Privacy Preserving Secure Communication Pattern using Cryptographic Technique via Trusted Third Party (TTP) Model in Distributed Data Mining
نویسندگان
چکیده
As security plays an important role in most of the applications where small change of data can lead to major problems. Thus, to secure the information there is need of a stronger encryption, which is very hard to break. In order to achieve better results and improve security, several levels of encryption have to be applied to the information and the way of encryption should not be vulnerable to attacks. Some of the conventional encryption methods are implemented for encryption, but can be cracked easily with the high end technologies. The goal of this paper is to develop multi-level encrypting technique that can be used to encrypt top-secret data in the database. In this information era, data mining has emerged as a way for distinguishing patterns from huge quantities of information. Some database may contain private or personal data which should not be leaked out. Thus techniques of data mining without leaking the private information are needed. Also there is a demand for a stronger encryption which is very hard to crack. In this paper, we proposed a multi level of multiple encryption schemes for secure communication pattern (SCP) which enhances the security of the private data in database during data mining. In the recent past years, Privacy Preserving Data Mining (PPDM) has attracted research interest with potential for wide applications. Many techniques such as randomization, cryptography and anonymity have been experimented with privacy preserving data mining. The work considers information system based approach as not all attributes may store same level of sensitive data. Therefore, some attribute values may require higher degree of privacy preservation than some others. Here we explore the use of cryptography, namely Multilevel Encryption and Decryption (MLED) algorithm for encrypted data sharing to achieve privacy preservation. We focus on privately Secure Communication Patterns (SCP) that refers to a contributively relation of participants in computations of data mining under Trusted Third Party model. Here we analyze and assess each aspect of this issue, introducing a proposed framework based on strategies of SCP using multilevel encryption and decryption (MLED) algorithm in data mining with respect to the privacy preserving. Though our model consumes more CPU utilisation and execution time but it provides more security than the other cryptographic techniques.
منابع مشابه
Third Party Privacy Preserving Protocol for Secure Web Services
Web services is become major issue in distributed data mining. In the literature we can found a number of proposals of privacy preserving which can be divided into two major categories that is trusted third party and multiparty based privacy protocols. In case of the trusted third party privacy protocol models the conventional asymmetric cryptographic based techniques or algorithms will be used...
متن کاملDistributed Privacy Preserving Data Mining: A framework for k-anonymity based on feature set partitioning approach of vertically fragmented databases
Recently, many data mining algorithms for discovering and exploiting patterns in data are developed and the amount of data about individuals that is collected and stored continues to rapidly increase. However, databases containing information about individuals may be sensitive and data mining algorithms run on such data sets may violate individual privacy. Also most organizations collect and sh...
متن کاملPrivacy Preserving Data Mining For Horizontally Distributed Medical Data Analysis
To build reliable prediction models and identify useful patterns, assembling data sets from databases maintained by different sources such as hospitals becomes increasingly common; however, it might divulge sensitive information about individuals and thus leads to increased concerns about privacy, which in turn prevents different parties from sharing information. Privacy Preserving Distributed ...
متن کاملThird Party Privacy Preserving Protocol for Perturbation Based Classification of Vertically Fragmented Data Bases
Privacy is become major issue in distributed data mining. In the literature we can found many proposals of privacy preserving which can be divided into two major categories that is trusted third party and multiparty based privacy protocols. In case of trusted third party models the conventional asymmetric cryptographic based techniques will be used and in case of multi party based protocols dat...
متن کاملEfficient and Secure Data Sharing By Applying AES Algorithm with Anonymous Id Assignment
Security is a basic requirement of an organization in the world to keep their information secure from their competitors. Various techniques and algorithms were developed by research in order to achieve secure data sharing. We propose a technique for anonymous sharing of private data between N parties is developed. This technique is used to allocate these node ID numbers ranging from 1 to N and ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2017