Open Access
Subscription Access
Open Access
Subscription Access
Secure Association Rule Mining on Vertically Partitioned Data using Fully Homomorphic Encryption
Subscribe/Renew Journal
Cloud Computing is a leading innovation technology that guides to access applications over the web. The data owner’s data can be gotten to and controlled in the cloud. Privacy has become conclusive in information-driven applications within the distributed outsourced information. There are numerous inquiries still coming up on the best way to accomplish a confided in a climate that monitors application and information in the cloud from unapproved users. For offering protection to the users, sporadically there is a need to encode the data before accomplishing any other process. The cryptography method is embraced for data privacy. In this paper, a privacy-preserving construction is intended for vertically partitioned data in the cloud with the assistance of the Fully Homomorphic Encryption method. In this work, the homomorphic encryption and the Fully Homomorphic Encryption method is taken into consideration. The performance of the Rule Mining algorithm namely Eclat is compared with the encryption algorithms. The examination result shows that the Fully Homomorphic Encryption is less time-consuming to generate rule in the cloud, regardless of the number of transactions.
Keywords
Frequent Itemset Mining, Association Rule Mining, Homomorphic Encryption, Fully Homomorphic Encryption.
Subscription
Login to verify subscription
User
Font Size
Information
- V. Sathya and Dr. V. Gayathri, “Encryption-Based Techniques for Privacy Preserving Data Mining”, International Journal of Scientific and Engineering Research, Vol. 8, No. 4, pp. 52-56, 2017.
- M. Kamber and J. Pei, “Mining Frequent Patterns, Associations and Correlations”, Morgan Kaufmaan Series, 2012.
- M. Kaur and S. Kang, “Market Basket Analysis: Identify the Changing Trends of Market Data using Association Rule Mining”, Procedia Computer Science, Vol. 20, No. 1, pp.78-85, 2016.
- A.M. Shahiri, W. Hussain and N.A. Rashid,” A Review on Predicting Student’s Performance using Data Mining Techniques”, Proceedings of 3rd International Conference on Information Systems, pp.414-422, 2015.
- S.S Shengzhi0 and X. Cheng, “Differentially Private Frequent Itemset Mining via Transaction Splitting”, IEEE Transactions on Knowledge and Data Engineering, Vol. 27, No. 7, pp.1875-1891, 2015.
- Sandeep and Liji, “Secure Outsourced Association Rule Mining using Homomorphic Encryption”, International Journal of Engineering Research and Science, Vol. 3, No. 9, pp. 1-13, 2017.
- R. Priya and Shweta, “A Tow Way Encryption for Privacy Preservation of Outsourced Transaction Database for Association Rule Mining”, International Journal of Scientific Research in Science and Technology, Vol. 4, No. 5, pp. 276-285, 2018.
- Boris and Ehud, “Association Rules Mining in Vertically Partitioned Databases”, Data and Knowledge Engineering, Vol. 59, No. 2, pp. 378-396, 2006.
- Xun and Tao, “More Efficient Fully Homomorphic Encryption Scheme Based on GSW and DM Scheme”, Security and Communication Networks, Vol. 2018, pp. 1-14, 2018.
- Kenta and Masami, “Secure Association Rule Mining on Vertically Partitioned Data Using Private-set Intersection”, IEEE Access, Vol. 8, pp. 1-10, 2017.
- N.V. Muthu Lakshmi and K. Sandhya Rani, “Privacy Preserving Association Rule Mining in Vertically Partitioned Databases”, International Journal of Computer Applications, Vol-39, pp.29-39, 2012.
- K. Chavan, P. Kulkarni and P. Ghodekar, “Frequent Itemset Mining for Big Data”, Proceedings of International Conference on Green Computing and Internet of Things, Vol. 1, pp. 1365-1368, 2015.
- Urvashi Garg, “Eclat Algorithm for Frequent Itemsets Generation”, International Journal of Computer Systems, Vol. 1, No. 3, pp. 82-84, 2014.
- L. Li and R. Lu, “Privacy-Preserving Outsourced Association Rule Mining on Vertically Partitioned Database”, IEEE Transactions on Information Forensics and Security, Vol. 11, pp. 1847-1861, 2016.
- Imran and Archana, “Homomorphic Encryption Applied to Cloud Computing”, International Journal of Information and Computation Technology, Vol. 4, No. 15, pp. 1519-1530, 2014.
- S. Varma and P.I Liji, “Secure Outsourced Association Rule Mining using Homomorphic Encryption”, International Journal on Engineering Research, Vol. 3, No. 9, pp.70-76, 2017.
- G. Kaosa, R. Paulet and X. Yi, “Secure Two-Party Association Rule Mining”, Proceedings of Australasian Conference on Security, pp.15-22, 2011.
Abstract Views: 260
PDF Views: 1