SlideShare una empresa de Scribd logo
1 de 5
Secure Mining of Association Rules in Horizontally
Distributed Databases
ABSTRACT:
We propose a protocol for secure mining of association rules in horizontally
distributed databases. The current leading protocol is that of Kantarcioglu and
Clifton. Our protocol, like theirs, is based on the Fast Distributed Mining (FDM)
algorithm of Cheung et al. which is an unsecured distributed version of the Apriori
algorithm. The main ingredients in our protocol are two novel secure multi-party
algorithms — one that computes the union of private subsets that each of the
interacting players hold, and another that tests the inclusion of an element held by
one player in a subset held by another. Our protocol offers enhanced privacy with
respect to the protocol. In addition, it is simpler and is significantly more efficient
in terms of communication rounds, communication cost and computational cost.
EXISTING SYSTEM:
Kantarcioglu and Clifton studied that problems and devised a protocol for its
solution. The main part of the protocol is a sub-protocol for the secure computation
of the union of private subsets that are held by the different players. (The private
subset of a given player, as we explain below, includes the item sets that are s-
frequent in his partial database. That is the most costly part of the protocol and its
implementation relies upon cryptographic primitives such as commutative
encryption, oblivious transfer, and hash functions. This is also the only part in the
protocol in which the players may extract from their view of the protocol
information on other databases, beyond what is implied by the final output and
their own input. While such leakage of information renders the protocol not
perfectly secure, the perimeter of the excess information is explicitly bounded and
it is argued there that such information leakage is innocuous, whence acceptable
from a practical point of view.
DISADVANTAGES OF EXISTING SYSTEM:
 Insufficient security, simplicity and efficiency are not well in the databases, not
sure in privacy in an existing system.
 While our solution is still not perfectly secure, it leaks excess information only
to a small number (three) of possible coalitions, unlike the protocol of that
discloses information also to some single players.
 Our protocol may leak is less sensitive than the excess information leaked by
the protocol.
PROPOSED SYSTEM:
The protocol that we propose here computes a parameterized family of functions,
which we call threshold functions, in which the two extreme cases correspond to
the problems of computing the union and intersection of private subsets. Those are
in fact general-purpose protocols that can be used in other contexts as well.
Another problem of secure multiparty computation that we solve here as part of
our discussion is the set inclusion problem; namely, the problem where Alice holds
a private subset of some ground set, and Bob holds an element in the ground set,
and they wish to determine whether Bob’s element is within Alice’s subset,
without revealing to either of them information about the other party’s input
beyond the above described inclusion.
ADVANTAGES OF PROPOSED SYSTEM:
 We proposed a protocol for secure mining of association rules in horizontally
distributed databases that improves significantly upon the current leading
protocol in terms of privacy and efficiency.
 The main ingredient in our proposed protocol is a novel secure multi-party
protocol for computing the union (or intersection) of private subsets that each of
the interacting players holds.
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
• System : Pentium IV 2.4 GHz.
• Hard Disk : 40 GB.
• Floppy Drive : 1.44 Mb.
• Monitor : 15 VGA Colour.
• Mouse : Logitech.
• Ram : 512 Mb.
SOFTWARE REQUIREMENTS:
• Operating system : - Windows XP.
• Coding Language : ASP.NET, C#.Net.
• Data Base : SQL Server 2005
REFERENCE:
Tamir Tassa “Secure Mining of Association Rules in Horizontally Distributed
Databases” IEEE TRANSACTIONS ON KNOWLEDGE AND DATA
ENGINEERING, 2013.

Más contenido relacionado

Destacado

Presentation1media star pro
Presentation1media star proPresentation1media star pro
Presentation1media star proTafi123
 
1st+music+magazine+powerpoint+taffy+school+13th+december
1st+music+magazine+powerpoint+taffy+school+13th+december1st+music+magazine+powerpoint+taffy+school+13th+december
1st+music+magazine+powerpoint+taffy+school+13th+decemberTafi123
 
2013 ieee java project titles for cse, it and mca
2013 ieee java project titles for cse, it and mca2013 ieee java project titles for cse, it and mca
2013 ieee java project titles for cse, it and mcaJPINFOTECH JAYAPRAKASH
 
final year ieee projects in pondicherry
final year ieee projects in pondicherryfinal year ieee projects in pondicherry
final year ieee projects in pondicherryJPINFOTECH JAYAPRAKASH
 
A rank correlation based detection against distributed reflection do s attacks
A rank correlation based detection against distributed reflection do s attacksA rank correlation based detection against distributed reflection do s attacks
A rank correlation based detection against distributed reflection do s attacksJPINFOTECH JAYAPRAKASH
 
Using fuzzy logic control to provide intelligent traffic management service f...
Using fuzzy logic control to provide intelligent traffic management service f...Using fuzzy logic control to provide intelligent traffic management service f...
Using fuzzy logic control to provide intelligent traffic management service f...JPINFOTECH JAYAPRAKASH
 
Towards secure multi keyword top-k retrieval over encrypted cloud data
Towards secure multi keyword top-k retrieval over encrypted cloud dataTowards secure multi keyword top-k retrieval over encrypted cloud data
Towards secure multi keyword top-k retrieval over encrypted cloud dataJPINFOTECH JAYAPRAKASH
 
Back pressure-based packet-by-packet adaptive routing in communication networks
Back pressure-based packet-by-packet adaptive routing in communication networksBack pressure-based packet-by-packet adaptive routing in communication networks
Back pressure-based packet-by-packet adaptive routing in communication networksJPINFOTECH JAYAPRAKASH
 
Identity based secure distributed data storage schemes
Identity based secure distributed data storage schemesIdentity based secure distributed data storage schemes
Identity based secure distributed data storage schemesJPINFOTECH JAYAPRAKASH
 
Participatory privacy enabling privacy in participatory sensing
Participatory privacy enabling privacy in participatory sensingParticipatory privacy enabling privacy in participatory sensing
Participatory privacy enabling privacy in participatory sensingJPINFOTECH JAYAPRAKASH
 
Efficient algorithms for neighbor discovery in wireless networks
Efficient algorithms for neighbor discovery in wireless networksEfficient algorithms for neighbor discovery in wireless networks
Efficient algorithms for neighbor discovery in wireless networksJPINFOTECH JAYAPRAKASH
 
2013 14 ieee ece project titles - jp infotech
2013 14 ieee ece project titles - jp infotech2013 14 ieee ece project titles - jp infotech
2013 14 ieee ece project titles - jp infotechJPINFOTECH JAYAPRAKASH
 
Privacy preserving delegated access control in public clouds
Privacy preserving delegated access control in public cloudsPrivacy preserving delegated access control in public clouds
Privacy preserving delegated access control in public cloudsJPINFOTECH JAYAPRAKASH
 
Toward fine grained, unsupervised, scalable performance diagnosis for product...
Toward fine grained, unsupervised, scalable performance diagnosis for product...Toward fine grained, unsupervised, scalable performance diagnosis for product...
Toward fine grained, unsupervised, scalable performance diagnosis for product...JPINFOTECH JAYAPRAKASH
 
Facilitating document annotation using content and querying value
Facilitating document annotation using content and querying valueFacilitating document annotation using content and querying value
Facilitating document annotation using content and querying valueJPINFOTECH JAYAPRAKASH
 
A highly scalable key pre distribution scheme for wireless sensor networks
A highly scalable key pre distribution scheme for wireless sensor networksA highly scalable key pre distribution scheme for wireless sensor networks
A highly scalable key pre distribution scheme for wireless sensor networksJPINFOTECH JAYAPRAKASH
 
Distributed cooperative caching in social wireless networks
Distributed cooperative caching in social wireless networksDistributed cooperative caching in social wireless networks
Distributed cooperative caching in social wireless networksJPINFOTECH JAYAPRAKASH
 
Proteus multiflow diversity routing for wireless networks with cooperative tr...
Proteus multiflow diversity routing for wireless networks with cooperative tr...Proteus multiflow diversity routing for wireless networks with cooperative tr...
Proteus multiflow diversity routing for wireless networks with cooperative tr...JPINFOTECH JAYAPRAKASH
 

Destacado (20)

Presentation1media star pro
Presentation1media star proPresentation1media star pro
Presentation1media star pro
 
1st+music+magazine+powerpoint+taffy+school+13th+december
1st+music+magazine+powerpoint+taffy+school+13th+december1st+music+magazine+powerpoint+taffy+school+13th+december
1st+music+magazine+powerpoint+taffy+school+13th+december
 
Twitsper tweeting privately
Twitsper tweeting privatelyTwitsper tweeting privately
Twitsper tweeting privately
 
2013 ieee java project titles for cse, it and mca
2013 ieee java project titles for cse, it and mca2013 ieee java project titles for cse, it and mca
2013 ieee java project titles for cse, it and mca
 
final year ieee projects in pondicherry
final year ieee projects in pondicherryfinal year ieee projects in pondicherry
final year ieee projects in pondicherry
 
A rank correlation based detection against distributed reflection do s attacks
A rank correlation based detection against distributed reflection do s attacksA rank correlation based detection against distributed reflection do s attacks
A rank correlation based detection against distributed reflection do s attacks
 
Using fuzzy logic control to provide intelligent traffic management service f...
Using fuzzy logic control to provide intelligent traffic management service f...Using fuzzy logic control to provide intelligent traffic management service f...
Using fuzzy logic control to provide intelligent traffic management service f...
 
Towards secure multi keyword top-k retrieval over encrypted cloud data
Towards secure multi keyword top-k retrieval over encrypted cloud dataTowards secure multi keyword top-k retrieval over encrypted cloud data
Towards secure multi keyword top-k retrieval over encrypted cloud data
 
Back pressure-based packet-by-packet adaptive routing in communication networks
Back pressure-based packet-by-packet adaptive routing in communication networksBack pressure-based packet-by-packet adaptive routing in communication networks
Back pressure-based packet-by-packet adaptive routing in communication networks
 
Identity based secure distributed data storage schemes
Identity based secure distributed data storage schemesIdentity based secure distributed data storage schemes
Identity based secure distributed data storage schemes
 
Participatory privacy enabling privacy in participatory sensing
Participatory privacy enabling privacy in participatory sensingParticipatory privacy enabling privacy in participatory sensing
Participatory privacy enabling privacy in participatory sensing
 
IEEE PROJECTS FOR ECE 2013 2014
IEEE PROJECTS FOR ECE 2013 2014IEEE PROJECTS FOR ECE 2013 2014
IEEE PROJECTS FOR ECE 2013 2014
 
Efficient algorithms for neighbor discovery in wireless networks
Efficient algorithms for neighbor discovery in wireless networksEfficient algorithms for neighbor discovery in wireless networks
Efficient algorithms for neighbor discovery in wireless networks
 
2013 14 ieee ece project titles - jp infotech
2013 14 ieee ece project titles - jp infotech2013 14 ieee ece project titles - jp infotech
2013 14 ieee ece project titles - jp infotech
 
Privacy preserving delegated access control in public clouds
Privacy preserving delegated access control in public cloudsPrivacy preserving delegated access control in public clouds
Privacy preserving delegated access control in public clouds
 
Toward fine grained, unsupervised, scalable performance diagnosis for product...
Toward fine grained, unsupervised, scalable performance diagnosis for product...Toward fine grained, unsupervised, scalable performance diagnosis for product...
Toward fine grained, unsupervised, scalable performance diagnosis for product...
 
Facilitating document annotation using content and querying value
Facilitating document annotation using content and querying valueFacilitating document annotation using content and querying value
Facilitating document annotation using content and querying value
 
A highly scalable key pre distribution scheme for wireless sensor networks
A highly scalable key pre distribution scheme for wireless sensor networksA highly scalable key pre distribution scheme for wireless sensor networks
A highly scalable key pre distribution scheme for wireless sensor networks
 
Distributed cooperative caching in social wireless networks
Distributed cooperative caching in social wireless networksDistributed cooperative caching in social wireless networks
Distributed cooperative caching in social wireless networks
 
Proteus multiflow diversity routing for wireless networks with cooperative tr...
Proteus multiflow diversity routing for wireless networks with cooperative tr...Proteus multiflow diversity routing for wireless networks with cooperative tr...
Proteus multiflow diversity routing for wireless networks with cooperative tr...
 

Similar a Secure mining of association rules in horizontally distributed databases

JPD1416 Secure Mining Of Association Rules In Horizantally Distributed Data...
JPD1416   Secure Mining Of Association Rules In Horizantally Distributed Data...JPD1416   Secure Mining Of Association Rules In Horizantally Distributed Data...
JPD1416 Secure Mining Of Association Rules In Horizantally Distributed Data...chennaijp
 
2014 IEEE JAVA DATA MINING PROJECT Secure mining of association rules in hori...
2014 IEEE JAVA DATA MINING PROJECT Secure mining of association rules in hori...2014 IEEE JAVA DATA MINING PROJECT Secure mining of association rules in hori...
2014 IEEE JAVA DATA MINING PROJECT Secure mining of association rules in hori...IEEEMEMTECHSTUDENTSPROJECTS
 
IEEE 2014 JAVA DATA MINING PROJECTS Secure mining of association rules in hor...
IEEE 2014 JAVA DATA MINING PROJECTS Secure mining of association rules in hor...IEEE 2014 JAVA DATA MINING PROJECTS Secure mining of association rules in hor...
IEEE 2014 JAVA DATA MINING PROJECTS Secure mining of association rules in hor...IEEEFINALYEARSTUDENTPROJECTS
 
JAVA 2013 IEEE DATAMINING PROJECT Secure mining of association rules in horiz...
JAVA 2013 IEEE DATAMINING PROJECT Secure mining of association rules in horiz...JAVA 2013 IEEE DATAMINING PROJECT Secure mining of association rules in horiz...
JAVA 2013 IEEE DATAMINING PROJECT Secure mining of association rules in horiz...IEEEGLOBALSOFTTECHNOLOGIES
 
Data Sharing: Ensure Accountability Distribution in the Cloud
Data Sharing: Ensure Accountability Distribution in the CloudData Sharing: Ensure Accountability Distribution in the Cloud
Data Sharing: Ensure Accountability Distribution in the CloudSuraj Mehta
 
secure mining of association rules in horizontally distributed databases
secure mining of association rules in horizontally distributed databasessecure mining of association rules in horizontally distributed databases
secure mining of association rules in horizontally distributed databasesswathi78
 
Blockchain Based Decentralized Cloud System
Blockchain Based Decentralized Cloud SystemBlockchain Based Decentralized Cloud System
Blockchain Based Decentralized Cloud SystemDhruvdoshi25071999
 
Bit sync personal_cloud
Bit sync personal_cloudBit sync personal_cloud
Bit sync personal_cloudFlavio Vit
 
Data Security And The Security
Data Security And The SecurityData Security And The Security
Data Security And The SecurityRachel Phillips
 
documentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemesdocumentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemesSahithi Naraparaju
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperShakas Technologies
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperShakas Technologies
 
JPJ1424 Privacy-Preserving and Content-Protecting Location Based Queries
JPJ1424  Privacy-Preserving and Content-Protecting Location Based QueriesJPJ1424  Privacy-Preserving and Content-Protecting Location Based Queries
JPJ1424 Privacy-Preserving and Content-Protecting Location Based Querieschennaijp
 
Secure Mining of Association Rules in Horizontally Distributed Databases
Secure Mining of Association Rules in Horizontally Distributed DatabasesSecure Mining of Association Rules in Horizontally Distributed Databases
Secure Mining of Association Rules in Horizontally Distributed DatabasesIJSRD
 
Providing user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure cloudsProviding user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure cloudsKamal Spring
 
Oruta privacy preserving public auditing
Oruta privacy preserving public auditingOruta privacy preserving public auditing
Oruta privacy preserving public auditingPapitha Velumani
 

Similar a Secure mining of association rules in horizontally distributed databases (20)

JPD1416 Secure Mining Of Association Rules In Horizantally Distributed Data...
JPD1416   Secure Mining Of Association Rules In Horizantally Distributed Data...JPD1416   Secure Mining Of Association Rules In Horizantally Distributed Data...
JPD1416 Secure Mining Of Association Rules In Horizantally Distributed Data...
 
2014 IEEE JAVA DATA MINING PROJECT Secure mining of association rules in hori...
2014 IEEE JAVA DATA MINING PROJECT Secure mining of association rules in hori...2014 IEEE JAVA DATA MINING PROJECT Secure mining of association rules in hori...
2014 IEEE JAVA DATA MINING PROJECT Secure mining of association rules in hori...
 
IEEE 2014 JAVA DATA MINING PROJECTS Secure mining of association rules in hor...
IEEE 2014 JAVA DATA MINING PROJECTS Secure mining of association rules in hor...IEEE 2014 JAVA DATA MINING PROJECTS Secure mining of association rules in hor...
IEEE 2014 JAVA DATA MINING PROJECTS Secure mining of association rules in hor...
 
JAVA 2013 IEEE DATAMINING PROJECT Secure mining of association rules in horiz...
JAVA 2013 IEEE DATAMINING PROJECT Secure mining of association rules in horiz...JAVA 2013 IEEE DATAMINING PROJECT Secure mining of association rules in horiz...
JAVA 2013 IEEE DATAMINING PROJECT Secure mining of association rules in horiz...
 
Data Sharing: Ensure Accountability Distribution in the Cloud
Data Sharing: Ensure Accountability Distribution in the CloudData Sharing: Ensure Accountability Distribution in the Cloud
Data Sharing: Ensure Accountability Distribution in the Cloud
 
Lesson 2
Lesson 2Lesson 2
Lesson 2
 
secure mining of association rules in horizontally distributed databases
secure mining of association rules in horizontally distributed databasessecure mining of association rules in horizontally distributed databases
secure mining of association rules in horizontally distributed databases
 
ITDCC05.ppt
ITDCC05.pptITDCC05.ppt
ITDCC05.ppt
 
Blockchain Based Decentralized Cloud System
Blockchain Based Decentralized Cloud SystemBlockchain Based Decentralized Cloud System
Blockchain Based Decentralized Cloud System
 
Bit sync personal_cloud
Bit sync personal_cloudBit sync personal_cloud
Bit sync personal_cloud
 
Data Security And The Security
Data Security And The SecurityData Security And The Security
Data Security And The Security
 
documentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemesdocumentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemes
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
 
Free net
Free netFree net
Free net
 
Netw204 Quiz Answers Essay
Netw204 Quiz Answers EssayNetw204 Quiz Answers Essay
Netw204 Quiz Answers Essay
 
JPJ1424 Privacy-Preserving and Content-Protecting Location Based Queries
JPJ1424  Privacy-Preserving and Content-Protecting Location Based QueriesJPJ1424  Privacy-Preserving and Content-Protecting Location Based Queries
JPJ1424 Privacy-Preserving and Content-Protecting Location Based Queries
 
Secure Mining of Association Rules in Horizontally Distributed Databases
Secure Mining of Association Rules in Horizontally Distributed DatabasesSecure Mining of Association Rules in Horizontally Distributed Databases
Secure Mining of Association Rules in Horizontally Distributed Databases
 
Providing user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure cloudsProviding user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure clouds
 
Oruta privacy preserving public auditing
Oruta privacy preserving public auditingOruta privacy preserving public auditing
Oruta privacy preserving public auditing
 

Último

Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...Pooja Nehwal
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 

Último (20)

Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 

Secure mining of association rules in horizontally distributed databases

  • 1. Secure Mining of Association Rules in Horizontally Distributed Databases ABSTRACT: We propose a protocol for secure mining of association rules in horizontally distributed databases. The current leading protocol is that of Kantarcioglu and Clifton. Our protocol, like theirs, is based on the Fast Distributed Mining (FDM) algorithm of Cheung et al. which is an unsecured distributed version of the Apriori algorithm. The main ingredients in our protocol are two novel secure multi-party algorithms — one that computes the union of private subsets that each of the interacting players hold, and another that tests the inclusion of an element held by one player in a subset held by another. Our protocol offers enhanced privacy with respect to the protocol. In addition, it is simpler and is significantly more efficient in terms of communication rounds, communication cost and computational cost. EXISTING SYSTEM: Kantarcioglu and Clifton studied that problems and devised a protocol for its solution. The main part of the protocol is a sub-protocol for the secure computation of the union of private subsets that are held by the different players. (The private subset of a given player, as we explain below, includes the item sets that are s-
  • 2. frequent in his partial database. That is the most costly part of the protocol and its implementation relies upon cryptographic primitives such as commutative encryption, oblivious transfer, and hash functions. This is also the only part in the protocol in which the players may extract from their view of the protocol information on other databases, beyond what is implied by the final output and their own input. While such leakage of information renders the protocol not perfectly secure, the perimeter of the excess information is explicitly bounded and it is argued there that such information leakage is innocuous, whence acceptable from a practical point of view. DISADVANTAGES OF EXISTING SYSTEM:  Insufficient security, simplicity and efficiency are not well in the databases, not sure in privacy in an existing system.  While our solution is still not perfectly secure, it leaks excess information only to a small number (three) of possible coalitions, unlike the protocol of that discloses information also to some single players.  Our protocol may leak is less sensitive than the excess information leaked by the protocol.
  • 3. PROPOSED SYSTEM: The protocol that we propose here computes a parameterized family of functions, which we call threshold functions, in which the two extreme cases correspond to the problems of computing the union and intersection of private subsets. Those are in fact general-purpose protocols that can be used in other contexts as well. Another problem of secure multiparty computation that we solve here as part of our discussion is the set inclusion problem; namely, the problem where Alice holds a private subset of some ground set, and Bob holds an element in the ground set, and they wish to determine whether Bob’s element is within Alice’s subset, without revealing to either of them information about the other party’s input beyond the above described inclusion. ADVANTAGES OF PROPOSED SYSTEM:  We proposed a protocol for secure mining of association rules in horizontally distributed databases that improves significantly upon the current leading protocol in terms of privacy and efficiency.
  • 4.  The main ingredient in our proposed protocol is a novel secure multi-party protocol for computing the union (or intersection) of private subsets that each of the interacting players holds. SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS: • System : Pentium IV 2.4 GHz. • Hard Disk : 40 GB. • Floppy Drive : 1.44 Mb. • Monitor : 15 VGA Colour. • Mouse : Logitech. • Ram : 512 Mb. SOFTWARE REQUIREMENTS: • Operating system : - Windows XP. • Coding Language : ASP.NET, C#.Net. • Data Base : SQL Server 2005
  • 5. REFERENCE: Tamir Tassa “Secure Mining of Association Rules in Horizontally Distributed Databases” IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2013.