SlideShare a Scribd company logo
1 of 17
Privacy
Preserving
Forensics of
Digital Encrypted
Data
privacy-preserving
data mining?
Privacy-preserving data mining refers to a set of
methods that enable the analysis of data without
disclosing the sensitive information of the
organizations or individuals whose data is being
examined. This can be achieved through a variety of
techniques
Key Techniques in Privacy-
Preserving Data Mining
Anonymization :
K-Anonymity: Ensures that each
record in a dataset is indistinguishable from at least
k-1 other records. This
is typically achieved by generalizing or suppressing
certain attributes.
L-Diversity:
Extends k-anonymity by ensuring that each group of
indistinguishable records
has at least l distinct values for a sensitive attribute.
T-Closeness:
Focuses on the distribution of sensitive attributes
within each anonymized group, ensuring that
it is close to the overall distribution in the dataset.
Anonymization
Techniques of Privacy Preservation Data Publishing(clinical
data).
Data anonymisation, also known as data masking or
desensitization, is used to hide or conceal any sensitive data
about an individual, thus preventing the re-identification of the
individual
Differential Privacy:
 Differential
privacy mechanisms: It introduces noise
or randomness to query responses in a
way that protects individual privacy.
 The key idea is to ensure that the
inclusion or exclusion of a single record
does not significantly impact the
outcome of a query.
Data Perturbation
 This involve sintroducing controlled noise or
random variations to individual data points,
making it more challenging to identify specific
individuals while still extracting valuable insights.
Various transformation techniques such as:
scaling, shearing, reflection, rotation etc. can also
be used to perturb data points.
Encryption:
 Enables computations to be performed on
encrypted data without decrypting it.
 Allows data to be kept confidential even during
processing, reducing the exposure of sensitive
information.
Searching in encryption
Searchable Encryption (SE) Enables
computations to be performed on
encrypted data without decrypting it.
Allows data to be kept confidential even
during processing, reducing the exposure
of sensitive
Information.
The servers use Boolean or Ranked search
SSE (Searchable Symmetric Encryption) - AES
algorithm with either CTR or CBC
PEKS (Public Key Encryption with Key-word
Search)
-RSA or ElGamal, or Elliptic Curve
Cryptography (ECC)
Searchable Encryption
Process
 As SSE approaches use the same secret key for
encryption and decryption, they are computationally
efficient than the ASE, which uses a different key for
both encryption and decyption. SSE approaches are
primarily meant for enabling data access only by data
owners that have the corresponding secret key.
 To enable the data access by other users in SSE, the
data owners have to provide them with either the
secret key or the encrypted queries.
 On the other hand, PEKS approaches [23] are meant
for sharing the stored data with multiple users, and it
also supports expressive queries, but these
approaches are computationally expensive.
Searchable Encryption Process
 Encryption of indexes: Once the plaintext indexes are generated, they need to be encrypted using
encryption schemes such as AES, RSA, Deterministic Encryption (DE), Functional encryption(FE),
Predicate Encryption, etc.
 Encryption of plaintext documents: Data owners are then required to encrypt the plaintext documents
using either a public key or secret key encryption scheme with a sufficiently large key.Incorporation of
ranking information: Searchable indexes should include ranking information determined using various
keyword weight measures such as Term-Frequency (TF), Term-Frequency-Inverse Document
Frequency (TF-IDF), etc. This ranking information also needs to be encrypted using encryption
schemes such as Order Preserving Encryption (OPE), Fully Homomorphic Encryption (FHE), and
Paillier Encryption (PE).Upload of encrypted documents and indexes to cloud servers: Data owners
then upload the encrypted documents and their corresponding searchable indexes onto the cloud
servers.
 lIssuance of
trapdoors and retrieval of documents: Data owners and authorized data users
issue trapdoors, i.e., queries in encrypted form along with a value 'k' to the
cloud server, which returns the top-k documents with the help of ranking
Generate plaintext indexes
other statistical methods to determine the relevance of each token within the document collection.
 lConstructing the
index: Create a data structure, such as an inverted index, that maps each token
to the documents in which it appears and the corresponding weights or relevance
scores. This allows for efficient retrieval of documents based on search queries.
 lEncryption: Once
the plaintext indexes are generated, they need to be encrypted using suitable
encryption schemes such as AES, RSA, or other cryptographic methods to ensure
the confidentiality and privacy of the index information.Generation of plaintext indexes: Data owners
are required to generate plaintext indexes for all their documents. This can be achieved using
different indexing schemes such as Forward indexing and Inverted indexing, each represented by
various data structures.
 Encryption of indexes: Once the plaintext indexes are generated, they need to be encrypted using
encryption schemes such as AES, RSA, Deterministic Encryption (DE), Functional encryption(FE),
Predicate Encryption, etc.
 Encryption of plaintext documents: Data owners are then required to encrypt the plaintext documents
using either a public key or secret key encryption scheme with a sufficiently large key.Incorporation of
Constructing the index
 Indexing is a process in information retrieval where an index is created to map terms or keywords to
their occurrences in a document.
 It helps in quickly locating the positions of terms within the document, enabling efficient
retrieval of information.
 Forward
indexing, Inverted indexing, tree-based indexing, Bloom filters, Bucketization.
Encrypting the indices
 Symetric, public keye ncryption, order-preserving encryption, and homomorphic encryption.
 Generate Encryption Keys: Depending on the chosen encryption scheme, generate the necessary
encryption keys. For symmetric key encryption, a single key is used for both encryption and
decryption. In the case of public key encryption, a public key is used for encryption, and a
corresponding private key is used for decryption.
 Apply Encryption to Indexes: Use the encryption scheme and keys to encrypt the plaintext
indexes. This involves applying cryptographic algorithms to transform the index data into
ciphertext, rendering it unintelligible to unauthorized parties.
Assigning weights
Relevance Ranking:
-These measures help rank documents
based on their relevance to a user's
query.
-Users are often interested in obtaining
the most relevant information first, and
ranking helps prioritize results.
-Term-Frequency (TF),
Term-Frequency-Inverse Document
Frequency (TF-IDF), Cosine Similarity,
Cosine Similarity and Jaccard Coefficient
Ranking information
Ranking information in indexes also needs to
be encrypted by using Order Preserving
Encryption (OPE) [34],
Fully Homomorphic Encryption (FHE[43], and
Paillier Encryption (PE) [25] schemes.
These schemes can be used for encrypting the
ranking information as they preserve the
order of plaintext ranking information and
they also enable ranking lbased on the
encrypted ranking information [44], [45].
TYPES OF SEARCH
Boolean Search Ranked search
Single Keyword Boolean Search
Multi-Keyword Boolean Search
Single Keyword Ranked Search
Muti- Keyword Ranked Search

More Related Content

Similar to privacy preserving forenciscs of encyrpted data.pptx

IJSRED-V2I3P52
IJSRED-V2I3P52IJSRED-V2I3P52
IJSRED-V2I3P52IJSRED
 
Implementation of De-Duplication Algorithm
Implementation of De-Duplication AlgorithmImplementation of De-Duplication Algorithm
Implementation of De-Duplication AlgorithmIRJET Journal
 
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...
 A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD... A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...Nexgen Technology
 
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD ...
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD ...A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD ...
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD ...nexgentechnology
 
A secure and dynamic multi keyword ranked
A secure and dynamic multi keyword rankedA secure and dynamic multi keyword ranked
A secure and dynamic multi keyword rankednexgentech15
 
Multi-part Dynamic Key Generation For Secure Data Encryption
Multi-part Dynamic Key Generation For Secure Data EncryptionMulti-part Dynamic Key Generation For Secure Data Encryption
Multi-part Dynamic Key Generation For Secure Data EncryptionCSCJournals
 
Attribute Based Ecdsa Searchable Encryption in Cloud Computing ECDSA Elliptic...
Attribute Based Ecdsa Searchable Encryption in Cloud Computing ECDSA Elliptic...Attribute Based Ecdsa Searchable Encryption in Cloud Computing ECDSA Elliptic...
Attribute Based Ecdsa Searchable Encryption in Cloud Computing ECDSA Elliptic...ijtsrd
 
Efficient Similarity Search Over Encrypted Data
Efficient Similarity Search Over Encrypted DataEfficient Similarity Search Over Encrypted Data
Efficient Similarity Search Over Encrypted DataIRJET Journal
 
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdfAn Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdfKailasS9
 
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...IRJET Journal
 
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEMSECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEMJournal For Research
 
File transfer with multiple security mechanism
File transfer with multiple security mechanismFile transfer with multiple security mechanism
File transfer with multiple security mechanismShubham Patil
 
Cryptography Final Presentation.pptx
Cryptography Final Presentation.pptxCryptography Final Presentation.pptx
Cryptography Final Presentation.pptxGaneshBagul8
 
A comparative study of symmetric key algorithm des, aes and blowfish for vide...
A comparative study of symmetric key algorithm des, aes and blowfish for vide...A comparative study of symmetric key algorithm des, aes and blowfish for vide...
A comparative study of symmetric key algorithm des, aes and blowfish for vide...pankaj kumari
 
CLOUD SECURITY.pptx
CLOUD SECURITY.pptxCLOUD SECURITY.pptx
CLOUD SECURITY.pptxMrPrathapG
 
Towards secure multi keyword top-k retrieval over encrypted cloud data
Towards secure multi keyword top-k retrieval over encrypted cloud dataTowards secure multi keyword top-k retrieval over encrypted cloud data
Towards secure multi keyword top-k retrieval over encrypted cloud dataJPINFOTECH JAYAPRAKASH
 
Efficient Similarity Search over Encrypted Data
Efficient Similarity Search over Encrypted DataEfficient Similarity Search over Encrypted Data
Efficient Similarity Search over Encrypted DataIRJET Journal
 
SPCHS Construction for Expeditious Keyword Search in Cipher Text
SPCHS Construction for Expeditious Keyword Search in Cipher TextSPCHS Construction for Expeditious Keyword Search in Cipher Text
SPCHS Construction for Expeditious Keyword Search in Cipher TextIJMTST Journal
 

Similar to privacy preserving forenciscs of encyrpted data.pptx (20)

IJSRED-V2I3P52
IJSRED-V2I3P52IJSRED-V2I3P52
IJSRED-V2I3P52
 
Implementation of De-Duplication Algorithm
Implementation of De-Duplication AlgorithmImplementation of De-Duplication Algorithm
Implementation of De-Duplication Algorithm
 
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...
 A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD... A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...
 
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD ...
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD ...A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD ...
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD ...
 
A secure and dynamic multi keyword ranked
A secure and dynamic multi keyword rankedA secure and dynamic multi keyword ranked
A secure and dynamic multi keyword ranked
 
2nd rvw
2nd rvw2nd rvw
2nd rvw
 
Multi-part Dynamic Key Generation For Secure Data Encryption
Multi-part Dynamic Key Generation For Secure Data EncryptionMulti-part Dynamic Key Generation For Secure Data Encryption
Multi-part Dynamic Key Generation For Secure Data Encryption
 
Attribute Based Ecdsa Searchable Encryption in Cloud Computing ECDSA Elliptic...
Attribute Based Ecdsa Searchable Encryption in Cloud Computing ECDSA Elliptic...Attribute Based Ecdsa Searchable Encryption in Cloud Computing ECDSA Elliptic...
Attribute Based Ecdsa Searchable Encryption in Cloud Computing ECDSA Elliptic...
 
Efficient Similarity Search Over Encrypted Data
Efficient Similarity Search Over Encrypted DataEfficient Similarity Search Over Encrypted Data
Efficient Similarity Search Over Encrypted Data
 
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdfAn Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
 
cns unit 1.pptx
cns unit 1.pptxcns unit 1.pptx
cns unit 1.pptx
 
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
 
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEMSECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
 
File transfer with multiple security mechanism
File transfer with multiple security mechanismFile transfer with multiple security mechanism
File transfer with multiple security mechanism
 
Cryptography Final Presentation.pptx
Cryptography Final Presentation.pptxCryptography Final Presentation.pptx
Cryptography Final Presentation.pptx
 
A comparative study of symmetric key algorithm des, aes and blowfish for vide...
A comparative study of symmetric key algorithm des, aes and blowfish for vide...A comparative study of symmetric key algorithm des, aes and blowfish for vide...
A comparative study of symmetric key algorithm des, aes and blowfish for vide...
 
CLOUD SECURITY.pptx
CLOUD SECURITY.pptxCLOUD SECURITY.pptx
CLOUD SECURITY.pptx
 
Towards secure multi keyword top-k retrieval over encrypted cloud data
Towards secure multi keyword top-k retrieval over encrypted cloud dataTowards secure multi keyword top-k retrieval over encrypted cloud data
Towards secure multi keyword top-k retrieval over encrypted cloud data
 
Efficient Similarity Search over Encrypted Data
Efficient Similarity Search over Encrypted DataEfficient Similarity Search over Encrypted Data
Efficient Similarity Search over Encrypted Data
 
SPCHS Construction for Expeditious Keyword Search in Cipher Text
SPCHS Construction for Expeditious Keyword Search in Cipher TextSPCHS Construction for Expeditious Keyword Search in Cipher Text
SPCHS Construction for Expeditious Keyword Search in Cipher Text
 

More from GayathriSanthosh11

Public key infrastrucure and its uses.pptx
Public key infrastrucure and its uses.pptxPublic key infrastrucure and its uses.pptx
Public key infrastrucure and its uses.pptxGayathriSanthosh11
 
rough intro about xai and the uses of xai in decision making
rough intro about xai and the uses of xai in decision makingrough intro about xai and the uses of xai in decision making
rough intro about xai and the uses of xai in decision makingGayathriSanthosh11
 
2019-08-08-OriginStamp-Blockchain-Technology-Presentation.pptx
2019-08-08-OriginStamp-Blockchain-Technology-Presentation.pptx2019-08-08-OriginStamp-Blockchain-Technology-Presentation.pptx
2019-08-08-OriginStamp-Blockchain-Technology-Presentation.pptxGayathriSanthosh11
 
10.1098-rsos.190023Figure1900232.pptx
10.1098-rsos.190023Figure1900232.pptx10.1098-rsos.190023Figure1900232.pptx
10.1098-rsos.190023Figure1900232.pptxGayathriSanthosh11
 
Deep-Learning-2017-Lecture7GAN.ppt
Deep-Learning-2017-Lecture7GAN.pptDeep-Learning-2017-Lecture7GAN.ppt
Deep-Learning-2017-Lecture7GAN.pptGayathriSanthosh11
 
09092019-Block.one-Presentation.pptx
09092019-Block.one-Presentation.pptx09092019-Block.one-Presentation.pptx
09092019-Block.one-Presentation.pptxGayathriSanthosh11
 

More from GayathriSanthosh11 (11)

Public key infrastrucure and its uses.pptx
Public key infrastrucure and its uses.pptxPublic key infrastrucure and its uses.pptx
Public key infrastrucure and its uses.pptx
 
rough intro about xai and the uses of xai in decision making
rough intro about xai and the uses of xai in decision makingrough intro about xai and the uses of xai in decision making
rough intro about xai and the uses of xai in decision making
 
2019-08-08-OriginStamp-Blockchain-Technology-Presentation.pptx
2019-08-08-OriginStamp-Blockchain-Technology-Presentation.pptx2019-08-08-OriginStamp-Blockchain-Technology-Presentation.pptx
2019-08-08-OriginStamp-Blockchain-Technology-Presentation.pptx
 
273CC03851E778670A (1).ppt
273CC03851E778670A (1).ppt273CC03851E778670A (1).ppt
273CC03851E778670A (1).ppt
 
10.1098-rsos.190023Figure1900232.pptx
10.1098-rsos.190023Figure1900232.pptx10.1098-rsos.190023Figure1900232.pptx
10.1098-rsos.190023Figure1900232.pptx
 
Deep-Learning-2017-Lecture7GAN.ppt
Deep-Learning-2017-Lecture7GAN.pptDeep-Learning-2017-Lecture7GAN.ppt
Deep-Learning-2017-Lecture7GAN.ppt
 
Untitled 6.pptx
Untitled 6.pptxUntitled 6.pptx
Untitled 6.pptx
 
rest motion.pptx
rest motion.pptxrest motion.pptx
rest motion.pptx
 
Lecture_3.pptx
Lecture_3.pptxLecture_3.pptx
Lecture_3.pptx
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
 
09092019-Block.one-Presentation.pptx
09092019-Block.one-Presentation.pptx09092019-Block.one-Presentation.pptx
09092019-Block.one-Presentation.pptx
 

Recently uploaded

Autodesk Construction Cloud (Autodesk Build).pptx
Autodesk Construction Cloud (Autodesk Build).pptxAutodesk Construction Cloud (Autodesk Build).pptx
Autodesk Construction Cloud (Autodesk Build).pptxMustafa Ahmed
 
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024EMMANUELLEFRANCEHELI
 
Worksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptxWorksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptxMustafa Ahmed
 
Filters for Electromagnetic Compatibility Applications
Filters for Electromagnetic Compatibility ApplicationsFilters for Electromagnetic Compatibility Applications
Filters for Electromagnetic Compatibility ApplicationsMathias Magdowski
 
21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docxrahulmanepalli02
 
Augmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxAugmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxMustafa Ahmed
 
Interfacing Analog to Digital Data Converters ee3404.pdf
Interfacing Analog to Digital Data Converters ee3404.pdfInterfacing Analog to Digital Data Converters ee3404.pdf
Interfacing Analog to Digital Data Converters ee3404.pdfragupathi90
 
15-Minute City: A Completely New Horizon
15-Minute City: A Completely New Horizon15-Minute City: A Completely New Horizon
15-Minute City: A Completely New HorizonMorshed Ahmed Rahath
 
Working Principle of Echo Sounder and Doppler Effect.pdf
Working Principle of Echo Sounder and Doppler Effect.pdfWorking Principle of Echo Sounder and Doppler Effect.pdf
Working Principle of Echo Sounder and Doppler Effect.pdfSkNahidulIslamShrabo
 
UNIT-2 image enhancement.pdf Image Processing Unit 2 AKTU
UNIT-2 image enhancement.pdf Image Processing Unit 2 AKTUUNIT-2 image enhancement.pdf Image Processing Unit 2 AKTU
UNIT-2 image enhancement.pdf Image Processing Unit 2 AKTUankushspencer015
 
Independent Solar-Powered Electric Vehicle Charging Station
Independent Solar-Powered Electric Vehicle Charging StationIndependent Solar-Powered Electric Vehicle Charging Station
Independent Solar-Powered Electric Vehicle Charging Stationsiddharthteach18
 
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas SachpazisSeismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas SachpazisDr.Costas Sachpazis
 
engineering chemistry power point presentation
engineering chemistry  power point presentationengineering chemistry  power point presentation
engineering chemistry power point presentationsj9399037128
 
Research Methodolgy & Intellectual Property Rights Series 1
Research Methodolgy & Intellectual Property Rights Series 1Research Methodolgy & Intellectual Property Rights Series 1
Research Methodolgy & Intellectual Property Rights Series 1T.D. Shashikala
 
Artificial intelligence presentation2-171219131633.pdf
Artificial intelligence presentation2-171219131633.pdfArtificial intelligence presentation2-171219131633.pdf
Artificial intelligence presentation2-171219131633.pdfKira Dess
 
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdfInstruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdfEr.Sonali Nasikkar
 
Final DBMS Manual (2).pdf final lab manual
Final DBMS Manual (2).pdf final lab manualFinal DBMS Manual (2).pdf final lab manual
Final DBMS Manual (2).pdf final lab manualBalamuruganV28
 
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...drjose256
 
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdfInvolute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdfJNTUA
 
Artificial Intelligence in due diligence
Artificial Intelligence in due diligenceArtificial Intelligence in due diligence
Artificial Intelligence in due diligencemahaffeycheryld
 

Recently uploaded (20)

Autodesk Construction Cloud (Autodesk Build).pptx
Autodesk Construction Cloud (Autodesk Build).pptxAutodesk Construction Cloud (Autodesk Build).pptx
Autodesk Construction Cloud (Autodesk Build).pptx
 
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024
 
Worksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptxWorksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptx
 
Filters for Electromagnetic Compatibility Applications
Filters for Electromagnetic Compatibility ApplicationsFilters for Electromagnetic Compatibility Applications
Filters for Electromagnetic Compatibility Applications
 
21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx
 
Augmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxAugmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptx
 
Interfacing Analog to Digital Data Converters ee3404.pdf
Interfacing Analog to Digital Data Converters ee3404.pdfInterfacing Analog to Digital Data Converters ee3404.pdf
Interfacing Analog to Digital Data Converters ee3404.pdf
 
15-Minute City: A Completely New Horizon
15-Minute City: A Completely New Horizon15-Minute City: A Completely New Horizon
15-Minute City: A Completely New Horizon
 
Working Principle of Echo Sounder and Doppler Effect.pdf
Working Principle of Echo Sounder and Doppler Effect.pdfWorking Principle of Echo Sounder and Doppler Effect.pdf
Working Principle of Echo Sounder and Doppler Effect.pdf
 
UNIT-2 image enhancement.pdf Image Processing Unit 2 AKTU
UNIT-2 image enhancement.pdf Image Processing Unit 2 AKTUUNIT-2 image enhancement.pdf Image Processing Unit 2 AKTU
UNIT-2 image enhancement.pdf Image Processing Unit 2 AKTU
 
Independent Solar-Powered Electric Vehicle Charging Station
Independent Solar-Powered Electric Vehicle Charging StationIndependent Solar-Powered Electric Vehicle Charging Station
Independent Solar-Powered Electric Vehicle Charging Station
 
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas SachpazisSeismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
 
engineering chemistry power point presentation
engineering chemistry  power point presentationengineering chemistry  power point presentation
engineering chemistry power point presentation
 
Research Methodolgy & Intellectual Property Rights Series 1
Research Methodolgy & Intellectual Property Rights Series 1Research Methodolgy & Intellectual Property Rights Series 1
Research Methodolgy & Intellectual Property Rights Series 1
 
Artificial intelligence presentation2-171219131633.pdf
Artificial intelligence presentation2-171219131633.pdfArtificial intelligence presentation2-171219131633.pdf
Artificial intelligence presentation2-171219131633.pdf
 
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdfInstruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
 
Final DBMS Manual (2).pdf final lab manual
Final DBMS Manual (2).pdf final lab manualFinal DBMS Manual (2).pdf final lab manual
Final DBMS Manual (2).pdf final lab manual
 
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
 
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdfInvolute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
 
Artificial Intelligence in due diligence
Artificial Intelligence in due diligenceArtificial Intelligence in due diligence
Artificial Intelligence in due diligence
 

privacy preserving forenciscs of encyrpted data.pptx

  • 2. privacy-preserving data mining? Privacy-preserving data mining refers to a set of methods that enable the analysis of data without disclosing the sensitive information of the organizations or individuals whose data is being examined. This can be achieved through a variety of techniques
  • 3. Key Techniques in Privacy- Preserving Data Mining Anonymization : K-Anonymity: Ensures that each record in a dataset is indistinguishable from at least k-1 other records. This is typically achieved by generalizing or suppressing certain attributes. L-Diversity: Extends k-anonymity by ensuring that each group of indistinguishable records has at least l distinct values for a sensitive attribute. T-Closeness: Focuses on the distribution of sensitive attributes within each anonymized group, ensuring that it is close to the overall distribution in the dataset.
  • 4. Anonymization Techniques of Privacy Preservation Data Publishing(clinical data). Data anonymisation, also known as data masking or desensitization, is used to hide or conceal any sensitive data about an individual, thus preventing the re-identification of the individual
  • 5. Differential Privacy:  Differential privacy mechanisms: It introduces noise or randomness to query responses in a way that protects individual privacy.  The key idea is to ensure that the inclusion or exclusion of a single record does not significantly impact the outcome of a query.
  • 6. Data Perturbation  This involve sintroducing controlled noise or random variations to individual data points, making it more challenging to identify specific individuals while still extracting valuable insights. Various transformation techniques such as: scaling, shearing, reflection, rotation etc. can also be used to perturb data points.
  • 7. Encryption:  Enables computations to be performed on encrypted data without decrypting it.  Allows data to be kept confidential even during processing, reducing the exposure of sensitive information.
  • 8. Searching in encryption Searchable Encryption (SE) Enables computations to be performed on encrypted data without decrypting it. Allows data to be kept confidential even during processing, reducing the exposure of sensitive Information. The servers use Boolean or Ranked search
  • 9. SSE (Searchable Symmetric Encryption) - AES algorithm with either CTR or CBC PEKS (Public Key Encryption with Key-word Search) -RSA or ElGamal, or Elliptic Curve Cryptography (ECC)
  • 10. Searchable Encryption Process  As SSE approaches use the same secret key for encryption and decryption, they are computationally efficient than the ASE, which uses a different key for both encryption and decyption. SSE approaches are primarily meant for enabling data access only by data owners that have the corresponding secret key.  To enable the data access by other users in SSE, the data owners have to provide them with either the secret key or the encrypted queries.  On the other hand, PEKS approaches [23] are meant for sharing the stored data with multiple users, and it also supports expressive queries, but these approaches are computationally expensive.
  • 11. Searchable Encryption Process  Encryption of indexes: Once the plaintext indexes are generated, they need to be encrypted using encryption schemes such as AES, RSA, Deterministic Encryption (DE), Functional encryption(FE), Predicate Encryption, etc.  Encryption of plaintext documents: Data owners are then required to encrypt the plaintext documents using either a public key or secret key encryption scheme with a sufficiently large key.Incorporation of ranking information: Searchable indexes should include ranking information determined using various keyword weight measures such as Term-Frequency (TF), Term-Frequency-Inverse Document Frequency (TF-IDF), etc. This ranking information also needs to be encrypted using encryption schemes such as Order Preserving Encryption (OPE), Fully Homomorphic Encryption (FHE), and Paillier Encryption (PE).Upload of encrypted documents and indexes to cloud servers: Data owners then upload the encrypted documents and their corresponding searchable indexes onto the cloud servers.  lIssuance of trapdoors and retrieval of documents: Data owners and authorized data users issue trapdoors, i.e., queries in encrypted form along with a value 'k' to the cloud server, which returns the top-k documents with the help of ranking
  • 12. Generate plaintext indexes other statistical methods to determine the relevance of each token within the document collection.  lConstructing the index: Create a data structure, such as an inverted index, that maps each token to the documents in which it appears and the corresponding weights or relevance scores. This allows for efficient retrieval of documents based on search queries.  lEncryption: Once the plaintext indexes are generated, they need to be encrypted using suitable encryption schemes such as AES, RSA, or other cryptographic methods to ensure the confidentiality and privacy of the index information.Generation of plaintext indexes: Data owners are required to generate plaintext indexes for all their documents. This can be achieved using different indexing schemes such as Forward indexing and Inverted indexing, each represented by various data structures.  Encryption of indexes: Once the plaintext indexes are generated, they need to be encrypted using encryption schemes such as AES, RSA, Deterministic Encryption (DE), Functional encryption(FE), Predicate Encryption, etc.  Encryption of plaintext documents: Data owners are then required to encrypt the plaintext documents using either a public key or secret key encryption scheme with a sufficiently large key.Incorporation of
  • 13. Constructing the index  Indexing is a process in information retrieval where an index is created to map terms or keywords to their occurrences in a document.  It helps in quickly locating the positions of terms within the document, enabling efficient retrieval of information.  Forward indexing, Inverted indexing, tree-based indexing, Bloom filters, Bucketization.
  • 14. Encrypting the indices  Symetric, public keye ncryption, order-preserving encryption, and homomorphic encryption.  Generate Encryption Keys: Depending on the chosen encryption scheme, generate the necessary encryption keys. For symmetric key encryption, a single key is used for both encryption and decryption. In the case of public key encryption, a public key is used for encryption, and a corresponding private key is used for decryption.  Apply Encryption to Indexes: Use the encryption scheme and keys to encrypt the plaintext indexes. This involves applying cryptographic algorithms to transform the index data into ciphertext, rendering it unintelligible to unauthorized parties.
  • 15. Assigning weights Relevance Ranking: -These measures help rank documents based on their relevance to a user's query. -Users are often interested in obtaining the most relevant information first, and ranking helps prioritize results. -Term-Frequency (TF), Term-Frequency-Inverse Document Frequency (TF-IDF), Cosine Similarity, Cosine Similarity and Jaccard Coefficient
  • 16. Ranking information Ranking information in indexes also needs to be encrypted by using Order Preserving Encryption (OPE) [34], Fully Homomorphic Encryption (FHE[43], and Paillier Encryption (PE) [25] schemes. These schemes can be used for encrypting the ranking information as they preserve the order of plaintext ranking information and they also enable ranking lbased on the encrypted ranking information [44], [45].
  • 17. TYPES OF SEARCH Boolean Search Ranked search Single Keyword Boolean Search Multi-Keyword Boolean Search Single Keyword Ranked Search Muti- Keyword Ranked Search