1,667 research outputs found

    Significance of Data Structures and Data Retrieval Techniques on Sequence Rule Mining Efficacy

    Get PDF
    Sequence mining intends to discover rules from diverse datasets by implementing Rule Mining Algorithms with efficient data structures and data retrieval techniques. Traditional algorithms struggle in handling variable support measures which may involve repeated reconstruction of the underlying data structures with changing thresholds. To address these issues the premiere Sequence Mining Algorithm, AprioriAll is implemented against an Educational and a Financial Dataset, using the HASH and the TRIE data structures with scan reduction techniques. Primary idea is to study the impact of data structures and retrieval techniques on the rule mining process in handling diverse datasets. Performance Evaluation Matrices- Support, Confidence and Lifts are considered for testing the efficacies of the algorithm in terms of memory requirements and execution time complexities. Results unveil the excellence of Hashing in tree construction time and memory overhead for fixed sets of pre-defined support thresholds. Whereas, TRIE may avoid reconstruction and is capable of handling dynamic support thresholds, leading to shorter rule discovery time but higher memory consumption. This study highlights the effectiveness of Hash and TRIE data structures considering the dataset characteristics during rule mining. It underscores the importance of appropriate data structures based on dataset features, scanning techniques, and user-defined parameters

    The coexistence between Blockchain and GDPR

    Get PDF
    The constant evolution of technology sometimes cannot avoid conflict with the parallel evolution of surrounding regulations and legislation. This dissertation highlights the Blockchain architectural design and its inherent and apparent incompatibility with the standing European directives concerning General Data Protection Regulation (GDPR) thanks to one of its most prominent features - immutability. As Blockchain-based solutions emerge and their adoption increases, the concerns about current regulation regarding storage of personal data and the conciliation with the Blockchainā€™s model arises. As a consequence, this research aims to find out a practical way of making Blockchains compatible with GDPR and providing a solution, with the elaboration of a Proof of Concept, along with interviews to experts of Blockchain and GDPRā€™s fields with the purpose of obtaining results and drawing conclusions.A constante evoluĆ§Ć£o que categoriza a tecnologia nĆ£o pode, por vezes, evitar conflitos com a evoluĆ§Ć£o paralela de regulamentos e de legislaƧƵes envolventes. Esta dissertaĆ§Ć£o destaca a discrepĆ¢ncia entre a arquitetura inerente dos sistemas de Blockchain e a sua incompatibilidade aparente e inerente Ć s diretrizes europeias assentes sobre o Regulamento Geral de ProteĆ§Ć£o de Dados, graƧas a uma das suas caracterĆ­sticas mais importantes ā€“ imutabilidade. ƀ medida que as soluƧƵes baseadas em Blockchain surgem e a sua adopĆ§Ć£o aumenta, surgem preocupaƧƵes sobre a regulamentaĆ§Ć£o atual em relaĆ§Ć£o ao armazenamento de dados pessoais e a conciliaĆ§Ć£o com o modelo da Blockchain. Consequentemente, esta pesquisa tem como objectivo descobrir uma maneira prĆ”tica de tornar a tecnologia Blockchain compatĆ­vel com o Regulamento Geral de ProteĆ§Ć£o de Dados e fornecer uma soluĆ§Ć£o atravĆ©s da elaboraĆ§Ć£o de uma Prova de Conceito, alĆ©m de entrevistas com especialistas das Ć”reas de Blockchain e Regulamento Geral de ProteĆ§Ć£o de Dados com o objetivo de obter resultados e tirar conclusƵes

    Literature Review on Secure Mining of Association Rules in Horizontally Distributed Databases

    Get PDF
    Data and knowledge Engineering is one of the area under data mining. Which can extract important knowledge from large database, but sometimes these database are divided among various parties. This paper addresses a fast distributed mining of association rules over horizontally distributed data. This paper presents different methods for secure mining of association rules in horizontally distributed databases. The main aim of this paper is protocol for secure mining of association rules in horizontally distributed databases. The current main protocol is that of Kantarcioglu and Clifton. This protocol, like theirs, is based on the Fast Distributed Mining (FDM) algorithm of Cheung et al., which is an unsecured distributed version of the Apriori algorithm. The main components in this protocol are two novel secure multi-party algorithms ā€” one that computes the union of private subsets that each of the interacting players hold, and another that tests the inclusion of an element held by one player in a subset held by another. This protocol offers improved privacy with respect to the protocol in. In addition, it is simpler and is significantly more efficient in terms of communication rounds, communication cost and computational cost

    ANCHOR: logically-centralized security for Software-Defined Networks

    Get PDF
    While the centralization of SDN brought advantages such as a faster pace of innovation, it also disrupted some of the natural defenses of traditional architectures against different threats. The literature on SDN has mostly been concerned with the functional side, despite some specific works concerning non-functional properties like 'security' or 'dependability'. Though addressing the latter in an ad-hoc, piecemeal way, may work, it will most likely lead to efficiency and effectiveness problems. We claim that the enforcement of non-functional properties as a pillar of SDN robustness calls for a systemic approach. As a general concept, we propose ANCHOR, a subsystem architecture that promotes the logical centralization of non-functional properties. To show the effectiveness of the concept, we focus on 'security' in this paper: we identify the current security gaps in SDNs and we populate the architecture middleware with the appropriate security mechanisms, in a global and consistent manner. Essential security mechanisms provided by anchor include reliable entropy and resilient pseudo-random generators, and protocols for secure registration and association of SDN devices. We claim and justify in the paper that centralizing such mechanisms is key for their effectiveness, by allowing us to: define and enforce global policies for those properties; reduce the complexity of controllers and forwarding devices; ensure higher levels of robustness for critical services; foster interoperability of the non-functional property enforcement mechanisms; and promote the security and resilience of the architecture itself. We discuss design and implementation aspects, and we prove and evaluate our algorithms and mechanisms, including the formalisation of the main protocols and the verification of their core security properties using the Tamarin prover.Comment: 42 pages, 4 figures, 3 tables, 5 algorithms, 139 reference
    • ā€¦
    corecore