Author : Swathy J 1
Date of Publication :7th February 2016
Abstract: Data mining has wide variety of real time application in many fields such as financial, telecommunication, biological, and among government agencies. Classification is the one of the main task in data mining. For the past few years, due to the increment in various privacy problem, many conceptual and feasible solution to the classification problem have been proposed under different certainty prototype. With the increment of cloud computing user have an opportunity to offload the documents and processing to the cloud, in an encrypted form. The documents in the cloud are in encrypted form, existing privacy preserving classification systems are not relevant. The privacy preserving classification to preserve security of documents, protects the user query, and hides the access mode. Using PPKNN classification efficiently searching encrypted document in the cloud.
Reference :
-
- F, “Data Mining: Concepts, Models, and Techniques,” Springer, 2011.
- P. Mell and T. Grance, "The nist definition of cloud computing (draft), “NIST special publication " vol. 800, p. 145, 2011.
- Subodh Gangan, "A Review of Man-in-the-Middle Attacks".
- A. Shamire, "How to share a secret" Commun. ACM, vol. 22, pp. 612-613, Nov. 1979.
- IBM Thomas J, "How to share secret with cheaters" Journal of Cryptology, I: 133-138, 1988.
- Martenvan Dijk and Ari Juels, "On the Impossibility of Cryptography alone for Privacy-Preserving Cloud computing".
- C. Gentry, "Fully homomorphic encryption using ideal lattices" in ACM STOC, pp. 169-178, 2009.
- R.Natarajan1, Dr.R.Sugumar, M.Mahendran and K.Anbazhagan, " A survey on Privacy Preserving Data Mining " International Journal of Advanced Research in Computer and Communication Engineering, Vol. 1, Issue 1, March 2012.
- Y. Lindell and B. Pinkas, " Privacy preserving data mining " in Advances in Cryptology(CRYPTO), pp. 36 - 54, Springer, 2000.
- Thair Nu Phyu, “Survey of Classification Techniques in Data Mining " Proceedings of the International MultiConference of Engineers and Computer Scientists 2009 Vol IIMECS 2009, March 18 - 20, 2009.
- M. Kantarcioglu and C. Clifton, “Privately computing a distributed k-nn classifier in PKDD”, pp. 279 - 290, 2004.
- Jiadi Yu, Peng Lu, Yanmin Zhu,Guangtao Xue, and Minglu Li Toward Secure Multikeyword Top-k Retrieval over Encrypted Cloud Data, IEEE transactions on dependable and secure computing, vol. 10, no. 4, july/august 2013.
-
- F, “Data Mining: Concepts, Models, and Techniques,” Springer, 2011.
- P. Mell and T. Grance, "The nist definition of cloud computing (draft), “NIST special publication " vol. 800, p. 145, 2011.
- Subodh Gangan, "A Review of Man-in-the-Middle Attacks".
- A. Shamire, "How to share a secret" Commun. ACM, vol. 22, pp. 612-613, Nov. 1979.
- IBM Thomas J, "How to share secret with cheaters" Journal of Cryptology, I: 133-138, 1988.
- Martenvan Dijk and Ari Juels, "On the Impossibility of Cryptography alone for Privacy-Preserving Cloud computing".
- C. Gentry, "Fully homomorphic encryption using ideal lattices" in ACM STOC, pp. 169-178, 2009.
- R.Natarajan1, Dr.R.Sugumar, M.Mahendran and K.Anbazhagan, " A survey on Privacy Preserving Data Mining " International Journal of Advanced Research in Computer and Communication Engineering, Vol. 1, Issue 1, March 2012.
- Y. Lindell and B. Pinkas, " Privacy preserving data mining " in Advances in Cryptology(CRYPTO), pp. 36 - 54, Springer, 2000.
- Thair Nu Phyu, “Survey of Classification Techniques in Data Mining " Proceedings of the International MultiConference of Engineers and Computer Scientists 2009 Vol IIMECS 2009, March 18 - 20, 2009.
- M. Kantarcioglu and C. Clifton, “Privately computing a distributed k-nn classifier in PKDD”, pp. 279 - 290, 2004.
- Jiadi Yu, Peng Lu, Yanmin Zhu,Guangtao Xue, and Minglu Li Toward Secure Multikeyword Top-k Retrieval over Encrypted Cloud Data, IEEE transactions on dependable and secure computing, vol. 10, no. 4, july/august 2013.