor Research Comparative costs and uses for data integration platforms
Bloor Research Comparative costs and uses for data integration platforms
 
Mca & diplamo java titles
Mca & diplamo java titlesMca & diplamo java titles
Mca & diplamo java titles
 
IRJET- Improving the Performance of Smart Heterogeneous Big Data
IRJET- Improving the Performance of Smart Heterogeneous Big DataIRJET- Improving the Performance of Smart Heterogeneous Big Data
IRJET- Improving the Performance of Smart Heterogeneous Big Data
 
Dn31538540
Dn31538540Dn31538540
Dn31538540
 
CXAIR for Data Migration
CXAIR for Data MigrationCXAIR for Data Migration
CXAIR for Data Migration
 
Hybrid distributed application in banking transaction using remote method inv...
Hybrid distributed application in banking transaction using remote method inv...Hybrid distributed application in banking transaction using remote method inv...
Hybrid distributed application in banking transaction using remote method inv...
 

Similar to IRJET- Achieving Data Truthfulness and Privacy Preservation in Data Markets

Gc3310851089
Gc3310851089Gc3310851089
Gc3310851089
IJERA Editor
 
Technology & Innovation - User Experience in Business Database Systems
Technology & Innovation - User Experience in Business Database SystemsTechnology & Innovation - User Experience in Business Database Systems
Technology & Innovation - User Experience in Business Database Systems
Cris Ong
 
IRJET - Customer Churn Analysis in Telecom Industry
IRJET - Customer Churn Analysis in Telecom IndustryIRJET - Customer Churn Analysis in Telecom Industry
IRJET - Customer Churn Analysis in Telecom Industry
IRJET Journal
 
The Cloud Computing Approach for Secured Health Maintenance Record of Patient...
The Cloud Computing Approach for Secured Health Maintenance Record of Patient...The Cloud Computing Approach for Secured Health Maintenance Record of Patient...
The Cloud Computing Approach for Secured Health Maintenance Record of Patient...
IRJET Journal
 
Strategies to Monetize Energy Data - How Utilities Can Increase Their 'Earnin...
Strategies to Monetize Energy Data - How Utilities Can Increase Their 'Earnin...Strategies to Monetize Energy Data - How Utilities Can Increase Their 'Earnin...
Strategies to Monetize Energy Data - How Utilities Can Increase Their 'Earnin...
Indigo Advisory Group
 
IRJET- Development and Design of Recommendation System for User Interest Shop...
IRJET- Development and Design of Recommendation System for User Interest Shop...IRJET- Development and Design of Recommendation System for User Interest Shop...
IRJET- Development and Design of Recommendation System for User Interest Shop...
IRJET Journal
 
Providing Highly Accurate Service Recommendation over Big Data using Adaptive...
Providing Highly Accurate Service Recommendation over Big Data using Adaptive...Providing Highly Accurate Service Recommendation over Big Data using Adaptive...
Providing Highly Accurate Service Recommendation over Big Data using Adaptive...
IRJET Journal
 
Proposed ranking for point of sales using data mining for telecom operators
Proposed ranking for point of sales using data mining for telecom operatorsProposed ranking for point of sales using data mining for telecom operators
Proposed ranking for point of sales using data mining for telecom operators
ijdms
 
IRJET- Data Privacy and Security Industry – Opportunities and Challenges
IRJET- Data Privacy and Security Industry – Opportunities and ChallengesIRJET- Data Privacy and Security Industry – Opportunities and Challenges
IRJET- Data Privacy and Security Industry – Opportunities and Challenges
IRJET Journal
 
20 ccp using logistic
20 ccp using logistic20 ccp using logistic
20 ccp using logistic
Vrinda Sachdeva
 
Data Mining in Telecommunication Industry
Data Mining in Telecommunication IndustryData Mining in Telecommunication Industry
Data Mining in Telecommunication Industry
ijsrd.com
 
Mining the Web Data for Classifying and Predicting Users’ Requests
Mining the Web Data for Classifying and Predicting Users’ RequestsMining the Web Data for Classifying and Predicting Users’ Requests
Mining the Web Data for Classifying and Predicting Users’ Requests
IJECEIAES
 
IRJET- Competitive Analysis of Attacks on Social Media
IRJET-  	 Competitive Analysis of Attacks on Social MediaIRJET-  	 Competitive Analysis of Attacks on Social Media
IRJET- Competitive Analysis of Attacks on Social Media
IRJET Journal
 
IRJET- A Novel Approach for Accomplishing Data Reliability and Isolation Safe...
IRJET- A Novel Approach for Accomplishing Data Reliability and Isolation Safe...IRJET- A Novel Approach for Accomplishing Data Reliability and Isolation Safe...
IRJET- A Novel Approach for Accomplishing Data Reliability and Isolation Safe...
IRJET Journal
 
A Muilt-Keyword Ranked Based Search and Privacy Preservation of Distributed D...
A Muilt-Keyword Ranked Based Search and Privacy Preservation of Distributed D...A Muilt-Keyword Ranked Based Search and Privacy Preservation of Distributed D...
A Muilt-Keyword Ranked Based Search and Privacy Preservation of Distributed D...
IRJET Journal
 
A Muilt-Keyword Ranked Based Search and Privacy Preservation of Distributed D...
A Muilt-Keyword Ranked Based Search and Privacy Preservation of Distributed D...A Muilt-Keyword Ranked Based Search and Privacy Preservation of Distributed D...
A Muilt-Keyword Ranked Based Search and Privacy Preservation of Distributed D...
IRJET Journal
 
IRJET - Digital Advertisement using Artificial Intelligence for Data Anal...
IRJET -  	  Digital Advertisement using Artificial Intelligence for Data Anal...IRJET -  	  Digital Advertisement using Artificial Intelligence for Data Anal...
IRJET - Digital Advertisement using Artificial Intelligence for Data Anal...
IRJET Journal
 
How secure is the cloud? and Amazon vs Walmart which giant will dominant?
How secure is the cloud? and Amazon vs Walmart which giant will dominant?How secure is the cloud? and Amazon vs Walmart which giant will dominant?
How secure is the cloud? and Amazon vs Walmart which giant will dominant?
Mohammad Mydul Islam
 
IRJET - An Intelligent Recommendation for Social Contextual Image using H...
IRJET -  	  An Intelligent Recommendation for Social Contextual Image using H...IRJET -  	  An Intelligent Recommendation for Social Contextual Image using H...
IRJET - An Intelligent Recommendation for Social Contextual Image using H...
IRJET Journal
 
INTEGRATION OF MACHINE LEARNING TECHNIQUES TO EVALUATE DYNAMIC CUSTOMER SEGME...
INTEGRATION OF MACHINE LEARNING TECHNIQUES TO EVALUATE DYNAMIC CUSTOMER SEGME...INTEGRATION OF MACHINE LEARNING TECHNIQUES TO EVALUATE DYNAMIC CUSTOMER SEGME...
INTEGRATION OF MACHINE LEARNING TECHNIQUES TO EVALUATE DYNAMIC CUSTOMER SEGME...
IJDKP
 

Similar to IRJET- Achieving Data Truthfulness and Privacy Preservation in Data Markets (20)

Gc3310851089
Gc3310851089Gc3310851089
Gc3310851089
 
Technology & Innovation - User Experience in Business Database Systems
Technology & Innovation - User Experience in Business Database SystemsTechnology & Innovation - User Experience in Business Database Systems
Technology & Innovation - User Experience in Business Database Systems
 
IRJET - Customer Churn Analysis in Telecom Industry
IRJET - Customer Churn Analysis in Telecom IndustryIRJET - Customer Churn Analysis in Telecom Industry
IRJET - Customer Churn Analysis in Telecom Industry
 
The Cloud Computing Approach for Secured Health Maintenance Record of Patient...
The Cloud Computing Approach for Secured Health Maintenance Record of Patient...The Cloud Computing Approach for Secured Health Maintenance Record of Patient...
The Cloud Computing Approach for Secured Health Maintenance Record of Patient...
 
Strategies to Monetize Energy Data - How Utilities Can Increase Their 'Earnin...
Strategies to Monetize Energy Data - How Utilities Can Increase Their 'Earnin...Strategies to Monetize Energy Data - How Utilities Can Increase Their 'Earnin...
Strategies to Monetize Energy Data - How Utilities Can Increase Their 'Earnin...
 
IRJET- Development and Design of Recommendation System for User Interest Shop...
IRJET- Development and Design of Recommendation System for User Interest Shop...IRJET- Development and Design of Recommendation System for User Interest Shop...
IRJET- Development and Design of Recommendation System for User Interest Shop...
 
Providing Highly Accurate Service Recommendation over Big Data using Adaptive...
Providing Highly Accurate Service Recommendation over Big Data using Adaptive...Providing Highly Accurate Service Recommendation over Big Data using Adaptive...
Providing Highly Accurate Service Recommendation over Big Data using Adaptive...
 
Proposed ranking for point of sales using data mining for telecom operators
Proposed ranking for point of sales using data mining for telecom operatorsProposed ranking for point of sales using data mining for telecom operators
Proposed ranking for point of sales using data mining for telecom operators
 
IRJET- Data Privacy and Security Industry – Opportunities and Challenges
IRJET- Data Privacy and Security Industry – Opportunities and ChallengesIRJET- Data Privacy and Security Industry – Opportunities and Challenges
IRJET- Data Privacy and Security Industry – Opportunities and Challenges
 
20 ccp using logistic
20 ccp using logistic20 ccp using logistic
20 ccp using logistic
 
Data Mining in Telecommunication Industry
Data Mining in Telecommunication IndustryData Mining in Telecommunication Industry
Data Mining in Telecommunication Industry
 
Mining the Web Data for Classifying and Predicting Users’ Requests
Mining the Web Data for Classifying and Predicting Users’ RequestsMining the Web Data for Classifying and Predicting Users’ Requests
Mining the Web Data for Classifying and Predicting Users’ Requests
 
IRJET- Competitive Analysis of Attacks on Social Media
IRJET-  	 Competitive Analysis of Attacks on Social MediaIRJET-  	 Competitive Analysis of Attacks on Social Media
IRJET- Competitive Analysis of Attacks on Social Media
 
IRJET- A Novel Approach for Accomplishing Data Reliability and Isolation Safe...
IRJET- A Novel Approach for Accomplishing Data Reliability and Isolation Safe...IRJET- A Novel Approach for Accomplishing Data Reliability and Isolation Safe...
IRJET- A Novel Approach for Accomplishing Data Reliability and Isolation Safe...
 
A Muilt-Keyword Ranked Based Search and Privacy Preservation of Distributed D...
A Muilt-Keyword Ranked Based Search and Privacy Preservation of Distributed D...A Muilt-Keyword Ranked Based Search and Privacy Preservation of Distributed D...
A Muilt-Keyword Ranked Based Search and Privacy Preservation of Distributed D...
 
A Muilt-Keyword Ranked Based Search and Privacy Preservation of Distributed D...
A Muilt-Keyword Ranked Based Search and Privacy Preservation of Distributed D...A Muilt-Keyword Ranked Based Search and Privacy Preservation of Distributed D...
A Muilt-Keyword Ranked Based Search and Privacy Preservation of Distributed D...
 
IRJET - Digital Advertisement using Artificial Intelligence for Data Anal...
IRJET -  	  Digital Advertisement using Artificial Intelligence for Data Anal...IRJET -  	  Digital Advertisement using Artificial Intelligence for Data Anal...
IRJET - Digital Advertisement using Artificial Intelligence for Data Anal...
 
How secure is the cloud? and Amazon vs Walmart which giant will dominant?
How secure is the cloud? and Amazon vs Walmart which giant will dominant?How secure is the cloud? and Amazon vs Walmart which giant will dominant?
How secure is the cloud? and Amazon vs Walmart which giant will dominant?
 
IRJET - An Intelligent Recommendation for Social Contextual Image using H...
IRJET -  	  An Intelligent Recommendation for Social Contextual Image using H...IRJET -  	  An Intelligent Recommendation for Social Contextual Image using H...
IRJET - An Intelligent Recommendation for Social Contextual Image using H...
 
INTEGRATION OF MACHINE LEARNING TECHNIQUES TO EVALUATE DYNAMIC CUSTOMER SEGME...
INTEGRATION OF MACHINE LEARNING TECHNIQUES TO EVALUATE DYNAMIC CUSTOMER SEGME...INTEGRATION OF MACHINE LEARNING TECHNIQUES TO EVALUATE DYNAMIC CUSTOMER SEGME...
INTEGRATION OF MACHINE LEARNING TECHNIQUES TO EVALUATE DYNAMIC CUSTOMER SEGME...
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERSCW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
veerababupersonal22
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
Intella Parts
 
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
aqil azizi
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
ClaraZara1
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
gestioneergodomus
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
zwunae
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
BrazilAccount1
 
Basic Industrial Engineering terms for apparel
Basic Industrial Engineering terms for apparelBasic Industrial Engineering terms for apparel
Basic Industrial Engineering terms for apparel
top1002
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
ongomchris
 
Unbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptxUnbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptx
ChristineTorrepenida1
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 

Recently uploaded (20)

CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERSCW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
 
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
 
Basic Industrial Engineering terms for apparel
Basic Industrial Engineering terms for apparelBasic Industrial Engineering terms for apparel
Basic Industrial Engineering terms for apparel
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
 
Unbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptxUnbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptx
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 

IRJET- Achieving Data Truthfulness and Privacy Preservation in Data Markets

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 6597 Achieving Data Truthfulness and Privacy Preservation in Data Markets Mrs. F. Mary Herin Fernandez1, R. Ramya2, P. Sreevarsha3 1Assistant Professor, Computer Science Department, Jeppiaar SRR Engineering College, Tamil Nadu 2,3Computer Science Department, Jeppiaar SRR Engineering College, Tamil Nadu --------------------------------------------------------------------------***---------------------------------------------------------------------------- ABSTRACT:- A major business paradigm, several on line info platform have emerged to satisfy society’s desires for person specify knowledge, wherever a service supplier collects information from data contributor, so supply added knowledge services to data shopper. However, within the knowledge commerce layer, the information shopper faces a pressing downside, i.e., the way to verify whether or not the service supplier has honestly collected and method knowledge. What is more, the information contributor are sometimes unwilling to revel their sensitive personal data and real identity to data contributors. In here, TPDM is been planned, that with efficiency integrates honesties and privacy preservation in knowledge market. Also it, instantiate TPDM with profile matching service and an information distribution service, and extensively judge the performances rating datasets. This analysis and analysis results revels that TPDM achieves many fascinating properties, whereas acquisition low computation and commutation overheads once supporting large-scale knowledge markets. Keywords: Data market, TPDM, Privacy Preservation, Message Authentication Code, Homomorphism Encryption, Data Truthfulness. 1. INTRODUCTION Data mining is that the method of analyzing knowledge from totally different views and summarizing it into helpful info. Data processing software package is one in all variety of analytical tools for analyzing knowledge. It permits users to investigate knowledge from many various dimensions or angles, categorise it, and summarize the relationships known. Technically, data mining is that the process of finding correlations or patterns among dozens of fields in massive relative databases. Data processing involves six common categories of tasks: Anomaly detection the identification of surprising knowledge records, which may be attention grabbing or knowledge errors that need more investigation. Dependency modelling searches for relationships between variables. For instance a grocery would possibly gather knowledge on client buying habits. Exploitation association rule learning, the grocery will confirm that merchandise are often bought along and use this info for promoting functions. This is often generally stated as market basket analysis. Bunch is that the task of discovering teams and structures within the knowledge that are in a way or another "similar", while not exploitation better known structures within the knowledge. Therefore, so as to reduce the expenditure for knowledge acquisition, associate timeserving method for the service supplier is to mingle some imitative or artificial data into the information sets. Yet, to scale back operation price, a strategic service supplier could give data services supported a set of the entire information set, or perhaps come a faux result while not process the Classification is that the task of generalizing better known structure to use to new knowledge. For instance, associate e-mail program would possibly try to classify an e-mail as "legitimate" or as "spam". Regression makes an attempt to seek out a operate that models the information with the smallest amount error. Summarisation providing a lot of compact illustration of the information set, together with image and report generation. In the era of huge knowledge, society has developed associate insatiable appetency for sharing personal knowledge. Realizing the potential of non public data’s value in higher cognitive process and user expertise sweetening, many open info platforms have emerged to change person specific knowledge to be changed on the web. However, there exists a crucial security downside in these market-based platforms, i.e., it's troublesome to ensure the honesties in terms of information assortment and processing, particularly once privacies of the information contributors are required to be preserved. Guaranteeing honesties and protective the privacies of information contributors are each necessary to the long run healthy development of data markets. On one hand, the last word goal of the service supplier during acknowledge market is to maximise information from selected data sources. The service supplier ought to be ready to collect data from an oversized range of information contributors with low latency. Because of the timeliness of some varieties of person-specific knowledge, the service supplier should sporadically collect recent information to satisfy the varied demands of high-quality
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 6598 data services. For instance, twenty five billion knowledge assortment activities happen. Meanwhile, the service supplier has to verify knowledge authentication and data integrity. One basic approach is to let every data contributor sign her information. However, classical digital signature schemes, that verify the received signatures one once another, could fail to satisfy the rigorous time demand of information market. 2. RELATED WORK The thorniest style challenge is that supportive the honesties of information assortment and protective the privacy appear to be contradictory objectives. This method lies in the way to guarantee the honesties of information process, below the data imbalance between the information shopper and also the service supplier because of data confidentiality. The potency demand of information markets, particularly for knowledge acquisition, service supplier should sporadically collect recent information to satisfy the varied demands of prime quality data services. 3. PROPOSED SYSTEM On two real-world during this project, we've got planned the primary economical secure theme TPDM for knowledge markets, that at the same time guarantees knowledge honesties and privacy preservation. In TPDM, the information contributors must honestly submit their own data, however cannot impersonate others. Besides, the service supplier is enforced to honestly collect and method knowledge. What is more, each the in person identifiable info and also the sensitive information of information contributors are well protected. Additionally, we've got instantiated TPDM with two totally different knowledge services, and extensively evaluated their performances datasets. 4. SYSTEM IMPLEMENTATION The Achieving data truthfulness and privacy preservations is illustrated as follows: No Yes Fig 1: Flow Diagram Data Contributor Create Profile (Service) Collects Profiles From Provider Collector Generate Authenticated Database Purchase Authenticated Database Broker Provide Requested Service Recommending Service User Is the service Access The Service Stop Start
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 6599 Implementation of achieving data truthfulness and privacy preservation in data markets is break down into four models : A. Data contributor B. Data collector C. Data provider D. Data consumer. A. DATA CONTRIBUTOR The user undergoes registration method the Registration centre can give the pseudo identity and provides them to the user. We have a tendency to assume that the registration centre sets up the system parameters at the start of information commerce. The verification conducted by each the service supplier and also the knowledge shopper. Between the two-layer batch verifications, we have a tendency to introduce processing and signatures aggregation done by the service supplier. At last, we have a tendency to gift outcome verifications conducted by the information shopper. The information contributors is in have to expose the service that provided by them, in terms of the entire package of the service. The package that comprises the small print like a product that give by the contributor and also the various price for the every product in commission. And a complete price of the service. The information contributor is ready to turn out any range (N numbers) of service and every are declared as separate package. Data contributor login page as shown in fig(1). Fig2:DataContributor Login B. DATA COLLECTOR The collector surfs with the contributor services and choose the required package of services. And also the collector submits the resource request to the various CSP of service. If the CSP acknowledge the collector request of resource, currently the collector is prepared to access the resource details and to supply the various resource to requesting service supplier. Collector serves a intermediate between the broker and also the CSP. Data imported from contributor as shown in fig(2). Fig 3: Data Imported from Contributor C. DATA PROVIDER The service provider will ready to choose the service that in would like from the service provided by the collector from the CSP. If the service supplier selects their desired package of service, then the service supplier ought to pay money for the various services. If the service supplier is paid with the service the service provider will access the service from collector. And currently the service supplier is prepared to source the service that bought from the collector to the user as shown in fig (3). Fig 4: Broker collects Data D. DATA CONSUMER The buyer hunt for the service that they have from the assorted service suppliers. And if the buyer finds the
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 6600 required service they request the service to the service supplier and obtain use with the resource. And verify or cross check the resource that bought from the service supplier that whether or not service provider serves the proper resource in cheap price. Fig 5: Data provided by Broker Fig 6: Cheated by Data Broker Fig 7:Genunine service by Broker Table Computing Metrics of SVM Classifier Metrics Invalid Product SVM Classifier Output True Positive(TP) Positive Data Positive Data True Negative(TN) Negative Data Negative Data False Positive(FP) Negative Data Positive Data False Negative(FN) Positive Data Negative Data Table 2 Comparative Analysis of Related Work Performance Metrics Invalid Product TP TN FP FN Precision Recall 10 5 3 2 1 0.714 0.833 30 10 12 5 3 0.666 0.769 50 21 11 9 9 0.7 0.7 70 30 25 11 4 0.731 0.882 100 45 39 8 8 0.849 0.849 Where , IP- Invalid Product Fig 8. Sample bar grap 5. MERKLE HASH FUNCTION This function is employed in achieving knowledge honesties and privacy preservation is MERKLE HASH rule. In cryptography and engineering, an Merkle tree could be a tree within which each leaf node is tagged with the hash of an information block ,and every non-leaf node is tagged with the crypto logical hash of the labels of its kid nodes. Hash tree permit economical and secure verification of the 0 0.2 0.4 0.6 0.8 1 10 RM 30 RM 50 RM 70 RM 100 RM Precision Recall
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 6601 contents of enormous knowledge structures. Hash tree are a generalization of hash lists and hash chains. LIMITATIONS Verification in digital signature schemes needs the knowledge of information, and may simply leak an information contributor’s real identity. Relating to a message authentication code(MAC), the information contributors and also the data customers have to agree on a shared secret key, that is unpractical in knowledge markets. ADVANTAGES TPDM is structured internally during a method of encipher then sign exploitation partly similarity cryptography and identity-based signature. Its to verify honesties of privacy preservation in knowledge market. 6. CONCLUSION AND FUTUREWORK This paper, the information contributors must honestly submit their own data, however cannot impersonate others. Besides, the service supplier is enforced to honestly collect and method knowledge. What is more, each the in person known info and also the sensitive information and data contributor are well protected. additionally, we've got instantiated TPDM with two totally different knowledge services, and extensively evaluated their performances on two real-world datasets. System analysis results have the contest in the measurability of TPDM within the context of enormous user base, particularly from computation and communication overheads. At last, we've got shown the practicable of introducing the semi-honest registration centre with elaborated theoretical analysis and substantial analysis. 7. REFERENCES [1] M. Barbara, T. Zeller, and S. Hansel, A Face is Exposed for AOL Searcher no. 4417749, New York, NY, USA: ny Times, Aug. 2006. [2] B.C.M. Fung, K. Wang, R. Chen, P. S. Yu, "Privacy- preserving knowledge publishing: A survey of recent developments", ACM computation Surveys, vol. 42, no. 4, pp. [3] G.Ghinita, P. Kalnis, Y. Tao, "Anonymous publication of sensitive transactional data1-53, Jun. 2010. [4] T.W. Chim, S. Yiu, L. C. K. Hui, V. O. K ZLi, "SPECS: Secure and privacy enhancing communicatiing scheme for VANETs", Ad Hoc Network, vol. 9, no. 2, pp. 189-203, 2011. ", IEEE dealings data knowledge Eng., vol. 23, no. 2, pp. 161-174, Feb. 2011. [5] Z. Erkin, T. Veugen, T. Toft, and R. L. Lagendijk, “Generating personal recommendations with efficiency exploitation similarity cryptography and knowledge packing”, IEEE dealings info Forensics Security, vol. 7, no. 3, pp. 1053–1066, Jun. 2012. [6] Z. Zheng, Y. Peng, F. Wu, S. Tang, and G. Chemm, “Trading data within the crowd : Profit-driven data acquisition for mobile crowd sensing ”, IEEE J. Sel. Areas Communication, vol. 35, no. 2, pp. 486– 501,Feb. 2017.