Downloads: 108 | Views: 298
Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 11, November 2014 | Popularity: 7 / 10
Privacy-Preserving Mining of Association Rules in Cloud
Vishal Ravindra Redekar, Dr. K.N.Honwadkar
Abstract: With the appearance of cloud computing and its domains for IT services based on the internet and big data centers, the outsourcing of data and computing services is acquiring a huge relevance. The interest in the area of data mining, as a service, has been the main stay; because of the encouraged development in the various fields, such as Cloud Computing. A third party service provider, the server, comes in the frame, when a company, the data owner, who lacks in expertise or the resources, outsources its mining needs. However the data owner thinks both the items and the association rules of the outsourced Database as a confidential property. The server stores the data and ships transformed by the data owner. Then the data owner sends mining queries to the server, and the server returns the extracted patterns. From these patterns, the owner recovers the true patterns. Within corporate privacy-preserving frameworks, the problem of outsourcing the association rule mining responsibilities in the cloud environment is studied in this paper. An innovative approach ensures that every transformed item from data owner to server is interchangeable with compared to the background knowledge of attackers is proposed in the paper. Our methods are scalable, effectual and protect privacy on an extremely huge and real transaction database representative our complete algorithm. This approach also proposes to provide the privacy-preserving mining over cloud. We can assume that a conventional model where the adversary knows the area of items and their exact occurrence and can employ this information to identify cipher items and cipher item sets.
Keywords: Association rule mining, Privacy-preserving mining, Database outsourcing, Cloud environment, Extracted patterns
Edition: Volume 3 Issue 11, November 2014
Pages: 2214 - 2216
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, United States of America, Volume 12 Issue 11, November 2023
Pages: 998 - 1004AI-Infused Threat Detection and Incident Response in Cloud Security
Sumanth Tatineni
Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2
Research Paper, Computer Science & Engineering, India, Volume 12 Issue 12, December 2023
Pages: 997 - 999Unifying Intelligence: Federated Learning in Cloud Environments for Decentralized Machine Learning
Dr. Angajala Srinivasa Rao
Downloads: 3 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2
Research Paper, Computer Science & Engineering, United States of America, Volume 12 Issue 11, November 2023
Pages: 1013 - 1020Performance Evaluation of Serverless Computing Platforms in Cloud Environments
Sumanth Tatineni
Downloads: 3 | Weekly Hits: ⮙3 | Monthly Hits: ⮙3
Research Paper, Computer Science & Engineering, India, Volume 13 Issue 6, June 2024
Pages: 1356 - 1362Deploying Own Private Cloud
Divyamsh Reddy A, CB Manogna Reddy
Downloads: 4 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2
Research Paper, Computer Science & Engineering, India, Volume 11 Issue 12, December 2022
Pages: 1399 - 1403Optimized Resource Management in Cloud Computing: A Unified Approach with Adaptive Allocation and Predictive Scaling
Harish Narne