CFP last date
20 May 2024
Reseach Article

An Encrypted Technique with Association Rule Mining in Cloud Environment

Published on May 2012 by K. Ganeshkumar, H. Vignesh Ramamoorthy, S. Sudha, D. Suganya Devi
National Conference on Advancement of Technologies – Information Systems and Computer Networks
Foundation of Computer Science USA
ISCON - Number 3
May 2012
Authors: K. Ganeshkumar, H. Vignesh Ramamoorthy, S. Sudha, D. Suganya Devi
b6903bdc-ba72-4982-886a-6a0e00364c94

K. Ganeshkumar, H. Vignesh Ramamoorthy, S. Sudha, D. Suganya Devi . An Encrypted Technique with Association Rule Mining in Cloud Environment. National Conference on Advancement of Technologies – Information Systems and Computer Networks. ISCON, 3 (May 2012), 5-8.

@article{
author = { K. Ganeshkumar, H. Vignesh Ramamoorthy, S. Sudha, D. Suganya Devi },
title = { An Encrypted Technique with Association Rule Mining in Cloud Environment },
journal = { National Conference on Advancement of Technologies – Information Systems and Computer Networks },
issue_date = { May 2012 },
volume = { ISCON },
number = { 3 },
month = { May },
year = { 2012 },
issn = 0975-8887,
pages = { 5-8 },
numpages = 4,
url = { /proceedings/iscon/number3/6470-1017/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Advancement of Technologies – Information Systems and Computer Networks
%A K. Ganeshkumar
%A H. Vignesh Ramamoorthy
%A S. Sudha
%A D. Suganya Devi
%T An Encrypted Technique with Association Rule Mining in Cloud Environment
%J National Conference on Advancement of Technologies – Information Systems and Computer Networks
%@ 0975-8887
%V ISCON
%N 3
%P 5-8
%D 2012
%I International Journal of Computer Applications
Abstract

Association rule mining discovers correlations between different itemsets in a transaction database. It provides important knowledge in business for decision makers. While most of previous studies concern the mining task in a centralized scenario, the mining procedure does not necessarily involve a single party only. For example, the database owner may outsource the mining task to a third party service provider. The database is sent to the service provider and the service provider computes and returns the association rules for the database owner. As another situation, different companies cooperate together to find out the global trend in the industry. The companies have to share the statistical information on their databases with others to find out the global rules. All these examples show that mining procedures may involve parties other than database owner. In such cases, we need to satisfy (1) data security to prevent dishonest parties from stealing information in the database and (2) result integrity to prevent dishonest parties from corrupting the mining result. In this paper, we summarize our research work in ensuring security of association rule mining in some common scenarios. To be specific, we will discuss (i) security issues in incremental distributed association rule mining; (ii) security issues in outsourcing of association rule mining.

References
  1. R. Agrawal, T. Imielinski, and A. Swami. Mining association rules between sets of items in large databases, SIGMOD, 1993.
  2. R. Agrawal and R. Srikant. Fast algorithms for mining association rules, VLDB, 1994.
  3. R. Agrawal and R. Srikant. Privacy-preserving data mining, SIGMOD, 2000.
  4. G. I. Davida, D. L. Wells, and J. B. Kam. A database encryption system with subkeys, ACM TODS, 6(2):312–328, 1981.
  5. Evfimievski, R. Srikant, R. Agrawal, and J. Gehrke. Privacy preserving mining of association rules, SIGKDD, 2002.
  6. Transactional database, http://en. wikipedia. org/wiki/Database_transaction.
  7. Substitution Cipher, http://en. wikipedia. org/wiki/Substitution_cipher.
  8. Cloud service provider,
  9. http://www. techno-pulse. com/2010/03/india-based-cloud-service-providers. html.
  10. Dr. Sujni Paul. An Optimized Distributed Association Rule Mining Algorithm in Parallel and Distributed Data Mining with XML Data for Improved Response Time, International Journal of Computer Science and Information Technology, Volume 2, Number 2, April 2010.
  11. Sotiris Kotsiantis, Dimitris Kanellopoulos. Association Rules Mining: A Recent Overview, GESTS International Transactions on Computer Science and Engineering, Vol. 32 (1), 2006, pp. 71-82.
  12. Alka Gangrade, Durgesh Kumar Mishra and Ravindra Patel. Classification Rule Mining through SMC for Preserving Privacy Data Mining: A Review, 2009 International Conference on Machine Learning and Computing IPCSIT vol. 3 (2011) © (2011) IACSIT Press, Singapore.
  13. Greg Boss, Padma Malladi, Dennis Quan, Linda Legregni, Cloud Computing, Harold Hall. High Performance On Demand Solutions (HiPODS), www. ibm. com/ developerworks/websphere/zones/hipods/
Index Terms

Computer Science
Information Sciences

Keywords

Association Rule Mining Service Provider Database Outsourcing Distributed