High Impact Factor : 4.396 icon | Submit Manuscript Online icon |

Privacy Preserving Mining of Transaction Databases

Author(s):

Sunil R , RNSIT; Dr. N P kavya, RNSIT

Keywords:

FEAL 4, k-anonymity, l-diversity, Cryptography, Randomization Method, Privacy – preserving outsourcing.

Abstract

In this paper, A company (data owner) lacking in expertise or computational resources can outsource its mining needs to a third party service provider (server) taking the advantage of cloud computing. However, a business can have many suppliers and/or customers and may have a set of transactions associated with each one and also the items in the outsourced database and the patterns of items that can be mined from the database are considered as the private property of the corporation (data owner). To protect the corporate privacy, the data owner transforms its data and ships it to the server. The server sends extracted patterns to the owner in response to the mining queries. The owner recovers the true patterns from the extracted patterns received. Here the problem of outsourcing the association rule mining task within a corporate privacy-preserving framework is studied. Proposed model based on background knowledge of Fast Encryption Algorithm (FEAL) Cryptosystem an encryption/decryption strategy for providing security and hence enabling privacy-preserving of outsourced mining task, and protection against the privacy violation attack.

Other Details

Paper ID: IJSRDV2I4233
Published in: Volume : 2, Issue : 4
Publication Date: 01/07/2014
Page(s): 585-590

Article Preview

Download Article