Secure and Efficient Web Usage Mining : A Novel Framework for Prediction of Consumer Behaviour
Keywords:
Security, Consumer Behaviour, Web Usage Mining, Data Integrity, Active AttacksAbstract
To protect the weblog data from various threats of active attacks security of data is the major challenge for the organization. To obtain maximum profit keeping intact the interest of consumers is some other major aspect of an organization. Web usage mining techniques prove a benchmark in the field of web development consumer behaviour web intelligence. In the past to analyze consumers behaviour conventional Apriori algorithm was used and improved version i.e. T_Apriori algorithm was introduced by the researcher but problems of space complexity time complexity and no concept of security of the data is found in these algorithms. The present paper presents a Novel Secure and Efficient Web Usage Mining(SEWUM)which not only ensure the security of data but also accurately predicts consumer behaviour with the security of data by exhausting the Hash table Hashing Encryption Message-Digest (MD5) algorithm encoding and decoding and anti-monotonicity Apriori property has a distinct edge over the classical Apriori algorithm and T_Apriori algorithm. The performance evaluation of the proposed system is carried out in python on real data (weblogs). Experimental results show that the proposed technique is more effective for the organization and results can be obtained in less memory consumption and less execution time.
References
- Li Yong-hong; Liu Xiao-liang(2010), "Research of data mining based on e-commerce," Computer Science and Information Technology (ICCSIT), 2010 3rd IEEE International Conference on , vol.4, no., pp.719-722.
- Chaoyang Xiang; Shenghui He; Lei Chen (2009), "A Studying System Based on Web Mining," Intelligent Ubiquitous Computing and Education, 2009 International Symposium on, vol., no., pp.433, 435.
- Li Mei; Feng Cheng(2010), "Overview of Web mining technology and its application in e-commerce," Computer Engineering and Technology (ICCET), 2010 2nd International Conference on, vol.7, no., pp.V7-277,V7-280.
- Prof. Dr. M. E. Mohammad pourzarandi, R. Tamimi(2013), “ The Application of Web Usage Mining In E-commerce Security”, International Journal of Information Science and Management, IJISM, Special Issue (ECDC 2013)
- B. Uma Maheswari, Dr. P.Sumathi (2015), “A Comparative Study of Rule Mining Based Web Usage Mining Algorithms”, International Journal of Science and Research (IJSR), ISSN: 2319-7064, Vol-4, Issue-11, pp: 2540-2543.
- Ashish Vitthalrao Galphade and Dhiraj Bhise (2016), “Suggestion of an Apriory Algorithm for Web Recommendation System”, Imperial Journal of Interdisciplinary Research (IJIR), ISSN: 2454-1362, Vol-2, Issue-8, pp: 997-1001.
- Ida Bagus Ary Indra Iswara, Ketut Sudarsana(2018),” Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for File Security,” International Journal of Engineering & Technology, 7(3.2), pp. 783-785.
- Sonia Sharma, Dalip (2020), “A Novel Secure Web Usage Mining Technique to Predict Consumer Behaviour” International Journal of Advanced Science and Technology. Vol. 29, No. 5, (2020), pp. 5633 – 5640.ISSN: 2005-4238 IJAST.
- Sonia Sharma, Dalip (2019),”Comparative Analysis of various tools to Predict Consumer Behaviour” Journal of Computational and Theoretical Nano science Vol. 16, 3860–3866, 2019.
- www.answerminer.com
- K.Vanitha and R.Santhi (2011), “Using Hash Based Apriori Algorithm to Reduce the Candidate 2-Itemsets for mining Association Rule” .Journal of Global Research in Computer Science. Volume 2, No. 5, April 2011
- Arwa Altameem and Mourad Ykhlef(2018). Hybrid Approach for Improving Efficiency of Apriori Algorithm on Frequent Itemset, IJCSNS International Journal of Computer Science and Network Security, VOL.18 No.5, pp.151-156.
- Z. Chen, S. Cai, Q. Song, and C. Zhu. Retracted Article (2011),” An improved Apriori algorithm based on pruning optimization and transaction reduction”, 2nd Int. Conf. Artif. Intell. Manag.Sci. Electron. Commer. AIMSEC 2011 - Proc., pp. 1908–1911.
- Q. Zhang(2013), “The Application of Apriori Algorithm in Analysis on Admitted Students of Colleges and Universities, Appl. Mech. Mater., vol. 321–324, pp. 2578–2582..
- Y. Guo, M. Wang, and X. Li (2017), “Application of an Improved Apriori algorithm in a Mobile ecommerceRecommendation System”, Ind.Manag. Data Syst., vol. 117, no. 2, pp. 287–303.
- N. Duru. An Application of Apriori Algorithmon a Diabetic Database, Database, vol. 3681 LNAI, pp. 398–404, 2005.
- Sonia Sharma, Dalip, "Web Logs - A Roadmap to Online Consumer", International Journal of Scientific Research in Science, Engineering and Technology (IJSRSET), Online ISSN : 2394-4099, Print ISSN : 2395-1990, Volume 6 Issue 1, pp. 576-581, January February 2019.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRST

This work is licensed under a Creative Commons Attribution 4.0 International License.