Thread Rating:
  • 0 Votes - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Secure Mining of Association Rules in HorizontallyDistributed Databases
03-18-2015, 06:28 PM
Secure Mining of Association Rules in HorizontallyDistributed Databases
We propose a protocol for secure mining of association rules in horizontally distributed databases. Our protocol, like theirs, is based on the Fast Distributed Mining (FDM) algorithm which is an unsecured distributed version of the Apriori algorithm.
The main ingredients in our protocol are two novel secure multi-party algorithms — one that computes the union of private subsets that each of the interacting players hold, and another that tests the inclusion of an element held by one player in a subset held by another. Our protocol offers enhanced privacy with respect to the protocol. In addition, it is simpler and is significantly more efficient in terms of communication rounds, communication cost and computational cost.

Existing System

In Existing System, the problem of secure mining of association rules in horizontally partitioned databases. In that setting, there are several sites (or players) that hold homogeneous databases, i.e., databases that share the same schema but hold information on different entities. The inputs are the partial databases, and the required output is the list of association rules that hold in the unified database with support and confidence no smaller.

o Less number of features in previous system.
o Difficulty to get accurate item set.

Proposed System
In Proposed System, propose an alternative protocol for the secure computation of the union of private subsets. The proposed protocol improves upon that in terms of simplicity and efficiency as well as privacy. In particular, our protocol does not depend on commutative encryption and oblivious transfer (what simplifies it significantly and contributes towards much reduced communication and computational costs). While our solution is still not perfectly secure, it leaks excess information only to a small number (three) of possible coalitions, unlike the protocol of that discloses information also to some single players. In addition, we claim that the excess information that our protocol may leak is less sensitive than the excess information leaked by the protocol.

1) As a rising subject, data mining is playing an increasingly important role in the decision support activity of every walk of life.
2) Get Efficient Item set result based on the customer request.

Attached File(s)
.doc  Secure Mining of Association Rules in Horizontally Distributed Databases.doc (Size: 39.5 KB / Downloads: 21)

Possibly Related Threads...
Thread: Author Replies: Views: Last Post
  data mining for big data Madhavi Tota 1 577 04-04-2018
Last Post: vraviii
  Movie prediction website using data mining in php RAHULDB 0 223 11-04-2017
Last Post: RAHULDB
  data mining project komali 0 401 05-19-2016
Last Post: komali
  Semantic Integration of databases poojaghonia 0 238 03-13-2016
Last Post: poojaghonia
Sad The Smart Miner-Efficient Data Mining Software Pluviophile 0 568 07-06-2015
Last Post: Pluviophile
  “The Smart Miner”-Efficient Data Mining Software bilihili 0 885 06-03-2015
Last Post: bilihili
  Data Mining Approach for Student Advising and Performance Prediction Kishore Reddy 0 544 10-15-2014
Last Post: Kishore Reddy
  Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud engg_bbc 0 557 09-19-2014
Last Post: engg_bbc
  A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation Mind Blowing Vivek Singh 0 475 02-25-2014
Last Post: Mind Blowing Vivek Singh
  secure payment scheme with less communication & processing overhead for mwn Indra rose 1 740 02-20-2014
Last Post: reemamaria

Forum Jump:

User(s) browsing this thread:
1 Guest(s)

Return to TopReturn to Content