Skip to main content

2016 | OriginalPaper | Buchkapitel

Hash-Based Rule Mining Algorithm in Data-Intensive Homogeneous Cloud Environment

verfasst von : Raghvendra Kumar, Prasant Kumar Pattnaik, Yogesh Sharma

Erschienen in: Proceedings of the Second International Conference on Computer and Communication Technologies

Verlag: Springer India

Aktivieren Sie unsere intelligente Suche um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Today Innovative Technology is used to analyze and manipulate huge amount of data in the cloud computing environment. It is very challenging task because the privacy and security are the main issue. Because the scenario of the cloud environment is given, then the distributed database comes in the picture as well as privacy. In this paper, we used the concept of pseudo random number, and for finding the strong Association rule in the database, we used the Inverted hashing and pruning as well as distributing the database into the different number of cloud nodes, and finding the global result, we used Distributed secure sum protocol in the homogenous cloud environments, where the number of attributes will be same, the number of transactions wearies from node to node.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Yao, A.C.: Protocol for secure computations. In: Proceedings of the 23rd annual IEEE symposium on foundation of computer science, pp. 160–164. IEEE Press, Chicago, USA, 1982 Yao, A.C.: Protocol for secure computations. In: Proceedings of the 23rd annual IEEE symposium on foundation of computer science, pp. 160–164. IEEE Press, Chicago, USA, 1982
2.
Zurück zum Zitat Yao, A.C.C.: How to generate and exchange secrets (extended abstract). In: Proceedings of the 27th IEEE Symposium on Foundations of Computer Science (FOCS). IEEE Press USA (1986) Yao, A.C.C.: How to generate and exchange secrets (extended abstract). In: Proceedings of the 27th IEEE Symposium on Foundations of Computer Science (FOCS). IEEE Press USA (1986)
3.
Zurück zum Zitat Agrawal, R. et al.: Mining association rules between sets of items in large database. In: Proceedings of ACM SIGMOD’93, pp. 207–216. D.C. ACM Press, Washington (1993) Agrawal, R. et al.: Mining association rules between sets of items in large database. In: Proceedings of ACM SIGMOD’93, pp. 207–216. D.C. ACM Press, Washington (1993)
4.
Zurück zum Zitat Li, D.Y., Li, D.R.: Mining association rule with Linuistic cloud model [J]. J. Softw. 2, 143–158 (2000) Li, D.Y., Li, D.R.: Mining association rule with Linuistic cloud model [J]. J. Softw. 2, 143–158 (2000)
5.
Zurück zum Zitat Clifton, C., Lin, D.: Tool for privacy preserving distributed data mining [J]. SIGKDD Explorations 2, 28–34 (2002) Clifton, C., Lin, D.: Tool for privacy preserving distributed data mining [J]. SIGKDD Explorations 2, 28–34 (2002)
7.
Zurück zum Zitat Chen, X., Orlowska, M.: A new framework for privacy preserving data sharing. In: Proceedings of the 4th IEEE ICDM Workshop: Privacy and Security Aspects of Data Mining, pp. 47–56. IEEE Computer Society (2004) Chen, X., Orlowska, M.: A new framework for privacy preserving data sharing. In: Proceedings of the 4th IEEE ICDM Workshop: Privacy and Security Aspects of Data Mining, pp. 47–56. IEEE Computer Society (2004)
8.
Zurück zum Zitat Mielikainen, T.: On inverse frequent set mining. In: Proceedings 3rd IEEE ICDM Workshop on Privacy Preserving Data Mining, pp. 18–23. IEEE Computer Society (2003) Mielikainen, T.: On inverse frequent set mining. In: Proceedings 3rd IEEE ICDM Workshop on Privacy Preserving Data Mining, pp. 18–23. IEEE Computer Society (2003)
9.
Zurück zum Zitat Du, W., Atallah, M.: Secure Multi-party Computation: A Review and Open Problems. CERIAS Tech. Report 2001-51, Purdue University (2001) Du, W., Atallah, M.: Secure Multi-party Computation: A Review and Open Problems. CERIAS Tech. Report 2001-51, Purdue University (2001)
10.
Zurück zum Zitat Srikant, R., Agrawal, R.: Mining generalized association rules. In: VLDB’95, pp. 479–488 Zurich, Switzerland, 1994 Srikant, R., Agrawal, R.: Mining generalized association rules. In: VLDB’95, pp. 479–488 Zurich, Switzerland, 1994
11.
Zurück zum Zitat Agrawal, R., Srikant, R.: Privacy-preserving data mining. In: Proceedings of the 2000 ACM SIGMOD on management of data, pp. 439–450. ACM Press, Dallas, TX USA (2000) Agrawal, R., Srikant, R.: Privacy-preserving data mining. In: Proceedings of the 2000 ACM SIGMOD on management of data, pp. 439–450. ACM Press, Dallas, TX USA (2000)
12.
Zurück zum Zitat Lindell, Y., Pinkas, B.: Privacy preserving data mining. In: Proceedings of 20th Annual International Cryptology Conference (CRYPTO), Santa Barbara, California, USA (2000) Lindell, Y., Pinkas, B.: Privacy preserving data mining. In: Proceedings of 20th Annual International Cryptology Conference (CRYPTO), Santa Barbara, California, USA (2000)
13.
Zurück zum Zitat Clifton, C., Kantarcioglou, M., Xiadong, L., Michaed, Y.Z.: Tools for privacy preserving distributed data mining. SIGKDD Explorations 4(2), 43–48 (2002) Clifton, C., Kantarcioglou, M., Xiadong, L., Michaed, Y.Z.: Tools for privacy preserving distributed data mining. SIGKDD Explorations 4(2), 43–48 (2002)
14.
Zurück zum Zitat Vaidya, J., Clifton, C.: Privacy-Preserving Decision Trees over vertically partitioned data. Lecture Notes in Computer Science, vol. 3654 (2005) Vaidya, J., Clifton, C.: Privacy-Preserving Decision Trees over vertically partitioned data. Lecture Notes in Computer Science, vol. 3654 (2005)
15.
Zurück zum Zitat Ioannidis, I., Grama, A., Atallah, M.: A secure protocol for computing dot-products in clustered and distributed environments. In: Proceedings of International Conference on Parallel Processing, pp. 379–384, 18–21 Aug 2002 Ioannidis, I., Grama, A., Atallah, M.: A secure protocol for computing dot-products in clustered and distributed environments. In: Proceedings of International Conference on Parallel Processing, pp. 379–384, 18–21 Aug 2002
Metadaten
Titel
Hash-Based Rule Mining Algorithm in Data-Intensive Homogeneous Cloud Environment
verfasst von
Raghvendra Kumar
Prasant Kumar Pattnaik
Yogesh Sharma
Copyright-Jahr
2016
Verlag
Springer India
DOI
https://doi.org/10.1007/978-81-322-2517-1_3