8 research outputs found

    An approach of Privacy Preserving Data mining using Perturbation & Cryptography Technique

    Get PDF
    Due to the wide deployment of information technology, privacy concern has been major issue in data mining. So for that new path is identified which is known as Privacy Preserving Data Mining (PDDM). Available PDDM techniques are Perturbation, Generalization, Anonymization, Randomization and Cryptography. All of them have some advantages as well as disadvantages also. If apply only cryptography PDDM using symmetric key encryption algorithm, then there will chances of losing data, because if anyone knows the key then data is available to anyone. If we apply perturbation PDDM only then it will not give you accurate result. So if we will use cryptography and perturbation then it will achieve security as well as very less chances of losing data after applying the privacy preserving

    PRIVACY PRESERVING DATA MINING TECHNIQUES USING RECENT ALGORITHMS

    Get PDF
    The privacy preserving data mining is playing crucial role act as rising technology to perform various data mining operations on private data and to pass on data in a secured way to protect sensitive data. Many types of technique such as randomization, secured sum algorithms and k-anonymity have been suggested in order to execute privacy preserving data mining. In this survey paper, on current researches made on privacy preserving data mining technique with fuzzy logic, neural network learning, secured sum and various encryption algorithm is presented. This will enable to grasp the various challenges faced in privacy preserving data mining and also help us to find best suitable technique for various data environment

    Privacy preserving association rule mining using attribute-identity mapping

    Get PDF
    Association rule mining uncovers hidden yet important patterns in data. Discovery of the patterns helps data owners to make right decision to enhance efficiency, increase profit and reduce loss. However, there is privacy concern especially when the data owner is not the miner or when many parties are involved. This research studied privacy preserving association rule mining (PPARM) of horizontally partitioned and outsourced data. Existing research works in the area concentrated mainly on the privacy issue and paid very little attention to data quality issue. Meanwhile, the more the data quality, the more accurate and reliable will the association rules be. Consequently, this research proposed Attribute-Identity Mapping (AIM) as a PPARM technique to address the data quality issue. Given a dataset, AIM identifies set of attributes, attribute values for each attribute. It then assigns ‘unique’ identity for each of the attributes and their corresponding values. It then generates sanitized dataset by replacing each attribute and its values with their corresponding identities. For privacy preservation purpose, the sanitization process will be carried out by data owners. They then send the sanitized data, which is made up of only identities, to data miner. When any or all the data owners need(s) ARM result from the aggregate data, they send query to the data miner. The query constitutes attributes (in form of identities), minSup and minConf thresholds and then number of rules they are want. Results obtained show that the PPARM technique maintains 100% data quality without compromising privacy, using Census Income dataset

    Privacy-preserving Data clustering in Cloud Computing based on Fully Homomorphic Encryption

    Get PDF
    Cloud infrastructure with its massive storage and computing power is an ideal platform to perform large scale data analysis tasks to extract knowledge and support decision-making. However, there are critical data privacy and security issues associated with this platform, as the data is stored in a public infrastructure. Recently, fully homomorphic data encryption has been proposed as a solution due to its capabilities in performing computations over encrypted data. However, it is demonstrably slow for practical data mining applications. To address this and related concerns, we introduce a fully homomorphic and distributed data processing framework that utilizes MapReduce to perform distributed computations for data clustering tasks on a large number of cloud Virtual Machines (VMs). We illustrate how a variety of fully homomorphic-based computations can be carried out to accomplish data clustering tasks independently in the cloud and show that the distributed execution of data clustering tasks based on MapReduce can significantly reduce the execution time overhead caused by fully homomorphic computations. To evaluate our framework, we performed experiments using electricity consumption measurement data on the Google cloud platform with 100 VMs. We found the proposed distributed data processing framework to be highly efficient when compared to a centralized approach and as accurate as a plaintext implementation

    Comprehensive survey on big data privacy protection

    Get PDF
    In recent years, the ever-mounting problem of Internet phishing has been threatening the secure propagation of sensitive data over the web, thereby resulting in either outright decline of data distribution or inaccurate data distribution from several data providers. Therefore, user privacy has evolved into a critical issue in various data mining operations. User privacy has turned out to be a foremost criterion for allowing the transfer of confidential information. The intense surge in storing the personal data of customers (i.e., big data) has resulted in a new research area, which is referred to as privacy-preserving data mining (PPDM). A key issue of PPDM is how to manipulate data using a specific approach to enable the development of a good data mining model on modified data, thereby meeting a specified privacy need with minimum loss of information for the intended data analysis task. The current review study aims to utilize the tasks of data mining operations without risking the security of individuals’ sensitive information, particularly at the record level. To this end, PPDM techniques are reviewed and classified using various approaches for data modification. Furthermore, a critical comparative analysis is performed for the advantages and drawbacks of PPDM techniques. This review study also elaborates on the existing challenges and unresolved issues in PPDM.Published versio

    Performance Evaluation of three Data Access Control Schemes for Cloud Computing

    Get PDF
    Cloud services are flourishing recently, both among computer users and business enterprises. They deliver remote, on-demand, convenient services for data storage, access and processing. While embracing the benefits brought by various cloud services, the consumers are faced with data disclosure, privacy leaks and malicious attacks. Therefore, it is important to use strong access control policies to maintain the security and confidentiality of the data stored in the cloud. This thesis studies the performance of three existing security schemes proposed for cloud data access control on the basis of trust and reputation. We implement the three schemes and conduct computation complexity analysis, security analysis and performance evaluation. This thesis introduces the implementation of a number of cryptographic algorithms applied in the above data access control schemes, including Proxy Re-encryption (PRE) and Ciphertext-Policy Attribute Based Encryption (CP-ABE), reputation generation and secure data transmission over Secure Socket Layer (SSL). We summarize the evaluation results and compare the performances in the aspects of computation and communication costs, flexibility, scalability and feasibility of practical usage. Pros and cons, as well as suitable application scenarios of the three schemes are further discussed

    Tecnología y Accesibilidad Volumen 2

    Get PDF
    Prologar el texto de las actas del VII Congreso Internacional sobre Aplicación de Tecnologías de la Información y Comunicaciones Avanzadas (ATICA2016) y de la IV Conferencia Internacional sobre Aplicación de Tecnologías de la Información y Comunicaciones para mejorar la Accesibilidad (ATICAcces 2016), no solo es una tarea privilegiada sino también una responsabilidad, en especial con la sociedad que solicita tecnologías inclusivas y comunicaciones efectivas en pro de la equidad. Es interesante señalar que el anhelo por consolidar categorías que favorezcan la participación social ha sido el sueño y trabajo de muchos, por ejemplo vale recordar que en este año del Congreso se cumplen 500 desde que Tomás Moro ofreciera al mundo su voz en “UTOPIA”, donde en la idealización de su isla estampó una cultura de trabajo, cooperación y democracia, sin descuidar que proclamó a Amauroto, la capital de su República, como una de total accesibilidad para que todo ciudadano pueda llegar y gozar de ella, con suficiente agua para todos; su localidad estaba constituida por casas que eran custodiadas por cerraduras tan simples que cualquiera podía ingresar o salir de ellas ya que el verdadero tesoro de toda persona era su propio ser. Este breve evocar, da la pauta para promover Utopías necesarias en cuanto a las TIC, que aunque sabemos que es quimérico hablar de ellas como totalmente abiertas y al alcance de todos, debería ser éste el ideal de los hombres cuya ciencia, hoy en día, permite integrarnos a esta nuestra aldea global, es por ello que ATICA 2016 busca romper aquellos muros virtuales y tecnológicos que impiden una comunicación efectiva en nuestros tiempos. El trabajo del Congreso también semeja a la norma de discusión del Senado de Utopía, donde sus expositores socializan sus lógicas mejores, no hay intervención que no sea fruto de la madurez de un proceso investigativo científico que procure el bien público. Parece igualmente exacto ver como entre los participantes existe una suerte de familia, que aunque adoptiva, por configurarse alrededor de un objetivo común como ATICA 2016, a todos ellos, su dedicación a la ciencia y la tecnología al servicio de los más necesitados, los ha unido. En esta ocasión los autores representan a 11 países: Argentina, Brasil, Colombia, Cuba, Ecuador, España, Francia, Guatemala, México, Panamá y Perú; es notable ver como los frutos académicos expuestos en los 80 artículos científicos aceptados de un total de 115 enviados, 36 abordan la línea de “Aplicación de Tecnologías de la Información y Comunicaciones para mejorar la Accesibilidad” y los restantes 44 son sobre “Aplicación de Tecnologías de la Información y Comunicaciones Avanzadas”, todos ellos superan en mucho las horas normales de trabajo, en resumen es evidente el esfuerzo académico y la convicción por un mundo más accesible desde las TIC .En el relato de Moro, la verdadera felicidad, es la libertad y el desarrollo de valores espirituales, pero también existe posibilidad para la guerra y la esclavitud, asimismo como la ciencia y tecnología pueden ser consideradas herramientas de doble arista; por ello el Congreso enfocó muy bien su debate y su comité científico, formado por académicos internacionales, aseguró que ATICA 2016 esté en torno a la inclusión y a la equidad. Igual satisfacción que dejó en su tiempo Utopía a aquellos a los cuáles le fue develada, encontrarán las gentes de hoy en ATICA 2016. Las memorias del evento ponen de manifiesto nuevas lógicas comunicativas y tecnológicas, pero sobre todo nos dicen que, conforme hace 500 años, es posible soñar en un futuro mejor si la ciencia y tecnología están al servicio del ser humano

    A Review on Privacy Preserving Data Mining using Secure Multiparty Computation

    No full text
    corecore