A Two Way Encryption for Privacy Preservation of Outsourced Transaction Databases for Association Rule Mining

Authors

  • Priya Kukade  BE Students, Department of Computer Science & Engineering, Rajiv Gandhi College of Engineering & Research, Nagpur, Maharashtra, India
  • Rajani Tale  BE Students, Department of Computer Science & Engineering, Rajiv Gandhi College of Engineering & Research, Nagpur, Maharashtra, India
  • Shweta Thakre  BE Students, Department of Computer Science & Engineering, Rajiv Gandhi College of Engineering & Research, Nagpur, Maharashtra, India
  • Aishwarya Sonwane  BE Students, Department of Computer Science & Engineering, Rajiv Gandhi College of Engineering & Research, Nagpur, Maharashtra, India
  • Prof. Rashmi Jain  Assistant Professor, Department of Computer Science & Engineering, Rajiv Gandhi College of Engineering & Research, Nagpur, Maharashtra, India

Keywords:

Cloud Computing, Association rule mining, Privacy-preserving outsourcing, Rob Frugal

Abstract

Data mining-as-a-benefit has been chosen as impressive research issue by specialists. The Data Owner can outsource its data to the server which can be later used for mining the association rules. As both the association rules and the outsourced transaction database are private property of data proprietor. The data owner encrypts its data, send data and mining threshold query to the server, and receives the genuine samples from the encoded designs fetched from the server to secure the privacy. The issue of outsourcing transaction database inside a corporate privacy system is examined in this paper. We propose a plan for privacy preserving outsourced data mining. Our plan guarantees that each changed data is distinctive regarding the aggressor's past data. To counter these attacks we utilize Pallier Encryption on after Rob Frugal encryption implemented with a particular true objective to give protection for outsourced data mining. The exploratory outcomes on genuine transaction database demonstrate that our strategies are adaptable, effective and secure privacy.

References

  1. Fosca Giannotti, Laks V. S. Lakshmanan, Anna Monreale, Dino Pedreschi, and Hui (Wendy) Wang,-Privacy-Preserving Mining of Association Rules From Outsourced Transaction Databases, in IEEE SYSTEMS JOURNAL, VOL. 7, NO. 3, SEPTEMBER 2016.
  2. W. K. Wong, D. W. Cheung, E. Hung, B. Kao, and N. Mamoulis,-Security in outsourcing of association rule mining, in Proc. Int. Conf. Very Large Data Bases, 2007, pp. 111-122.
  3. L. Qiu, Y. Li, and X. Wu,-Protecting business intelligence and customer privacy while outsourcing data mining tasks, Knowledge Inform. Syst., vol. 17, no. 1, pp. 99-120, 2008.
  4. C. Clifton, M. Kantarcioglu, and J. Vaidya,-Defining privacy for data mining, in Proc. Nat. Sci. Found. Workshop Next Generation Data Mining, 2002, pp. 126-133.
  5. https://451research.com/reportshort?entityId=78105&referrer=marketing
  6. Yung-Wang Lin, Li-Cheng Yang, Luon-Chang Lin, and Yeong-Chin Chen, Preserving Privacy in Outsourced Database, International Journal of Computer and Communication Engineering, Vol. 3, No. 5, September 2014.
  7. H. Hacigumus, B. Iyer and S. Mehrotra, Providing database as a service, in Proc. of IEEE 18th ICDE, 2002, pp. 29-38.
  8. E. Mykletun, M. Narasimha, and G. Tsudik,Authentication and integrity in outsourced databases, In Proc. of ACM Trans. On Storage, vol. 2, 2006, pp. 107-138.
  9. M. Xie, H. Wang, J. Yin, and X. Meng, Integrity auditing of outsourced data,"VLDB 2007, pp. 782-793.
  10. Zheng-Fei Wang, Ai-Guo Tang,Implementation of Encrypted Data for Outsourced Database, In Proc. of Second International Conference on Computational Intelligence and Natural Computing (CINC), IEEE, 2010, pp. 150-153.
  11. Li Feifei, Marios H, George K, Dynamic Authenticated Index Structures for Outsourced Database, In Proc. of ACM SIGMOD???06. Chicago, Illinois, 2006, pp. 121-132.
  12. SomchartFugkeaw, Achieving Privacy and Security in Multi- Owner Data Outsourcing, In Proc. of IEEE Transactions 2012, pp.239-244.
  13. Weichao Wang, ZhiweiLi,Rodney Owens, Bharat Bhargava,Secure and Efficient Access to Outsourced Data, CCSW'09, November 13, 2009, Chicago, Illinois, USA ACM 978-1-60558-784-4/09/11.
  14. Shucheng Yu, Cong Wang, KuiRen, and WenjingLou,Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing, IEEE INFOCOM 2010.
  15. M. Xie, H. Wang, J. Yin, and X. Meng, Integrity auditing of outsourced data, VLDB 2007, pp. 782-793
  16. W. K. Wong, D. W. Cheung, E. Hung, B. Kao, and N. Mamoulis, "Security in outsourcing of association rule mining," in Proc. Int. Conf. Very Large Data Bases, 2007, pp. 111-122.
  17. G. I. Davida, D. L. Wells, and J. B. Kam. "A database encryption system with sub keys." ACM TODS, 6(2):312-328, 1981.
  18. J. He and M. Wang. Cryptography and relational database management systems. In IDEAS, 2001.
  19. B. Iyer, S. Mehrotra, E. Mykletun, G. Tsudik, and Y. Wu. A framework for efficient storage security in RDBMS. In EDBT, 2004.
  20. C. Tai, P. S. Yu, and M. Chen, "K-support anonymity based on pseudo taxonomy for outsourcing of frequent item set mining," in Proc. Int. Knowledge Discovery Data Mining, 2010, pp. 473-482.
  21. F. Giannotti, L. V. Lakshmanan, A. Monreale, D. Pedreschi, and H.Wang, "Privacy preserving data mining from outsourced databases," in Proc. SPCC2010 Conjunction with CPDP, 2010, pp. 411-426.
  22. M. Kantarcioglu and C. Clifton, "Privacy-preserving distributed mining of association rules on horizontally partitioned data," IEEE Trans. Knowledge Data Eng., vol. 16, no. 9, pp. 1026-1037, Sep. 2004.
  23. S. J. Rizvi and J. R. Haritsa, "Maintaining data privacy in association rule mining", in Proc. Int. Conf. Very Large Data Bases, 2002.
  24. A. Evfimievski, R. Srikant, R. Agrawal, J. Gehrke, "Privacy Preserving Mining of Association Rules", Information System, 2004.
  25. H. Kargupta, S. Datta, Q. Wang, K. Sivakumar, "On the Privacy Preserving Properties of Random Data Perturbation Techniques", In Proceedings of the 3rd International Conference on Data Mining, 2003.
  26. Z. Huang, W. Du, B. Chen, "Deriving Private Information from Randomized Data", In Proceedings of the ACM SIGMOD Conference on Management of Data, 2005.
  27. S. L. Warner, "Randomized Response: A Survey Technique for Eliminating Evasive Answer Bias", J. Am. Stat. Assoc., 1965.

Downloads

Published

2018-04-30

Issue

Section

Research Articles

How to Cite

[1]
Priya Kukade, Rajani Tale, Shweta Thakre, Aishwarya Sonwane, Prof. Rashmi Jain, " A Two Way Encryption for Privacy Preservation of Outsourced Transaction Databases for Association Rule Mining, International Journal of Scientific Research in Science and Technology(IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011, Volume 4, Issue 5, pp.276-285, March-April-2018.