SlideShare a Scribd company logo
SECURE MINING OF ASSOCIATION RULES IN HORIZONTALLY DISTRIBUTED 
DATABASES 
ABSTRACT: 
We propose a protocol for secure mining of association rules in horizontally distributed 
databases. The current leading protocol is that of Kantarcioglu and Clifton. Our protocol, like 
theirs, is based on the Fast Distributed Mining (FDM) algorithm of Cheung et al. which is an 
unsecured distributed version of the Apriori algorithm. The main ingredients in our protocol are 
two novel secure multi-party algorithms — one that computes the union of private subsets that 
each of the interacting players hold, and another that tests the inclusion of an element held by 
one player in a subset held by another. Our protocol offers enhanced privacy with respect to the 
protocol. In addition, it is simpler and is significantly more efficient in terms of communication 
rounds, communication cost and computational cost.
SYSTEM ANALYSIS 
EXISTING SYSTEM: 
Kantarcioglu and Clifton studied that problems and devised a protocol for its solution. The main 
part of the protocol is a sub-protocol for the secure computation of the union of private subsets 
that are held by the different players. (The private subset o f a given player, as we explain below, 
includes the item sets that are s- frequent in his partial database. That is the most costly part of the 
protocol and its implementation relies upon cryptographic primitives such as commutative 
encryption, oblivious transfer, and hash functions. This is also the only part in the protocol in 
which the players may extract from their view of the protocol information on other databases, 
beyond what is implied by the final output and their own input. While such leakage of 
information renders the protocol not perfectly secure, the perimeter of the excess information is 
explicitly bounded and it is argued there that such information leakage is innocuous, whence 
acceptable from a practical point of view. 
DISADVANTAGES OF EXISTING SYSTEM: 
 Insufficient security, simplicity and efficiency are not well in the databases, not sure in 
privacy in an existing system. 
 While our solution is still not perfectly secure, it leaks excess information only to a small 
number (three) of possible coalitions, unlike the protocol of that discloses information also to 
some single players. 
 Our protocol may leak is less sensitive than the excess information leaked by the protocol.
PROPOSED SYSTEM: 
The protocol that we propose here computes a parameterized family of functions, which we call 
threshold functions, in which the two extreme cases correspond to the problems of computing the 
union and intersection of private subsets. Those are in fact general-purpose protocols that can be 
used in other contexts as well. Another problem of secure multiparty computation that we solve 
here as part of our discussion is the set inclusion problem; namely, the problem where Alice 
holds a private subset of some ground set, and Bob holds an element in the ground set, and they 
wish to determine whether Bob’s element is within Alice’s subset, without revealing to either of 
them information about the other party’s input beyond the above described inclusion. 
ADVANTAGES OF PROPOSED SYSTEM: 
 We proposed a protocol for secure mining of association rules in horizontally distributed 
databases that improves significantly upon the current leading protocol in terms of privacy 
and efficiency. 
 The main ingredient in our proposed protocol is a novel secure multi-party protocol for 
computing the union (or intersection) of private subsets that each of the interacting players 
holds.
SYSTEM REQUIREMENTS 
HARDWARE REQUIREMENTS: 
• System : Pentium IV 2.4 GHz. 
• Hard Disk : 40 GB. 
• Floppy Drive : 1.44 Mb. 
• Monitor : 15 VGA Colour. 
• Mouse : Logitech. 
• Ram : 512 Mb. 
SOFTWARE REQUIREMENTS: 
• Operating system : - Windows XP. 
• Coding Language : ASP.NET, C#.Net. 
• Data Base : SQL Server 2005 
REFERENCE: 
Tamir Tassa “Secure Mining of Association Rules in Horizontally Distributed Databases” IEEE 
TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2013.

More Related Content

DOCX
Secure mining of association rules in horizontally distributed databases
PPTX
Secure mining of association rules in horizontally distributed databases
DOCX
Secure mining of association rules in horizontally distributed databases
DOCX
secure mining of association rules in horizontally distributed databases
DOCX
Secure mining of association rules in horizontally distributed databases
DOCX
Secure mining of association rules in horizontally distributed databases
PDF
Efficient Data Mining Of Association Rules in Horizontally Distributed Databases
PPT
Chapter 11
Secure mining of association rules in horizontally distributed databases
Secure mining of association rules in horizontally distributed databases
Secure mining of association rules in horizontally distributed databases
secure mining of association rules in horizontally distributed databases
Secure mining of association rules in horizontally distributed databases
Secure mining of association rules in horizontally distributed databases
Efficient Data Mining Of Association Rules in Horizontally Distributed Databases
Chapter 11

Similar to Secure mining-of-association-rules-in-horizontally-distributed-databases-docx (20)

DOCX
JPD1416 Secure Mining Of Association Rules In Horizantally Distributed Data...
DOC
secure mining of association rules in horizontally distributed databases
PDF
Secure Mining of Association Rules in Horizontally Distributed Databases
DOCX
IEEE 2014 JAVA DATA MINING PROJECTS Secure mining of association rules in hor...
DOCX
2014 IEEE JAVA DATA MINING PROJECT Secure mining of association rules in hori...
PDF
Secure Mining of Association Rules in Horizontally Distributed Databases
DOCX
JAVA 2013 IEEE DATAMINING PROJECT Secure mining of association rules in horiz...
PDF
To allot secrecy-safe association rules mining schema using FP tree
PPT
Vinay bamane
PDF
IRJET- Secure Distributed Data Mining
PDF
Efficient Association Rule Mining in Heterogeneous Data Base
PDF
The International Journal of Engineering and Science (The IJES)
PDF
Privacy Preserving Distributed Association Rule Mining Algorithm for Vertical...
PDF
D-Eclat Association Rules on Vertically Partitioned Dynamic Data to Outsource...
PDF
International Journal of Computational Engineering Research(IJCER)
PDF
An Effective Heuristic Approach for Hiding Sensitive Patterns in Databases
PDF
Securing Personal Information in Data Mining
PDF
F04713641
PDF
F04713641
PPTX
Privacy Preservation Issues in Association Rule Mining in Horizontally Partit...
JPD1416 Secure Mining Of Association Rules In Horizantally Distributed Data...
secure mining of association rules in horizontally distributed databases
Secure Mining of Association Rules in Horizontally Distributed Databases
IEEE 2014 JAVA DATA MINING PROJECTS Secure mining of association rules in hor...
2014 IEEE JAVA DATA MINING PROJECT Secure mining of association rules in hori...
Secure Mining of Association Rules in Horizontally Distributed Databases
JAVA 2013 IEEE DATAMINING PROJECT Secure mining of association rules in horiz...
To allot secrecy-safe association rules mining schema using FP tree
Vinay bamane
IRJET- Secure Distributed Data Mining
Efficient Association Rule Mining in Heterogeneous Data Base
The International Journal of Engineering and Science (The IJES)
Privacy Preserving Distributed Association Rule Mining Algorithm for Vertical...
D-Eclat Association Rules on Vertically Partitioned Dynamic Data to Outsource...
International Journal of Computational Engineering Research(IJCER)
An Effective Heuristic Approach for Hiding Sensitive Patterns in Databases
Securing Personal Information in Data Mining
F04713641
F04713641
Privacy Preservation Issues in Association Rule Mining in Horizontally Partit...
Ad

More from Shakas Technologies (20)

DOCX
A Review on Deep-Learning-Based Cyberbullying Detection
DOCX
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
DOCX
A Novel Framework for Credit Card.
DOCX
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
DOCX
NS2 Final Year Project Titles 2023- 2024
DOCX
MATLAB Final Year IEEE Project Titles 2023-2024
DOCX
Latest Python IEEE Project Titles 2023-2024
DOCX
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
DOCX
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
DOCX
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
DOCX
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
DOCX
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
DOCX
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
DOCX
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
DOCX
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
DOCX
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
DOCX
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
DOCX
Fighting Money Laundering With Statistics and Machine Learning.docx
DOCX
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
DOCX
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
A Review on Deep-Learning-Based Cyberbullying Detection
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Novel Framework for Credit Card.
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
NS2 Final Year Project Titles 2023- 2024
MATLAB Final Year IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Fighting Money Laundering With Statistics and Machine Learning.docx
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
Ad

Recently uploaded (20)

PDF
RMMM.pdf make it easy to upload and study
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
Computing-Curriculum for Schools in Ghana
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
Sports Quiz easy sports quiz sports quiz
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
Basic Mud Logging Guide for educational purpose
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
01-Introduction-to-Information-Management.pdf
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PPTX
PPH.pptx obstetrics and gynecology in nursing
PDF
Pre independence Education in Inndia.pdf
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PPTX
Pharma ospi slides which help in ospi learning
PPTX
Institutional Correction lecture only . . .
PPTX
Lesson notes of climatology university.
RMMM.pdf make it easy to upload and study
Anesthesia in Laparoscopic Surgery in India
Computing-Curriculum for Schools in Ghana
Microbial disease of the cardiovascular and lymphatic systems
Abdominal Access Techniques with Prof. Dr. R K Mishra
Module 4: Burden of Disease Tutorial Slides S2 2025
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Sports Quiz easy sports quiz sports quiz
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Basic Mud Logging Guide for educational purpose
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
01-Introduction-to-Information-Management.pdf
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PPH.pptx obstetrics and gynecology in nursing
Pre independence Education in Inndia.pdf
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
Pharma ospi slides which help in ospi learning
Institutional Correction lecture only . . .
Lesson notes of climatology university.

Secure mining-of-association-rules-in-horizontally-distributed-databases-docx

  • 1. SECURE MINING OF ASSOCIATION RULES IN HORIZONTALLY DISTRIBUTED DATABASES ABSTRACT: We propose a protocol for secure mining of association rules in horizontally distributed databases. The current leading protocol is that of Kantarcioglu and Clifton. Our protocol, like theirs, is based on the Fast Distributed Mining (FDM) algorithm of Cheung et al. which is an unsecured distributed version of the Apriori algorithm. The main ingredients in our protocol are two novel secure multi-party algorithms — one that computes the union of private subsets that each of the interacting players hold, and another that tests the inclusion of an element held by one player in a subset held by another. Our protocol offers enhanced privacy with respect to the protocol. In addition, it is simpler and is significantly more efficient in terms of communication rounds, communication cost and computational cost.
  • 2. SYSTEM ANALYSIS EXISTING SYSTEM: Kantarcioglu and Clifton studied that problems and devised a protocol for its solution. The main part of the protocol is a sub-protocol for the secure computation of the union of private subsets that are held by the different players. (The private subset o f a given player, as we explain below, includes the item sets that are s- frequent in his partial database. That is the most costly part of the protocol and its implementation relies upon cryptographic primitives such as commutative encryption, oblivious transfer, and hash functions. This is also the only part in the protocol in which the players may extract from their view of the protocol information on other databases, beyond what is implied by the final output and their own input. While such leakage of information renders the protocol not perfectly secure, the perimeter of the excess information is explicitly bounded and it is argued there that such information leakage is innocuous, whence acceptable from a practical point of view. DISADVANTAGES OF EXISTING SYSTEM:  Insufficient security, simplicity and efficiency are not well in the databases, not sure in privacy in an existing system.  While our solution is still not perfectly secure, it leaks excess information only to a small number (three) of possible coalitions, unlike the protocol of that discloses information also to some single players.  Our protocol may leak is less sensitive than the excess information leaked by the protocol.
  • 3. PROPOSED SYSTEM: The protocol that we propose here computes a parameterized family of functions, which we call threshold functions, in which the two extreme cases correspond to the problems of computing the union and intersection of private subsets. Those are in fact general-purpose protocols that can be used in other contexts as well. Another problem of secure multiparty computation that we solve here as part of our discussion is the set inclusion problem; namely, the problem where Alice holds a private subset of some ground set, and Bob holds an element in the ground set, and they wish to determine whether Bob’s element is within Alice’s subset, without revealing to either of them information about the other party’s input beyond the above described inclusion. ADVANTAGES OF PROPOSED SYSTEM:  We proposed a protocol for secure mining of association rules in horizontally distributed databases that improves significantly upon the current leading protocol in terms of privacy and efficiency.  The main ingredient in our proposed protocol is a novel secure multi-party protocol for computing the union (or intersection) of private subsets that each of the interacting players holds.
  • 4. SYSTEM REQUIREMENTS HARDWARE REQUIREMENTS: • System : Pentium IV 2.4 GHz. • Hard Disk : 40 GB. • Floppy Drive : 1.44 Mb. • Monitor : 15 VGA Colour. • Mouse : Logitech. • Ram : 512 Mb. SOFTWARE REQUIREMENTS: • Operating system : - Windows XP. • Coding Language : ASP.NET, C#.Net. • Data Base : SQL Server 2005 REFERENCE: Tamir Tassa “Secure Mining of Association Rules in Horizontally Distributed Databases” IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2013.