A Novel Privacy Preserving Mining with Hybrid B. Ajit

advertisement
International Journal of Engineering Trends and Technology (IJETT) – Volume 18 Number3 - Dec 2014
A Novel Privacy Preserving Mining with Hybrid
Pattern Mining and Key Generation
B. Ajit1,C P V N J Mohan Rao2,Sairam Vakkalanka3
1,3
Final M.Tech Student1, Principal2 ,Assistant Professor3
,Dept of Compute science and engineering, Avanthi Institute of Engineering & Technology - Narsipatnam
Abstract: Association rule mining over horizontal
partitioning data is always an interesting research issue in
the field of knowledge and data engineering. Data holder
forwards the data sets to centralized server, privacy can be
maintained by security protocols, and our security protocol
communicates in terms of subsets from both the data
holders and player as ingredients for secure transmission.
Association rules can be generated at centralized server
efficiently. In this paper we are proposing a privacy
preserving mining approach with Improved Shamir secret
key generation for secure key generation and Bit Wise
Matrix approach.
Index Terms: Association Rule mining,Bit Wise Matrix ,
LaGrange’s polynomial.
I. INTRODUCTION
In general we use two methods which is multi security and
the other is computation of the party that catches all the
data of the database. If there is another one who is secures
the data in other words the third party then it would be easy
for the actor to post their inputs and get the data security
and get the result from him without any doubt of the data
leakage because of the belief on the third party that will
secure the data. But in the absence of such third party or
the secure data is not possible then it is necessity to with
the more secure way of getting data secure is that using the
association rule we can get the data secure
The important part of the protocol is to provide
security of the data by computing the sub protocol over the
group of the private database subsets which are obtained
from different actors which is more expensive to get access
over the data base protection over the other actors not to
make available of the data and also providing the security
of the data. Specifically our protocol does not depend upon
the commutative process of transfer data since the solution
of the process may not be secure to protect the data over
the huge leakage of data over the data storing information.
In this paper we propose a new protocol for security of
mining of the data organization in the horizontal circulated
databases. This protocol is based on the mining algorithm
ISSN: 2231-5381
known as quick distributed mining which is an unsafe
distributed form of the apriori algorithm. The important
parts of the algorithm is considered of two unique parts one
among them are security multi and the other is party
algorithm, among the two methods one calculates the
combination of private subsets in which each are relating
actors and the other method of the algorithm is that player .
our protocol provides the secure with respect to the
protocol it is simpler and suggestively more organized in
the communication and computation.
There is a drawback in the security of the mining
of the data using association rule over the horizontal
distribution of the database to get solve the problem there
are n number of sites to get the similar data base which is
nothing but gathering information of the same type but in
different articles. The purpose is to find the association rule
with minimum support and confidence for the required
database that stores the unified database while doing so it
will reveal the information of the other actor whose data
base is out of security.so we would like to secure the data
in the database not only for individual(within it) but also in
the global manner using the association rule.
II. RELATED WORK
In
the
traditional
association
rule
mining,companies give theirdata to the analyst for finding
the patterns or association rules exist between the items.
Although it is advantageous to achieve sophisticated
analysis on tremendous volumes of data in a cost-effective
way, there exist several serious security issues of the datamining as- a-service paradigm. One of the main security
issues is that the server has access to valuable data of the
owner and may learn sensitive information from it. There is
a loss of corporate privacy. Traditional distributing
algorithm based on apriori, main disadvantage of this
approach is multiple database scan and candidate set
generations
We are proposing an efficient distributed secure mining
mechanism, here data holders forwards the homogeneous
datasets to centralized server, all the data holders maintain
same schema. Association rules can be mined at server end.
http://www.ijettjournal.org
Page 126
International Journal of Engineering Trends and Technology (IJETT) – Volume 18 Number3 - Dec 2014
Players generate a key commutatively to encrypt the item
sets.
Data holders are players computes the locally frequent
items from their individual datasets and reduces the cost of
the dataset. Candidate sets can be generated for every
iteration of the item sets, collection of frequent items can
be extracted from fast distributed mining algorithm.
Players generate a random key and commutative
cipher and encrypt all the item sets, before encryption hash
value can be generated for every individual item set. Every
individual should select their different hash value. Prior
hashing is required for leakage of relation of itemsets and
maintains a hash table for set of hash values. Players add
fake item sets between the item sets.
Data Holder1
Data Holder2
Items can me merged and odd players the key to p1 and
even can be forwarded to p2,p1 combines all odd key by
removing fake vales and p2 combines all by eliminating
the fake values.P1 forwards the permuted list to p2 and p2
forwards permuted list p1,it represents the final list.
III. PROPOSED WORK
In this approach we are proposing a privacy preserving
mining approach with Bit Wise Matrix, it reduces problem
of multiple database scans and candidate set generations by
constructing the Bit Wise Matrix. Data can be integrated
from multiple data holders or players, for secure
transmission or distributed partitioning we are
implementing an improved lagranges’s polynomial
approach for secure key generation for encryption of data
from data holders with triple DES algorithm.
Data Holder1
Cipher Pattern
Cipher Pattern
Cipher Pattern
Encoder/Decoder
Centralized Server
Binary Matrix
Fig1 : Horizontal partitioning Architecture
Every individual data holder or player maintains
their transactions or patterns, in horizontal partitioning,
every data holder forwards their patterns to centralized
server after encryption of patterns which are at individual
end,At centralized server received pattern can be decrypted
with decoder and forwarded to Bit Wise Matrix to extract
frequent pattern from the received patterns.
For experimental purpose we establish connection between
the nodes and Central location (Key generation center)
through network or socket programming, Key can be
generated by using improved LaGrange’s polynomial
equation and key can be distributed to user
ISSN: 2231-5381
Every individual node participates in key generation
process and retrieves key by reconstruction. Encrypt the
datasets by using triple DES and key which is generated by
the LaGrange’s polynomial equation. All encrypted
datasets can be forwarded to centralized location and
decrypted with same symmetric key and forwards to
mining process.
Group key manger receives the registration
request from all the users, and generates a verification
share and forwards to all the requested users for
authentication purpose, generates the key using key
generation process and forwards the points to extraction of
http://www.ijettjournal.org
Page 127
International Journal of Engineering Trends and Technology (IJETT) – Volume 18 Number3 - Dec 2014
the key from the equation generated by the verification
points.
For key generation protocol, it receives the
verification shares and key as input to construct the
lagranges polynomial equation f(x), which is passed
through (0, key) and verification points, after that group
key manager forwards the points to data owners. Data
owners again reconstruct the key from the verification
points and check the authentication code which is sent by
the group key manager.
When a new user tries to download the file, new
user need not to connect other data owner to decryption of
the file, user connects to the group key manager he will
update the group key and decrypts the files with previous
key again encrypt with new key and updates the new key to
all the data owners.
Data owner initiate the request by sending the
random challenge to the group key manager, as a response
Group key manager sends a secret share, data owner
authenticates and forwards the verification share, data
owner receives the verification shares and generates the
key using Lagrange’s polynomial equation and forwards
the points to data owners for regeneration the key
4. Points(Subset of P points)
1. Request ( Rch)
Node users
2.Response (Sshare)
Group
Key
manager
3.Vshare
Fig2 : Authentication and Key Generation
Rch ----Random challenge
Sshare---Secret share
Vshare----verification share
P={p1,p2…pn}-------points for construction of Lagrange’s equation
Bit Wise Matrix:
type of values, ‘1’ and ‘0’, which means that the
The server or service provider performing association rule
transaction record contains or not the corresponding
mining on cipher database for finding maximum frequent
frequent length-1 itemset. Then it is necessary to calculate
item sets. Thus the research presented a new algorithm of
the number of value 1 in each column and the count of the
mining maximum frequent itemsets first based on the Bit
columns with the same number of value 1
Wise Matrix of frequent length-1 itemsets. The main idea
of the algorithm isto create a Bit Wise Matrix with frequent
length-1 itemsets as row headings and Transaction records
IDs as column headings. In the matrix, there are only two
Itemset
Transaction Records ID
1 2
3
4
5
6
7
8
9
10
Item1
1 1
0
1
0
0
1
0
1
1
Item2
0 1
1
0
1
0
1
0
1
1
Item3
1 0
0
1
1
1
0
1
0
0
Item4
1 0
0
1
0
1
0
1
0
0
Fig 3 :Bit Wise Matrix
ISSN: 2231-5381
http://www.ijettjournal.org
Page 128
International Journal of Engineering Trends and Technology (IJETT) – Volume 18 Number3 - Dec 2014
Now we can extract frequent patterns from the matrix,
to extract frequent 1 itemset, initially count number of ones
in vertical columns with respect to item, if it matches
minimum threshold values then treat it as frequent item
else ignore, continue same process for 2 itemset, check
whether two items have ‘1’ in their corresponding vertical
columns then increment, continue until all transactions
verified. If total count greater than threshold value then
treat it as frequent item
IV. CONCLUSION
We have been concluding our current research
work with efficient association rule mining approach in
secure manner over horizontal databases with our losing
the data integrity ,a secure session key can be generated
through efficient and improved Shamir secret share
technique and cipher data can be received and decrypted
by centralized server and finds the frequent patterns from
its end in an accurate and efficient manner
REFERENCES
1. The Round Complexity of Secure Protocols by Donald
Beaver*Harvard Universitys
2. D.W.L Cheung, V.T.Y. Ng, A.W.C. Fu, and Y. Fu.
Efficient mining of association rules in distributed
databases. IEEE Trans. Knowl. Data Eng., 8(6):911–922,
1996.
3. R. Agrawal and R. Srikant.Privacy-preserving data
mining. In SIGMODConference, pages 439–450, 2000.
4. M. Bellare, R. Canetti, and H. Krawczyk. Keying hash
functions for message authentication. In Crypto, pages 1–
15, 1996.
[5] A. Ben-David, N. Nisan, and B. Pinkas.FairplayMP - A
system forsecure multi-party computation. In CCS, pages
257–266, 2008.
[6] J.C. Benaloh. Secret sharing homomorphisms: Keeping
shares of a secretsecret. In Crypto, pages 251–260, 1986.
[7] J. Brickell and V. Shmatikov.Privacy-preserving graph
algorithms inthe semi-honest model. In ASIACRYPT,
pages 236–252, 2005.
[8] D.W.L. Cheung, J. Han, V.T.Y. Ng, A.W.C. Fu, and Y.
Fu. A fastdistributed algorithm for mining association
rules. In PDIS, pages 31–42, 1996.
[9] D.W.L Cheung, V.T.Y. Ng, A.W.C. Fu, and Y. Fu.
Efficient miningof association rules in distributed
databases. IEEE Trans. Knowl. DataEng., 8(6):911–922,
1996.
[10] T. ElGamal. A public key cryptosystem and a
signature scheme based ondiscrete logarithms.IEEE
Transactions on Information Theory, 31:469–472, 1985.
ISSN: 2231-5381
BIOGRAPHIES
Dr. C.P.V.N.J Mohan Raois Professor in
the Department of Computer Science and
Engineering,
Avanthi Institute of
Engineering & Technology - Narsipatnam.
He did his PhD from Andhra University and
his research interests include Image Processing, Networks,
Information security, Data Mining and Software
Engineering. He has guided more than 50 M.Tech Projects
and currently guiding four research scholars for Ph.D. He
received many honors and he has been the member for
many expert committees, member of many professional
bodies and Resource person for various organizations.
SairamVakkalanka present working as
assistant professor in
department of
computer science and engineering at
Avanthi Institute of Engineering &
Technology – Narsipatnam and his research
interests are data mining and network
security
B.Ajit completed his BTech and currently
pursuing M.Tech in Department of
Computer Science and Engineering,
Avanthi Institute of Engineering &
Technology – Narsipatnam and his research
interests are data mining and network
security
http://www.ijettjournal.org
Page 129
Download