期刊名称:International Journal of Innovative Research in Computer and Communication Engineering
印刷版ISSN:2320-9798
电子版ISSN:2320-9801
出版年度:2021
卷号:9
期号:7
页码:9058-9061
DOI:10.15680/IJIRCCE.2021.0907211
语种:English
出版社:S&S Publications
摘要:Data Mining, the process of extracting and discovering patterns in large data sets involving methods at the intersection of machine learning, statistics, and database systems, is used to get a particular data from the public cloud services using storage-as-a-service mechanism. In frequent mining usually the interesting associations and correlations between item sets in transactional and relational databases are found. The existing system construct the first homomorphic signature scheme that is capable of evaluating multivariate polynomials on signed data. Using the public key and a signed data set, there is an efficient algorithm to produce a signature on the mean, standard deviation, and other statistics of the signed data. We propose a privacy-preserving framework for secure frequent item set mining on encrypted data, where only one aided server referred to as Evaluator is needed besides the Cloud Service Provider (CSP). The CSP collects encrypted transactions and maintains an encrypted transaction database, and the Evaluator assists the CSP to carry mining on encrypted data. The data miner can submit frequent item set mining queries to the CSP, and we leverage an Evaluator to assist the CSP to send frequent item set mining efficiently on the transaction database. Experimental results show that our protocols are much more efficient than previous work with the same security levels. In this system, the data user register and login to the system, and encrypt the stored data using public key. Then upload the data to the CSP. In order to preserve privacy of frequent item set mining in public cloud services all the transactions are encrypted before contributing to the CSP. The CSP collects encrypted transactions and maintains an encrypted transaction database, and the Evaluator assists the CSP to carry mining query operations. The Evaluator generates key pairs, a Public key and a Secret Key for upload and download process for the user and miner respectively. Finally, the data miner downloads the decrypted data and carry the data mining process for finding frequent item sets.
关键词:Data mining;privacy;Cloud Service Provider;frequent itemset;Evaluator;encrypted;secret key