Skip to main content
Top

2016 | OriginalPaper | Chapter

Hash-Based Rule Mining Algorithm in Data-Intensive Homogeneous Cloud Environment

Authors : Raghvendra Kumar, Prasant Kumar Pattnaik, Yogesh Sharma

Published in: Proceedings of the Second International Conference on Computer and Communication Technologies

Publisher: Springer India

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Today Innovative Technology is used to analyze and manipulate huge amount of data in the cloud computing environment. It is very challenging task because the privacy and security are the main issue. Because the scenario of the cloud environment is given, then the distributed database comes in the picture as well as privacy. In this paper, we used the concept of pseudo random number, and for finding the strong Association rule in the database, we used the Inverted hashing and pruning as well as distributing the database into the different number of cloud nodes, and finding the global result, we used Distributed secure sum protocol in the homogenous cloud environments, where the number of attributes will be same, the number of transactions wearies from node to node.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Yao, A.C.: Protocol for secure computations. In: Proceedings of the 23rd annual IEEE symposium on foundation of computer science, pp. 160–164. IEEE Press, Chicago, USA, 1982 Yao, A.C.: Protocol for secure computations. In: Proceedings of the 23rd annual IEEE symposium on foundation of computer science, pp. 160–164. IEEE Press, Chicago, USA, 1982
2.
go back to reference Yao, A.C.C.: How to generate and exchange secrets (extended abstract). In: Proceedings of the 27th IEEE Symposium on Foundations of Computer Science (FOCS). IEEE Press USA (1986) Yao, A.C.C.: How to generate and exchange secrets (extended abstract). In: Proceedings of the 27th IEEE Symposium on Foundations of Computer Science (FOCS). IEEE Press USA (1986)
3.
go back to reference Agrawal, R. et al.: Mining association rules between sets of items in large database. In: Proceedings of ACM SIGMOD’93, pp. 207–216. D.C. ACM Press, Washington (1993) Agrawal, R. et al.: Mining association rules between sets of items in large database. In: Proceedings of ACM SIGMOD’93, pp. 207–216. D.C. ACM Press, Washington (1993)
4.
go back to reference Li, D.Y., Li, D.R.: Mining association rule with Linuistic cloud model [J]. J. Softw. 2, 143–158 (2000) Li, D.Y., Li, D.R.: Mining association rule with Linuistic cloud model [J]. J. Softw. 2, 143–158 (2000)
5.
go back to reference Clifton, C., Lin, D.: Tool for privacy preserving distributed data mining [J]. SIGKDD Explorations 2, 28–34 (2002) Clifton, C., Lin, D.: Tool for privacy preserving distributed data mining [J]. SIGKDD Explorations 2, 28–34 (2002)
7.
go back to reference Chen, X., Orlowska, M.: A new framework for privacy preserving data sharing. In: Proceedings of the 4th IEEE ICDM Workshop: Privacy and Security Aspects of Data Mining, pp. 47–56. IEEE Computer Society (2004) Chen, X., Orlowska, M.: A new framework for privacy preserving data sharing. In: Proceedings of the 4th IEEE ICDM Workshop: Privacy and Security Aspects of Data Mining, pp. 47–56. IEEE Computer Society (2004)
8.
go back to reference Mielikainen, T.: On inverse frequent set mining. In: Proceedings 3rd IEEE ICDM Workshop on Privacy Preserving Data Mining, pp. 18–23. IEEE Computer Society (2003) Mielikainen, T.: On inverse frequent set mining. In: Proceedings 3rd IEEE ICDM Workshop on Privacy Preserving Data Mining, pp. 18–23. IEEE Computer Society (2003)
9.
go back to reference Du, W., Atallah, M.: Secure Multi-party Computation: A Review and Open Problems. CERIAS Tech. Report 2001-51, Purdue University (2001) Du, W., Atallah, M.: Secure Multi-party Computation: A Review and Open Problems. CERIAS Tech. Report 2001-51, Purdue University (2001)
10.
go back to reference Srikant, R., Agrawal, R.: Mining generalized association rules. In: VLDB’95, pp. 479–488 Zurich, Switzerland, 1994 Srikant, R., Agrawal, R.: Mining generalized association rules. In: VLDB’95, pp. 479–488 Zurich, Switzerland, 1994
11.
go back to reference Agrawal, R., Srikant, R.: Privacy-preserving data mining. In: Proceedings of the 2000 ACM SIGMOD on management of data, pp. 439–450. ACM Press, Dallas, TX USA (2000) Agrawal, R., Srikant, R.: Privacy-preserving data mining. In: Proceedings of the 2000 ACM SIGMOD on management of data, pp. 439–450. ACM Press, Dallas, TX USA (2000)
12.
go back to reference Lindell, Y., Pinkas, B.: Privacy preserving data mining. In: Proceedings of 20th Annual International Cryptology Conference (CRYPTO), Santa Barbara, California, USA (2000) Lindell, Y., Pinkas, B.: Privacy preserving data mining. In: Proceedings of 20th Annual International Cryptology Conference (CRYPTO), Santa Barbara, California, USA (2000)
13.
go back to reference Clifton, C., Kantarcioglou, M., Xiadong, L., Michaed, Y.Z.: Tools for privacy preserving distributed data mining. SIGKDD Explorations 4(2), 43–48 (2002) Clifton, C., Kantarcioglou, M., Xiadong, L., Michaed, Y.Z.: Tools for privacy preserving distributed data mining. SIGKDD Explorations 4(2), 43–48 (2002)
14.
go back to reference Vaidya, J., Clifton, C.: Privacy-Preserving Decision Trees over vertically partitioned data. Lecture Notes in Computer Science, vol. 3654 (2005) Vaidya, J., Clifton, C.: Privacy-Preserving Decision Trees over vertically partitioned data. Lecture Notes in Computer Science, vol. 3654 (2005)
15.
go back to reference Ioannidis, I., Grama, A., Atallah, M.: A secure protocol for computing dot-products in clustered and distributed environments. In: Proceedings of International Conference on Parallel Processing, pp. 379–384, 18–21 Aug 2002 Ioannidis, I., Grama, A., Atallah, M.: A secure protocol for computing dot-products in clustered and distributed environments. In: Proceedings of International Conference on Parallel Processing, pp. 379–384, 18–21 Aug 2002
Metadata
Title
Hash-Based Rule Mining Algorithm in Data-Intensive Homogeneous Cloud Environment
Authors
Raghvendra Kumar
Prasant Kumar Pattnaik
Yogesh Sharma
Copyright Year
2016
Publisher
Springer India
DOI
https://doi.org/10.1007/978-81-322-2517-1_3