Mining Privacy-Preserving Association Rules based on Parallel Processing in Cloud Computing
Mining Privacy-Preserving Association Rules based on Parallel Processing in Cloud Computing |
||
|
||
© 2022 by IJETT Journal | ||
Volume-70 Issue-3 |
||
Year of Publication : 2022 | ||
Authors : Dhinakaran D, Joe Prathap P. M, Selvaraj D, Arul Kumar D, Murugeshwari B |
||
https://doi.org/10.14445/22315381/IJETT-V70I3P232 |
How to Cite?
Dhinakaran D, Joe Prathap P. M, Selvaraj D, Arul Kumar D, Murugeshwari B, "Mining Privacy-Preserving Association Rules based on Parallel Processing in Cloud Computing," International Journal of Engineering Trends and Technology, vol. 70, no. 3, pp. 284-294, 2022. Crossref, https://doi.org/10.14445/22315381/IJETT-V70I3P232
Abstract
With the onset of the Information Era and the rapid growth of information technology, ample space for processing and extracting data has opened up. However, privacy concerns may stifle expansion throughout this area. The challenge of reliable mining techniques when transactions disperse across sources is addressed in this study. This work looks at the prospect of creating a new set of three algorithms that can obtain maximum privacy, data utility, and time savings while doing so. This paper proposes a unique double encryption and Transaction Splitter approach to alter the database to optimize the data utility and confidentiality tradeoff in the preparation phase. This paper presents a customized apriori approach for the mining process, which does not examine the entire database to estimate the support for each attribute. Existing distributed data solutions have a high encryption complexity and an insufficient specification of many participants` properties. Proposed solutions provide increased privacy protection against a variety of attack models. Furthermore, in terms of communication cycles and processing complexity, it is much simpler and quicker. Proposed work tests on top of a real-world transaction database demonstrate that the aim of the proposed method is realistic.
Keywords
Privacy, Association Rule Mining (ARM), Cloud, Apriori algorithm, Distributed system.
Reference
[1] Giacomelli, S. Jha, R. Kleiman, D. Page, and K. Yoon, Privacy-Preserving Collaborative Prediction using Random Forests, AMIA Jt. Summits Transl. Sci. Proceedings. AMIA Jt. Summits Transl. Sci. 2019 (2019) 248–257.
[2] Dhinakaran D, and Joe Prathap P M, A Study on Data Mining: Frequent Itemset Mining Methods Apriori, FP growth, Eclat, International Journal of Scientific Research in Computer Science, Engineering and Information Technology, IJSRCSEIT. 2(6) (2017) 526-533.
[3] S. Qiu, B. Wang, M. Li, J. Liu, and Y. Shi, Toward Practical Privacy-Preserving Frequent Itemset Mining on Encrypted Cloud Data, IEEE Trans. Cloud Comput. 8(1) (2020) 312–323.
[4] Dhinakaran D, and Joe Prathap P M, A Brief Study of Privacy-Preserving Practices (PPP) in Data Mining, TEST Engineering & Management. 82 (2020) 7611 - 7622.
[5] C. Ma, B. Wang, K. Jooste, Z. Zhang, and Y. Ping, Practical Privacy-Preserving Frequent Itemset Mining on Supermarket Transactions, IEEE Syst. J. 14(2) (2020) 1992–2002.
[6] X. Su, K. Fan, and W. Shi, Privacy-Preserving Distributed Data Fusion Based on Attribute Protection, in IEEE Transactions on Industrial Informatics. 15(10) (2019) 5765-5777.
[7] Dhinakaran D, and Joe Prathap P.M, Ensuring Privacy of Data and Mined Results of Data Possessor in Collaborative ARM, In Ranganathan G., Bestak R., Palanisamy R., Rocha Á. (eds) Pervasive Computing and Social Networking. Lecture Notes in Networks and Systems, Springer, Singapore. 317 (2022).
[8] Han, Q. Lu, D. Zhang, K. Song, H. Zhang, and Haitao, Secure Mining of Association Rules in Distributed Datasets, IEEE Access. 7 (2019) 155325 - 155334.
[9] Chandrasekharan, P. K. Baruah, and R. Mukkamala, Privacy-Preserving Frequent Itemset Mining in Outsourced Transaction Databases, 2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI). (2015) 787-793.
[10] V. Baby, and N. Subhash Chandra, Privacy-Preserving Association Rule Mining Based on Homomorphic Computations, Int. J. Information Privacy, Security and Integrity. 3(4) (2018) 268-283.
[11] H. Pang, and B. Wang, Privacy-Preserving Association Rule Mining Using Homomorphic Encryption in a Multikey Environment, in IEEE Systems Journal. 15(2) (2021) 3131-3141.
[12] C. Ma, B. Wang, K. Jooste, Z. Zhang, and Y. Ping, Practical Privacy-Preserving Frequent Itemset Mining on Supermarket Transactions, in IEEE Systems Journal. 14(2) (2020) 1992-2002.
[13] S. K. Thakur, B. Bhagat, and S. Bhattacharjee, Privacy-Preserving Outsourced Mining of D-Eclat Association Rules on Vertically Partitioned Databases, 2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA). (2018) 1-5.
[14] K. Agrawal, and V. Tewari, Analysis of Privacy-Preserving Mechanisms for Outsourced Data Mining, 2017 International Conference on Recent Innovations in Signal Processing and Embedded Systems (RISE). (2017) 572-576.
[15] H. Kim, J. Shin, Y. Song, and J. Chang, Privacy-Preserving Association Rule Mining Algorithm for Encrypted Data in Cloud Computing, 2019 IEEE 12th International Conference on Cloud Computing (CLOUD). (2019) 487-489.
[16] S. Sharma, J. Powers, and K. Chen, Private Graph: Privacy-Preserving Spectral Analysis of Encrypted Graphs in the Cloud, in IEEE Transactions on Knowledge and Data Engineering. 31(5) (2019) 981-995.
[17] S. Qiu, B. Wang, M. Li, J. Liu, and Y. Shi, Toward Practical Privacy-Preserving Frequent Itemset Mining on Encrypted Cloud Data, in IEEE Transactions on Cloud Computing. 8(1) (2020) 312-323.
[18] S. Priyadarsini, B. Sangeerthana, S. Maheswari, and A. Prasanth, An Efficient Privacy-Preserving in Frequent Item Set for Cloud Environment Using Apriori, Annals of the Romanian Society for Cell Biology. 25(6) (2021) 2934–2946.
[19] L Li, R Lu, K R Choo, Datta A, and J. Shao, Privacy-Preserving Outsourced ARM on Vertically Partitioned Databases, IEEE Transactions. 11(8) (2016) 1847 – 1861.
[20] M. Qaosar et al., A Framework for Privacy-Preserving Multi-Party Skyline Query Based on Homomorphic Encryption, in IEEE Access. 7 (2019) 167481-167496.
[21] L. Xue, D. Liu, J. Ni, X. Lin, and X. Shen, Consent-Based Privacy-Preserving Decision Tree Evaluation, ICC 2020 - 2020 IEEE International Conference on Communications (ICC). (2020) 1-6.
[22] K. Sudharson, and V. Parthipan, A Survey on ATTACK – Anti-Terrorism Technique for Adhoc using Clustering and Knowledge Extraction, Advances in Computer Science and Information Technology. Computer Science and Engineering, CCSIT 2012. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Springer, Berlin, Heidelberg. 85 (2012) 508-514.
[23] J. Aruna Jasmine, V. Nisha Jenipher, J. S. Richard Jimreeves, K. Ravindran, and D. Dhinakaran, A Traceability Set Up Using Digitalization of Data and Accessibility, 2020 3rd International Conference on Intelligent Sustainable Systems (ICISS). (2020) 907-910.
[24] D. Yang, B. Qu, and P. Cudre-Mauroux, Privacy-Preserving Social Media Data Publishing for Personalized Ranking-Based Recommendation, in IEEE Transactions on Knowledge and Data Engineering. 31(3) (2019) 507-520.
[25] S. Arun, and K. Sudharson, DEFECT: Discover and Eradicate Fool Around the Node in the Emergency Network using Combinatorial Techniques, Journal of Ambient Intelligence and Humanized Computing. (2020) 1-12.
[26] Jae-Seong Lee, and Seung-Pyo Jun, Privacy-Preserving Data Mining for Open Government Data from Heterogeneous Sources, Government Information Quarterly. 38(1) (2021).
[27] R. Vijay Anand, R. Thiagarajan, and D. Dhinakaran, Data Accumulation with a Reduced Amount of Retard Requirements for Wireless Sensor Networks, TEST Engineering & Management. 83 (2020) 3011-3017.
[28] F. Wang, H. Zhu, X. Liu, R. Lu, J. Hua, et al., Privacy-Preserving Collaborative Model Learning Scheme for E-Healthcare, IEEE Access. 7 (2019) 166054 – 166065.
[29] Pandya, P. Kostakos, H. Mehmood, M. Cortes, E. Gilman, et al., Privacy-Preserving Sentiment Analysis on Multiple Edge Data Streams with Apache Nifi, 2019 European Intelligence And Security Informatics Conference (EISIC). (2019) 130-133.
[30] Adel Rajab, Sehrish Aqeel, Mana Saleh Al Reshan, Awais Ashraf, Sultan Almakdi, Khairan Rajab, Cryptography Based Techniques of Encryption for Security of Data in Cloud Computing Paradigm International Journal of Engineering Trends and Technology. 69(10) (2021) 1-6.