SlideShare a Scribd company logo
Secure Mining of Association Rules in Horizontally
Distributed Databases
ABSTRACT:
We propose a protocol for secure mining of association rules in horizontally
distributed databases. The current leading protocol is that of Kantarcioglu and
Clifton. Our protocol, like theirs, is based on the Fast Distributed Mining (FDM)
algorithm of Cheung et al. which is an unsecured distributed version of the Apriori
algorithm. The main ingredients in our protocol are two novel secure multi-party
algorithms — one that computes the union of private subsets that each of the
interacting players hold, and another that tests the inclusion of an element held by
one player in a subset held by another. Our protocol offers enhanced privacy with
respect to the protocol. In addition, it is simpler and is significantly more efficient
in terms of communication rounds, communication cost and computational cost.
EXISTING SYSTEM:
Kantarcioglu and Clifton studied that problems and devised a protocol for its
solution. The main part of the protocol is a sub-protocol for the secure computation
of the union of private subsets that are held by the different players. (The private
subset of a given player, as we explain below, includes the item sets that are s-
frequent in his partial database. That is the most costly part of the protocol and its
implementation relies upon cryptographic primitives such as commutative
encryption, oblivious transfer, and hash functions. This is also the only part in the
protocol in which the players may extract from their view of the protocol
information on other databases, beyond what is implied by the final output and
their own input. While such leakage of information renders the protocol not
perfectly secure, the perimeter of the excess information is explicitly bounded and
it is argued there that such information leakage is innocuous, whence acceptable
from a practical point of view.
DISADVANTAGES OF EXISTING SYSTEM:
 Insufficient security, simplicity and efficiency are not well in the databases, not
sure in privacy in an existing system.
 While our solution is still not perfectly secure, it leaks excess information only
to a small number (three) of possible coalitions, unlike the protocol of that
discloses information also to some single players.
 Our protocol may leak is less sensitive than the excess information leaked by
the protocol.
PROPOSED SYSTEM:
The protocol that we propose here computes a parameterized family of functions,
which we call threshold functions, in which the two extreme cases correspond to
the problems of computing the union and intersection of private subsets. Those are
in fact general-purpose protocols that can be used in other contexts as well.
Another problem of secure multiparty computation that we solve here as part of
our discussion is the set inclusion problem; namely, the problem where Alice holds
a private subset of some ground set, and Bob holds an element in the ground set,
and they wish to determine whether Bob’s element is within Alice’s subset,
without revealing to either of them information about the other party’s input
beyond the above described inclusion.
ADVANTAGES OF PROPOSED SYSTEM:
 We proposed a protocol for secure mining of association rules in horizontally
distributed databases that improves significantly upon the current leading
protocol in terms of privacy and efficiency.
 The main ingredient in our proposed protocol is a novel secure multi-party
protocol for computing the union (or intersection) of private subsets that each of
the interacting players holds.
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
• System : Pentium IV 2.4 GHz.
• Hard Disk : 40 GB.
• Floppy Drive : 1.44 Mb.
• Monitor : 15 VGA Colour.
• Mouse : Logitech.
• Ram : 512 Mb.
SOFTWARE REQUIREMENTS:
• Operating system : - Windows XP.
• Coding Language : ASP.NET, C#.Net.
• Data Base : SQL Server 2005
REFERENCE:
Tamir Tassa “Secure Mining of Association Rules in Horizontally Distributed
Databases” IEEE TRANSACTIONS ON KNOWLEDGE AND DATA
ENGINEERING, 2013.

More Related Content

DOCX
Secure mining-of-association-rules-in-horizontally-distributed-databases-docx
PPTX
Secure mining of association rules in horizontally distributed databases
DOCX
Secure mining of association rules in horizontally distributed databases
DOCX
secure mining of association rules in horizontally distributed databases
DOCX
Secure mining of association rules in horizontally distributed databases
DOCX
Secure mining of association rules in horizontally distributed databases
PPTX
Cisco Stealtwatch
PDF
Efficient Data Mining Of Association Rules in Horizontally Distributed Databases
Secure mining-of-association-rules-in-horizontally-distributed-databases-docx
Secure mining of association rules in horizontally distributed databases
Secure mining of association rules in horizontally distributed databases
secure mining of association rules in horizontally distributed databases
Secure mining of association rules in horizontally distributed databases
Secure mining of association rules in horizontally distributed databases
Cisco Stealtwatch
Efficient Data Mining Of Association Rules in Horizontally Distributed Databases

Viewers also liked (20)

PPTX
Presentation1media star pro
PPTX
1st+music+magazine+powerpoint+taffy+school+13th+december
PDF
Twitsper tweeting privately
PDF
2013 ieee java project titles for cse, it and mca
PDF
final year ieee projects in pondicherry
DOCX
A rank correlation based detection against distributed reflection do s attacks
DOCX
Using fuzzy logic control to provide intelligent traffic management service f...
DOCX
Towards secure multi keyword top-k retrieval over encrypted cloud data
DOCX
Back pressure-based packet-by-packet adaptive routing in communication networks
DOCX
Identity based secure distributed data storage schemes
DOCX
Participatory privacy enabling privacy in participatory sensing
DOC
IEEE PROJECTS FOR ECE 2013 2014
DOCX
Efficient algorithms for neighbor discovery in wireless networks
PDF
2013 14 ieee ece project titles - jp infotech
DOCX
Privacy preserving delegated access control in public clouds
DOCX
Toward fine grained, unsupervised, scalable performance diagnosis for product...
PDF
Facilitating document annotation using content and querying value
DOCX
A highly scalable key pre distribution scheme for wireless sensor networks
DOCX
Distributed cooperative caching in social wireless networks
DOCX
Proteus multiflow diversity routing for wireless networks with cooperative tr...
Presentation1media star pro
1st+music+magazine+powerpoint+taffy+school+13th+december
Twitsper tweeting privately
2013 ieee java project titles for cse, it and mca
final year ieee projects in pondicherry
A rank correlation based detection against distributed reflection do s attacks
Using fuzzy logic control to provide intelligent traffic management service f...
Towards secure multi keyword top-k retrieval over encrypted cloud data
Back pressure-based packet-by-packet adaptive routing in communication networks
Identity based secure distributed data storage schemes
Participatory privacy enabling privacy in participatory sensing
IEEE PROJECTS FOR ECE 2013 2014
Efficient algorithms for neighbor discovery in wireless networks
2013 14 ieee ece project titles - jp infotech
Privacy preserving delegated access control in public clouds
Toward fine grained, unsupervised, scalable performance diagnosis for product...
Facilitating document annotation using content and querying value
A highly scalable key pre distribution scheme for wireless sensor networks
Distributed cooperative caching in social wireless networks
Proteus multiflow diversity routing for wireless networks with cooperative tr...
Ad

Similar to Secure mining of association rules in horizontally distributed databases (20)

DOCX
JPD1416 Secure Mining Of Association Rules In Horizantally Distributed Data...
DOC
secure mining of association rules in horizontally distributed databases
PDF
Secure Mining of Association Rules in Horizontally Distributed Databases
PDF
Secure Mining of Association Rules in Horizontally Distributed Databases
DOCX
IEEE 2014 JAVA DATA MINING PROJECTS Secure mining of association rules in hor...
DOCX
2014 IEEE JAVA DATA MINING PROJECT Secure mining of association rules in hori...
DOCX
JAVA 2013 IEEE DATAMINING PROJECT Secure mining of association rules in horiz...
PDF
To allot secrecy-safe association rules mining schema using FP tree
PDF
Privacy Preserving Distributed Association Rule Mining Algorithm for Vertical...
PDF
D-Eclat Association Rules on Vertically Partitioned Dynamic Data to Outsource...
PDF
Efficient Association Rule Mining in Heterogeneous Data Base
PPT
Vinay bamane
PDF
IRJET- Secure Distributed Data Mining
PDF
The International Journal of Engineering and Science (The IJES)
PDF
Securing Personal Information in Data Mining
PDF
An Effective Heuristic Approach for Hiding Sensitive Patterns in Databases
PDF
International Journal of Computational Engineering Research(IJCER)
PDF
PRIVATE OVER-THRESHOLD AGGREGATION PROTOCOLS OVER DISTRIBUTED DATASETS
PDF
SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...
PDF
F04713641
JPD1416 Secure Mining Of Association Rules In Horizantally Distributed Data...
secure mining of association rules in horizontally distributed databases
Secure Mining of Association Rules in Horizontally Distributed Databases
Secure Mining of Association Rules in Horizontally Distributed Databases
IEEE 2014 JAVA DATA MINING PROJECTS Secure mining of association rules in hor...
2014 IEEE JAVA DATA MINING PROJECT Secure mining of association rules in hori...
JAVA 2013 IEEE DATAMINING PROJECT Secure mining of association rules in horiz...
To allot secrecy-safe association rules mining schema using FP tree
Privacy Preserving Distributed Association Rule Mining Algorithm for Vertical...
D-Eclat Association Rules on Vertically Partitioned Dynamic Data to Outsource...
Efficient Association Rule Mining in Heterogeneous Data Base
Vinay bamane
IRJET- Secure Distributed Data Mining
The International Journal of Engineering and Science (The IJES)
Securing Personal Information in Data Mining
An Effective Heuristic Approach for Hiding Sensitive Patterns in Databases
International Journal of Computational Engineering Research(IJCER)
PRIVATE OVER-THRESHOLD AGGREGATION PROTOCOLS OVER DISTRIBUTED DATASETS
SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...
F04713641
Ad

Recently uploaded (20)

PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PPTX
master seminar digital applications in india
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PPTX
Pharma ospi slides which help in ospi learning
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
Complications of Minimal Access Surgery at WLH
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
Insiders guide to clinical Medicine.pdf
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
RMMM.pdf make it easy to upload and study
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
Renaissance Architecture: A Journey from Faith to Humanism
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
102 student loan defaulters named and shamed – Is someone you know on the list?
master seminar digital applications in india
Microbial diseases, their pathogenesis and prophylaxis
Pharma ospi slides which help in ospi learning
Module 4: Burden of Disease Tutorial Slides S2 2025
Pharmacology of Heart Failure /Pharmacotherapy of CHF
Supply Chain Operations Speaking Notes -ICLT Program
Complications of Minimal Access Surgery at WLH
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Insiders guide to clinical Medicine.pdf
Abdominal Access Techniques with Prof. Dr. R K Mishra
VCE English Exam - Section C Student Revision Booklet
RMMM.pdf make it easy to upload and study
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf

Secure mining of association rules in horizontally distributed databases

  • 1. Secure Mining of Association Rules in Horizontally Distributed Databases ABSTRACT: We propose a protocol for secure mining of association rules in horizontally distributed databases. The current leading protocol is that of Kantarcioglu and Clifton. Our protocol, like theirs, is based on the Fast Distributed Mining (FDM) algorithm of Cheung et al. which is an unsecured distributed version of the Apriori algorithm. The main ingredients in our protocol are two novel secure multi-party algorithms — one that computes the union of private subsets that each of the interacting players hold, and another that tests the inclusion of an element held by one player in a subset held by another. Our protocol offers enhanced privacy with respect to the protocol. In addition, it is simpler and is significantly more efficient in terms of communication rounds, communication cost and computational cost. EXISTING SYSTEM: Kantarcioglu and Clifton studied that problems and devised a protocol for its solution. The main part of the protocol is a sub-protocol for the secure computation of the union of private subsets that are held by the different players. (The private subset of a given player, as we explain below, includes the item sets that are s-
  • 2. frequent in his partial database. That is the most costly part of the protocol and its implementation relies upon cryptographic primitives such as commutative encryption, oblivious transfer, and hash functions. This is also the only part in the protocol in which the players may extract from their view of the protocol information on other databases, beyond what is implied by the final output and their own input. While such leakage of information renders the protocol not perfectly secure, the perimeter of the excess information is explicitly bounded and it is argued there that such information leakage is innocuous, whence acceptable from a practical point of view. DISADVANTAGES OF EXISTING SYSTEM:  Insufficient security, simplicity and efficiency are not well in the databases, not sure in privacy in an existing system.  While our solution is still not perfectly secure, it leaks excess information only to a small number (three) of possible coalitions, unlike the protocol of that discloses information also to some single players.  Our protocol may leak is less sensitive than the excess information leaked by the protocol.
  • 3. PROPOSED SYSTEM: The protocol that we propose here computes a parameterized family of functions, which we call threshold functions, in which the two extreme cases correspond to the problems of computing the union and intersection of private subsets. Those are in fact general-purpose protocols that can be used in other contexts as well. Another problem of secure multiparty computation that we solve here as part of our discussion is the set inclusion problem; namely, the problem where Alice holds a private subset of some ground set, and Bob holds an element in the ground set, and they wish to determine whether Bob’s element is within Alice’s subset, without revealing to either of them information about the other party’s input beyond the above described inclusion. ADVANTAGES OF PROPOSED SYSTEM:  We proposed a protocol for secure mining of association rules in horizontally distributed databases that improves significantly upon the current leading protocol in terms of privacy and efficiency.
  • 4.  The main ingredient in our proposed protocol is a novel secure multi-party protocol for computing the union (or intersection) of private subsets that each of the interacting players holds. SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS: • System : Pentium IV 2.4 GHz. • Hard Disk : 40 GB. • Floppy Drive : 1.44 Mb. • Monitor : 15 VGA Colour. • Mouse : Logitech. • Ram : 512 Mb. SOFTWARE REQUIREMENTS: • Operating system : - Windows XP. • Coding Language : ASP.NET, C#.Net. • Data Base : SQL Server 2005
  • 5. REFERENCE: Tamir Tassa “Secure Mining of Association Rules in Horizontally Distributed Databases” IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2013.