SlideShare a Scribd company logo
Secure Mining of Association Rules in Horizontally
Distributed Databases
ABSTRACT:
We propose a protocol for secure mining of association rules in horizontally
distributed databases. The current leading protocol is that of Kantarcioglu and
Clifton. Our protocol, like theirs, is based on the Fast Distributed Mining (FDM)
algorithm of Cheung et al. which is an unsecured distributed version of the Apriori
algorithm. The main ingredients in our protocol are two novel secure multi-party
algorithms — one that computes the union of private subsets that each of the
interacting players hold, and another that tests the inclusion of an element held by
one player in a subset held by another. Our protocol offers enhanced privacy with
respect to the protocol. In addition, it is simpler and is significantly more efficient
in terms of communication rounds, communication cost and computational cost.
EXISTING SYSTEM:
Kantarcioglu and Clifton studied that problems and devised a protocol for its
solution. The main part of the protocol is a sub-protocol for the secure computation
of the union of private subsets that are held by the different players. (The private
subset of a given player, as we explain below, includes the item sets that are s-
frequent in his partial database. That is the most costly part of the protocol and its
implementation relies upon cryptographic primitives such as commutative
encryption, oblivious transfer, and hash functions. This is also the only part in the
protocol in which the players may extract from their view of the protocol
information on other databases, beyond what is implied by the final output and
their own input. While such leakage of information renders the protocol not
perfectly secure, the perimeter of the excess information is explicitly bounded and
it is argued there that such information leakage is innocuous, whence acceptable
from a practical point of view.
DISADVANTAGES OF EXISTING SYSTEM:
 Insufficient security, simplicity and efficiency are not well in the databases, not
sure in privacy in an existing system.
 While our solution is still not perfectly secure, it leaks excess information only
to a small number (three) of possible coalitions, unlike the protocol of that
discloses information also to some single players.
 Our protocol may leak is less sensitive than the excess information leaked by
the protocol.
PROPOSED SYSTEM:
The protocol that we propose here computes a parameterized family of functions,
which we call threshold functions, in which the two extreme cases correspond to
the problems of computing the union and intersection of private subsets. Those are
in fact general-purpose protocols that can be used in other contexts as well.
Another problem of secure multiparty computation that we solve here as part of
our discussion is the set inclusion problem; namely, the problem where Alice holds
a private subset of some ground set, and Bob holds an element in the ground set,
and they wish to determine whether Bob’s element is within Alice’s subset,
without revealing to either of them information about the other party’s input
beyond the above described inclusion.
ADVANTAGES OF PROPOSED SYSTEM:
 We proposed a protocol for secure mining of association rules in horizontally
distributed databases that improves significantly upon the current leading
protocol in terms of privacy and efficiency.
 The main ingredient in our proposed protocol is a novel secure multi-party
protocol for computing the union (or intersection) of private subsets that each of
the interacting players holds.
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
• System : Pentium IV 2.4 GHz.
• Hard Disk : 40 GB.
• Floppy Drive : 1.44 Mb.
• Monitor : 15 VGA Colour.
• Mouse : Logitech.
• Ram : 512 Mb.
SOFTWARE REQUIREMENTS:
• Operating system : - Windows XP.
• Coding Language : ASP.NET, C#.Net.
• Data Base : SQL Server 2005
REFERENCE:
Tamir Tassa “Secure Mining of Association Rules in Horizontally Distributed
Databases” IEEE TRANSACTIONS ON KNOWLEDGE AND DATA
ENGINEERING, 2013.

More Related Content

Viewers also liked

Presentation1media star pro
Presentation1media star proPresentation1media star pro
Presentation1media star pro
Tafi123
 
1st+music+magazine+powerpoint+taffy+school+13th+december
1st+music+magazine+powerpoint+taffy+school+13th+december1st+music+magazine+powerpoint+taffy+school+13th+december
1st+music+magazine+powerpoint+taffy+school+13th+december
Tafi123
 
Twitsper tweeting privately
Twitsper tweeting privatelyTwitsper tweeting privately
Twitsper tweeting privately
JPINFOTECH JAYAPRAKASH
 
2013 ieee java project titles for cse, it and mca
2013 ieee java project titles for cse, it and mca2013 ieee java project titles for cse, it and mca
2013 ieee java project titles for cse, it and mca
JPINFOTECH JAYAPRAKASH
 
final year ieee projects in pondicherry
final year ieee projects in pondicherryfinal year ieee projects in pondicherry
final year ieee projects in pondicherry
JPINFOTECH JAYAPRAKASH
 
A rank correlation based detection against distributed reflection do s attacks
A rank correlation based detection against distributed reflection do s attacksA rank correlation based detection against distributed reflection do s attacks
A rank correlation based detection against distributed reflection do s attacks
JPINFOTECH JAYAPRAKASH
 
Using fuzzy logic control to provide intelligent traffic management service f...
Using fuzzy logic control to provide intelligent traffic management service f...Using fuzzy logic control to provide intelligent traffic management service f...
Using fuzzy logic control to provide intelligent traffic management service f...
JPINFOTECH JAYAPRAKASH
 
Towards secure multi keyword top-k retrieval over encrypted cloud data
Towards secure multi keyword top-k retrieval over encrypted cloud dataTowards secure multi keyword top-k retrieval over encrypted cloud data
Towards secure multi keyword top-k retrieval over encrypted cloud data
JPINFOTECH JAYAPRAKASH
 
Back pressure-based packet-by-packet adaptive routing in communication networks
Back pressure-based packet-by-packet adaptive routing in communication networksBack pressure-based packet-by-packet adaptive routing in communication networks
Back pressure-based packet-by-packet adaptive routing in communication networks
JPINFOTECH JAYAPRAKASH
 
Identity based secure distributed data storage schemes
Identity based secure distributed data storage schemesIdentity based secure distributed data storage schemes
Identity based secure distributed data storage schemes
JPINFOTECH JAYAPRAKASH
 
Participatory privacy enabling privacy in participatory sensing
Participatory privacy enabling privacy in participatory sensingParticipatory privacy enabling privacy in participatory sensing
Participatory privacy enabling privacy in participatory sensing
JPINFOTECH JAYAPRAKASH
 
IEEE PROJECTS FOR ECE 2013 2014
IEEE PROJECTS FOR ECE 2013 2014IEEE PROJECTS FOR ECE 2013 2014
IEEE PROJECTS FOR ECE 2013 2014
JPINFOTECH JAYAPRAKASH
 
Efficient algorithms for neighbor discovery in wireless networks
Efficient algorithms for neighbor discovery in wireless networksEfficient algorithms for neighbor discovery in wireless networks
Efficient algorithms for neighbor discovery in wireless networks
JPINFOTECH JAYAPRAKASH
 
2013 14 ieee ece project titles - jp infotech
2013 14 ieee ece project titles - jp infotech2013 14 ieee ece project titles - jp infotech
2013 14 ieee ece project titles - jp infotech
JPINFOTECH JAYAPRAKASH
 
Privacy preserving delegated access control in public clouds
Privacy preserving delegated access control in public cloudsPrivacy preserving delegated access control in public clouds
Privacy preserving delegated access control in public clouds
JPINFOTECH JAYAPRAKASH
 
Toward fine grained, unsupervised, scalable performance diagnosis for product...
Toward fine grained, unsupervised, scalable performance diagnosis for product...Toward fine grained, unsupervised, scalable performance diagnosis for product...
Toward fine grained, unsupervised, scalable performance diagnosis for product...
JPINFOTECH JAYAPRAKASH
 
Facilitating document annotation using content and querying value
Facilitating document annotation using content and querying valueFacilitating document annotation using content and querying value
Facilitating document annotation using content and querying value
JPINFOTECH JAYAPRAKASH
 
A highly scalable key pre distribution scheme for wireless sensor networks
A highly scalable key pre distribution scheme for wireless sensor networksA highly scalable key pre distribution scheme for wireless sensor networks
A highly scalable key pre distribution scheme for wireless sensor networks
JPINFOTECH JAYAPRAKASH
 
Distributed cooperative caching in social wireless networks
Distributed cooperative caching in social wireless networksDistributed cooperative caching in social wireless networks
Distributed cooperative caching in social wireless networks
JPINFOTECH JAYAPRAKASH
 
Proteus multiflow diversity routing for wireless networks with cooperative tr...
Proteus multiflow diversity routing for wireless networks with cooperative tr...Proteus multiflow diversity routing for wireless networks with cooperative tr...
Proteus multiflow diversity routing for wireless networks with cooperative tr...
JPINFOTECH JAYAPRAKASH
 

Viewers also liked (20)

Presentation1media star pro
Presentation1media star proPresentation1media star pro
Presentation1media star pro
 
1st+music+magazine+powerpoint+taffy+school+13th+december
1st+music+magazine+powerpoint+taffy+school+13th+december1st+music+magazine+powerpoint+taffy+school+13th+december
1st+music+magazine+powerpoint+taffy+school+13th+december
 
Twitsper tweeting privately
Twitsper tweeting privatelyTwitsper tweeting privately
Twitsper tweeting privately
 
2013 ieee java project titles for cse, it and mca
2013 ieee java project titles for cse, it and mca2013 ieee java project titles for cse, it and mca
2013 ieee java project titles for cse, it and mca
 
final year ieee projects in pondicherry
final year ieee projects in pondicherryfinal year ieee projects in pondicherry
final year ieee projects in pondicherry
 
A rank correlation based detection against distributed reflection do s attacks
A rank correlation based detection against distributed reflection do s attacksA rank correlation based detection against distributed reflection do s attacks
A rank correlation based detection against distributed reflection do s attacks
 
Using fuzzy logic control to provide intelligent traffic management service f...
Using fuzzy logic control to provide intelligent traffic management service f...Using fuzzy logic control to provide intelligent traffic management service f...
Using fuzzy logic control to provide intelligent traffic management service f...
 
Towards secure multi keyword top-k retrieval over encrypted cloud data
Towards secure multi keyword top-k retrieval over encrypted cloud dataTowards secure multi keyword top-k retrieval over encrypted cloud data
Towards secure multi keyword top-k retrieval over encrypted cloud data
 
Back pressure-based packet-by-packet adaptive routing in communication networks
Back pressure-based packet-by-packet adaptive routing in communication networksBack pressure-based packet-by-packet adaptive routing in communication networks
Back pressure-based packet-by-packet adaptive routing in communication networks
 
Identity based secure distributed data storage schemes
Identity based secure distributed data storage schemesIdentity based secure distributed data storage schemes
Identity based secure distributed data storage schemes
 
Participatory privacy enabling privacy in participatory sensing
Participatory privacy enabling privacy in participatory sensingParticipatory privacy enabling privacy in participatory sensing
Participatory privacy enabling privacy in participatory sensing
 
IEEE PROJECTS FOR ECE 2013 2014
IEEE PROJECTS FOR ECE 2013 2014IEEE PROJECTS FOR ECE 2013 2014
IEEE PROJECTS FOR ECE 2013 2014
 
Efficient algorithms for neighbor discovery in wireless networks
Efficient algorithms for neighbor discovery in wireless networksEfficient algorithms for neighbor discovery in wireless networks
Efficient algorithms for neighbor discovery in wireless networks
 
2013 14 ieee ece project titles - jp infotech
2013 14 ieee ece project titles - jp infotech2013 14 ieee ece project titles - jp infotech
2013 14 ieee ece project titles - jp infotech
 
Privacy preserving delegated access control in public clouds
Privacy preserving delegated access control in public cloudsPrivacy preserving delegated access control in public clouds
Privacy preserving delegated access control in public clouds
 
Toward fine grained, unsupervised, scalable performance diagnosis for product...
Toward fine grained, unsupervised, scalable performance diagnosis for product...Toward fine grained, unsupervised, scalable performance diagnosis for product...
Toward fine grained, unsupervised, scalable performance diagnosis for product...
 
Facilitating document annotation using content and querying value
Facilitating document annotation using content and querying valueFacilitating document annotation using content and querying value
Facilitating document annotation using content and querying value
 
A highly scalable key pre distribution scheme for wireless sensor networks
A highly scalable key pre distribution scheme for wireless sensor networksA highly scalable key pre distribution scheme for wireless sensor networks
A highly scalable key pre distribution scheme for wireless sensor networks
 
Distributed cooperative caching in social wireless networks
Distributed cooperative caching in social wireless networksDistributed cooperative caching in social wireless networks
Distributed cooperative caching in social wireless networks
 
Proteus multiflow diversity routing for wireless networks with cooperative tr...
Proteus multiflow diversity routing for wireless networks with cooperative tr...Proteus multiflow diversity routing for wireless networks with cooperative tr...
Proteus multiflow diversity routing for wireless networks with cooperative tr...
 

Similar to Secure mining of association rules in horizontally distributed databases

JPD1416 Secure Mining Of Association Rules In Horizantally Distributed Data...
JPD1416   Secure Mining Of Association Rules In Horizantally Distributed Data...JPD1416   Secure Mining Of Association Rules In Horizantally Distributed Data...
JPD1416 Secure Mining Of Association Rules In Horizantally Distributed Data...
chennaijp
 
2014 IEEE JAVA DATA MINING PROJECT Secure mining of association rules in hori...
2014 IEEE JAVA DATA MINING PROJECT Secure mining of association rules in hori...2014 IEEE JAVA DATA MINING PROJECT Secure mining of association rules in hori...
2014 IEEE JAVA DATA MINING PROJECT Secure mining of association rules in hori...
IEEEMEMTECHSTUDENTSPROJECTS
 
IEEE 2014 JAVA DATA MINING PROJECTS Secure mining of association rules in hor...
IEEE 2014 JAVA DATA MINING PROJECTS Secure mining of association rules in hor...IEEE 2014 JAVA DATA MINING PROJECTS Secure mining of association rules in hor...
IEEE 2014 JAVA DATA MINING PROJECTS Secure mining of association rules in hor...
IEEEFINALYEARSTUDENTPROJECTS
 
JAVA 2013 IEEE DATAMINING PROJECT Secure mining of association rules in horiz...
JAVA 2013 IEEE DATAMINING PROJECT Secure mining of association rules in horiz...JAVA 2013 IEEE DATAMINING PROJECT Secure mining of association rules in horiz...
JAVA 2013 IEEE DATAMINING PROJECT Secure mining of association rules in horiz...
IEEEGLOBALSOFTTECHNOLOGIES
 
Data Sharing: Ensure Accountability Distribution in the Cloud
Data Sharing: Ensure Accountability Distribution in the CloudData Sharing: Ensure Accountability Distribution in the Cloud
Data Sharing: Ensure Accountability Distribution in the Cloud
Suraj Mehta
 
Lesson 2
Lesson 2Lesson 2
Lesson 2
Sandra Ahn
 
secure mining of association rules in horizontally distributed databases
secure mining of association rules in horizontally distributed databasessecure mining of association rules in horizontally distributed databases
secure mining of association rules in horizontally distributed databases
swathi78
 
ITDCC05.ppt
ITDCC05.pptITDCC05.ppt
ITDCC05.ppt
Maruthi Jâcs
 
Blockchain Based Decentralized Cloud System
Blockchain Based Decentralized Cloud SystemBlockchain Based Decentralized Cloud System
Blockchain Based Decentralized Cloud System
Dhruvdoshi25071999
 
Bit sync personal_cloud
Bit sync personal_cloudBit sync personal_cloud
Bit sync personal_cloud
Flavio Vit
 
Data Security And The Security
Data Security And The SecurityData Security And The Security
Data Security And The Security
Rachel Phillips
 
documentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemesdocumentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemes
Sahithi Naraparaju
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
Shakas Technologies
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
Shakas Technologies
 
Free net
Free netFree net
Free net
Rajesh Bodapati
 
Netw204 Quiz Answers Essay
Netw204 Quiz Answers EssayNetw204 Quiz Answers Essay
Netw204 Quiz Answers Essay
Jennifer Letterman
 
JPJ1424 Privacy-Preserving and Content-Protecting Location Based Queries
JPJ1424  Privacy-Preserving and Content-Protecting Location Based QueriesJPJ1424  Privacy-Preserving and Content-Protecting Location Based Queries
JPJ1424 Privacy-Preserving and Content-Protecting Location Based Queries
chennaijp
 
Secure Mining of Association Rules in Horizontally Distributed Databases
Secure Mining of Association Rules in Horizontally Distributed DatabasesSecure Mining of Association Rules in Horizontally Distributed Databases
Secure Mining of Association Rules in Horizontally Distributed Databases
IJSRD
 
Providing user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure cloudsProviding user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure clouds
Kamal Spring
 
Oruta privacy preserving public auditing
Oruta privacy preserving public auditingOruta privacy preserving public auditing
Oruta privacy preserving public auditing
Papitha Velumani
 

Similar to Secure mining of association rules in horizontally distributed databases (20)

JPD1416 Secure Mining Of Association Rules In Horizantally Distributed Data...
JPD1416   Secure Mining Of Association Rules In Horizantally Distributed Data...JPD1416   Secure Mining Of Association Rules In Horizantally Distributed Data...
JPD1416 Secure Mining Of Association Rules In Horizantally Distributed Data...
 
2014 IEEE JAVA DATA MINING PROJECT Secure mining of association rules in hori...
2014 IEEE JAVA DATA MINING PROJECT Secure mining of association rules in hori...2014 IEEE JAVA DATA MINING PROJECT Secure mining of association rules in hori...
2014 IEEE JAVA DATA MINING PROJECT Secure mining of association rules in hori...
 
IEEE 2014 JAVA DATA MINING PROJECTS Secure mining of association rules in hor...
IEEE 2014 JAVA DATA MINING PROJECTS Secure mining of association rules in hor...IEEE 2014 JAVA DATA MINING PROJECTS Secure mining of association rules in hor...
IEEE 2014 JAVA DATA MINING PROJECTS Secure mining of association rules in hor...
 
JAVA 2013 IEEE DATAMINING PROJECT Secure mining of association rules in horiz...
JAVA 2013 IEEE DATAMINING PROJECT Secure mining of association rules in horiz...JAVA 2013 IEEE DATAMINING PROJECT Secure mining of association rules in horiz...
JAVA 2013 IEEE DATAMINING PROJECT Secure mining of association rules in horiz...
 
Data Sharing: Ensure Accountability Distribution in the Cloud
Data Sharing: Ensure Accountability Distribution in the CloudData Sharing: Ensure Accountability Distribution in the Cloud
Data Sharing: Ensure Accountability Distribution in the Cloud
 
Lesson 2
Lesson 2Lesson 2
Lesson 2
 
secure mining of association rules in horizontally distributed databases
secure mining of association rules in horizontally distributed databasessecure mining of association rules in horizontally distributed databases
secure mining of association rules in horizontally distributed databases
 
ITDCC05.ppt
ITDCC05.pptITDCC05.ppt
ITDCC05.ppt
 
Blockchain Based Decentralized Cloud System
Blockchain Based Decentralized Cloud SystemBlockchain Based Decentralized Cloud System
Blockchain Based Decentralized Cloud System
 
Bit sync personal_cloud
Bit sync personal_cloudBit sync personal_cloud
Bit sync personal_cloud
 
Data Security And The Security
Data Security And The SecurityData Security And The Security
Data Security And The Security
 
documentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemesdocumentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemes
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
 
Free net
Free netFree net
Free net
 
Netw204 Quiz Answers Essay
Netw204 Quiz Answers EssayNetw204 Quiz Answers Essay
Netw204 Quiz Answers Essay
 
JPJ1424 Privacy-Preserving and Content-Protecting Location Based Queries
JPJ1424  Privacy-Preserving and Content-Protecting Location Based QueriesJPJ1424  Privacy-Preserving and Content-Protecting Location Based Queries
JPJ1424 Privacy-Preserving and Content-Protecting Location Based Queries
 
Secure Mining of Association Rules in Horizontally Distributed Databases
Secure Mining of Association Rules in Horizontally Distributed DatabasesSecure Mining of Association Rules in Horizontally Distributed Databases
Secure Mining of Association Rules in Horizontally Distributed Databases
 
Providing user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure cloudsProviding user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure clouds
 
Oruta privacy preserving public auditing
Oruta privacy preserving public auditingOruta privacy preserving public auditing
Oruta privacy preserving public auditing
 

Recently uploaded

Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Diana Rendina
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
Nguyen Thanh Tu Collection
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
RAHUL
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
iammrhaywood
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
Nguyen Thanh Tu Collection
 
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
สมใจ จันสุกสี
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
TechSoup
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Fajar Baskoro
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 

Recently uploaded (20)

Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
 
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 

Secure mining of association rules in horizontally distributed databases

  • 1. Secure Mining of Association Rules in Horizontally Distributed Databases ABSTRACT: We propose a protocol for secure mining of association rules in horizontally distributed databases. The current leading protocol is that of Kantarcioglu and Clifton. Our protocol, like theirs, is based on the Fast Distributed Mining (FDM) algorithm of Cheung et al. which is an unsecured distributed version of the Apriori algorithm. The main ingredients in our protocol are two novel secure multi-party algorithms — one that computes the union of private subsets that each of the interacting players hold, and another that tests the inclusion of an element held by one player in a subset held by another. Our protocol offers enhanced privacy with respect to the protocol. In addition, it is simpler and is significantly more efficient in terms of communication rounds, communication cost and computational cost. EXISTING SYSTEM: Kantarcioglu and Clifton studied that problems and devised a protocol for its solution. The main part of the protocol is a sub-protocol for the secure computation of the union of private subsets that are held by the different players. (The private subset of a given player, as we explain below, includes the item sets that are s-
  • 2. frequent in his partial database. That is the most costly part of the protocol and its implementation relies upon cryptographic primitives such as commutative encryption, oblivious transfer, and hash functions. This is also the only part in the protocol in which the players may extract from their view of the protocol information on other databases, beyond what is implied by the final output and their own input. While such leakage of information renders the protocol not perfectly secure, the perimeter of the excess information is explicitly bounded and it is argued there that such information leakage is innocuous, whence acceptable from a practical point of view. DISADVANTAGES OF EXISTING SYSTEM:  Insufficient security, simplicity and efficiency are not well in the databases, not sure in privacy in an existing system.  While our solution is still not perfectly secure, it leaks excess information only to a small number (three) of possible coalitions, unlike the protocol of that discloses information also to some single players.  Our protocol may leak is less sensitive than the excess information leaked by the protocol.
  • 3. PROPOSED SYSTEM: The protocol that we propose here computes a parameterized family of functions, which we call threshold functions, in which the two extreme cases correspond to the problems of computing the union and intersection of private subsets. Those are in fact general-purpose protocols that can be used in other contexts as well. Another problem of secure multiparty computation that we solve here as part of our discussion is the set inclusion problem; namely, the problem where Alice holds a private subset of some ground set, and Bob holds an element in the ground set, and they wish to determine whether Bob’s element is within Alice’s subset, without revealing to either of them information about the other party’s input beyond the above described inclusion. ADVANTAGES OF PROPOSED SYSTEM:  We proposed a protocol for secure mining of association rules in horizontally distributed databases that improves significantly upon the current leading protocol in terms of privacy and efficiency.
  • 4.  The main ingredient in our proposed protocol is a novel secure multi-party protocol for computing the union (or intersection) of private subsets that each of the interacting players holds. SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS: • System : Pentium IV 2.4 GHz. • Hard Disk : 40 GB. • Floppy Drive : 1.44 Mb. • Monitor : 15 VGA Colour. • Mouse : Logitech. • Ram : 512 Mb. SOFTWARE REQUIREMENTS: • Operating system : - Windows XP. • Coding Language : ASP.NET, C#.Net. • Data Base : SQL Server 2005
  • 5. REFERENCE: Tamir Tassa “Secure Mining of Association Rules in Horizontally Distributed Databases” IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2013.