Secure Outsourcing Association Rule Mining in Horizontally and Vertically Partition Database Using Eclat and Double Encryption Technique

Authors

  • Rutuja Thite  Department of Computer Engineering, Bhujbal Knowledge City, Nashik, Maharashtra, India
  • Dr. M. U. Kharat  Department of Computer Engineering, Bhujbal Knowledge City, Nashik, Maharashtra, India

Keywords:

Data Mining, Association Rules Generation, Vertically and Horizontally Partition Data, Encryption Techniques.

Abstract

Cloud computing uses the ideal model of information mining-as-an service, utilizing these it seems to be an obvious choice for companies saving on the cost of contributing to secure, manage and keep up an IT infrastructure. An association or company who is lacking in mining capacity can outsource its mining needs to third party service providers. Be that as it may, each the association rules and item-set of the outsourced database are seen as private property of the association (company). The data owner encrypt the data and sends to the server to protect the corporate security. Data owner or client transfers its mining queries to server, and afterward server conducts mining task & encrypt rules and sends generated association rules to the data owner or client. To get genuine pattern client decrypts the received rules. Paper focuses on the issue of outsourcing the rule mining task inside a corporate privacy preserving framework. It additionally shows the core idea of privacy preserving association rule mining on vertically partitioned data with utilization of enhanced cryptographic technique. The strategies incorporate cryptographic techniques to minimize the data shared, while adding minimal overhead to the mining task. This research tries to propose desirable algorithm for both vertically as well as horizontally partitioned data. A technique for solving a main problem of privacy preserving association rule mining in two party databases is proposed. To improve the performance of system horizontal partitioning as well as vertical partitioning of data is performed, also double encryption technique is used to increase the security of dataset which includes homomorphic encryption algorithm followed by asymmetric algorithm

References

  1. Lichun. Li, R. Lu, K. K. R. Choo, A. Datta and J. Shao, "Privacy-Preserving-Outsourced Association Rule Mining on Vertically Partitioned Databases," in IEEE Transactions on Information Forensics and Security, vol. 11, no. 8, pp. 1847-1861, Aug. 2016.
  2. B. Dong, R. Liu and W. H. Wang, "Integrity Verification of Outsourced Frequent Itemset Mining with Deterministic Guarantee," 2013 IEEE 13th International Conference on Data Mining, Dallas, TX, 2013, pp. 1025-1030.
  3. M. N. Kumbhar and R. Kharat, "Privacy preserving mining of Association Rules on horizontally and vertically partitioned data: A review paper," Hybrid Intelligent Systems (HIS), 2012 12th International Conference on, Pune, 2012, pp. 231-235.
  4. D. H. Tran, W. K. Ng and W. Zha, "CRYPPAR: An efficient framework for privacy preserving association rule mining over vertically partitioned data," TENCON 2009 - 2009 IEEE Region 10 Conference, Singapore, 2009, pp. 1-6.
  5. D. Trinca and S. Rajasekaran, "Towards a Collusion-Resistant Algebraic Multi-Party Protocol for Privacy-Preserving Association Rule Mining in Vertically Partitioned Data," 2007 IEEE International Performance, Computing, and Communications Conference, New Orleans, LA, 2007, pp. 402-409.
  6. Vaidya, Jaideep, and Chris Clifton. "Privacy preserving association rule mining in vertically partitioned data." Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, 2002.
  7. Tassa, Tamir. "Secure mining of association rules in horizontally distributed databases." IEEE Transactions on Knowledge and Data Engineering 26.4 (2014): 970-983.
  8. Bettahally N. Keshavamurthy, Asad M. Khan,Durga Toshniwal “Privacy preserving association rule mining over distributed databases using genetic algorithm” Springer-Verlag London 2013 Neural Computing & Application (2013) 22 (Supp 1): S351–S364 DOI 10.1007/s00521-013-1343-9
  9. F. Giannotti, L. Lakshmanan, A. Monreale, D. Pedreschi, and H. Wang, “Privacy-preserving mining of association rules from outsourced transaction databases,” IEEE Systems Journal, vol. 7, no. 3, pp. 385–395, 2013.

Downloads

Published

2018-12-30

Issue

Section

Research Articles

How to Cite

[1]
Rutuja Thite, Dr. M. U. Kharat, " Secure Outsourcing Association Rule Mining in Horizontally and Vertically Partition Database Using Eclat and Double Encryption Technique , IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 8, pp.384-392, November-December-2018.