SlideShare ist ein Scribd-Unternehmen logo
1 von 10
Downloaden Sie, um offline zu lesen
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 4, July-August (2013), © IAEME
203
PREPROCESSING AND SECURE COMPUTATIONS FOR PRIVACY
PRESERVATION DATA MINING
Sumana M1
, Hareesha K S2
1
Information Science and Engineering Department, MSRIT,India
2
Department of Computer Applications, Manipal Institute of Technology, Manipal, India
ABSTRACT
Privacy Preserving Data Mining is very largely used for extracting knowledge from the data
distributed over multiple sites without disclosing information. Dataset maintained by different
organizations/sites involved in collaboration include missing, noisy, redundant and irrelevant data.
Such data has to be preprocessed for obtaining efficient mining results from multiple sites. This
paper discusses the essential preprocessing tasks performed by the individual sites to prepare the data
for mining. Also in order to retain privacy, sites should jointly perform computations such as
addition, division and union/intersection in a secure manner. The various implemented secure
protocols to perform computations on the preprocessed datasets while classification/prediction have
been conversed indicating the best approaches.
Keywords: data mining, data preprocessing, privacy preservation, secure sum, secure union, secure
division.
I. INTRODUCTION
Let us consider the following scenario where several banks present in different localities want
salary status of an individual satisfying certain criteria, or want to predict a fraud while issuing credit
card or would like to obtain the characteristics of with salary less than 50K per month. These banks do
not want to reveal any information about their data in the process of mining. Hence mining has to be
done by preserving privacy.
Each of the sites has to preprocess their data to obtain appropriate mining results. For finance
dataset some essential preprocessing tasks needs to be performed before performing any form of
computations or mining on them. The earlier approach includes transforming nominal and categorical
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING &
TECHNOLOGY (IJCET)
ISSN 0976 – 6367(Print)
ISSN 0976 – 6375(Online)
Volume 4, Issue 4, July-August (2013), pp. 203-212
© IAEME: www.iaeme.com/ijcet.asp
Journal Impact Factor (2013): 6.1302 (Calculated by GISI)
www.jifactor.com
IJCET
© I A E M E
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 4, July-August (2013), © IAEME
204
attributes to their numeric form and normalizing them. But most of the data mining results need to be
interpreted with different types of attributes.
In order to avoid obtaining irrelevant, inaccurate results while performing data mining tasks on
the dataset we need to eliminate irrelevant information[9]. Also, certain attributes were repetitive. For
example detailed occupation code (numeric attribute) has an equivalent attribute called major
occupation code(categorical) in the dataset. Besides in the mining process of finding results, values of
the education and class of worker attributes need to be available at various levels of abstraction. We
use the concept of taxonomy trees.
Data perturbation, anonymization, or cryptographical methods have been used for privacy
preserving classification as mentioned in [15]. However cryptographical methods are one the effective
approaches for mining and maintaining privacy [3]. These methods use secure multiparty protocols to
perform computations during knowledge discovery. Protocols such as secure sum, secure log, union,
intersection and dot product have been used in most of the cryptographical data mining procedures. In
this paper we discuss the various secure protocols implemented by us and compare them with the
existing techniques.
Two or more parties want to conduct a computation based on their private inputs, but neither
party is willing to disclose its own input to anybody else[5]. The problem is how to conduct such a
computation while preserving the privacy of the inputs. Most of these protocols have been build using
homomorphic or commutative encryption techniques. Many encryption algorithms are widely
available and used in information security. They can be categorized into Symmetric (private) and
Asymmetric (public) keys encryption. As mentioned earlier some of the commonly used secure
protocols while mining are secure sum, union /intersection protocols.
II. DATA PREPROCESSING
Preparing the data for mining is known as data preprocessing as mentioned in [1] and [2].
Dataset include redundant attributes and records, missing values, irrelevant data and attributes with
values at the lowest level of abstraction. Certain essential modifications that we have performed on
the dataset while mining are as follows
A. Handling Irrelavant Data
While working on the finance datasets we needed to analyze the value of the age attribute.
For age less than 18, had a job, children and a salary greater than 50000 then we would term such a
record as irrelevant. For analyzing the characteristics of people based on the salary (using clustering
method) we require to use only those objects with salary age individual sites need to update their
datasets based on the age attribute. On testing our dataset it was observed that only 5% of the total
records were irrelevant based on the age criteria. Such records hinder the accuracy of the models
build. Hence such noisy data were placed in a different location for further analysis. However it is
important that these noisy data need to eliminated from the dataset used for mining.
B. Taxonomy Trees
For the data mining methods such as classification and clustering on the datasets we want the
data of certain attributes to be available at higher levels of abstraction for example education
attributes of the finance dataset. Such attributes can be discretized using the concept of taxonomy
trees as shown in fig 1. The data miner at a site can access the values of the education attribute at the
preschool, highschool or advanced level of abstraction. Using this concept interpreting of the results
for classifying and clustering new datasets can be performed in an effective manner.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 4, July-August (2013), © IAEME
205
Fig. 1. Taxonomy tree of the education attribute
C. Eliminate Redundancy
Every dataset include duplicated entries. One of the most suitable approaches while mining
involves sorting the tuples of the dataset based on quasi-identifiers, for example in finance dataset
{age, occupation, and gender}, after which repetitive records are eliminated. In the process of the
entries were reduced from the dataset maintained in each of the site.
D. Handling Missing Values
Most of the dataset have missing values[14]. In order to obtain results that yield better
patterns from the dataset, these missing values needs to handle. Different ways[14] of managing
missing values include computing and placing the mean for numeric values, finding and inserting the
value that has occurred the maximum number of times, estimate the missing value by using the
remaining values. For the type of data mining we intend to perform we have replaced the missing
values with the average attribute value of the nearest neighbours for numeric values and the most
probable values using the Euclidean distance measures for categorical values.
On performing preprocessing on the census dataset, the accuracy of the decision tree
classifier on the rapidminer tool is shown in fig 2. As shown, the accuracy of the ID3 decision
classifier is better for preprocessed data as compared to the dataset before preprocessing.
0
20
40
60
80
100
10000
20000
30000
40000
50000
60000
Dataset Size
AccuracyofClassification
Before
After
Fig. 2. Accuracy before and after preprocessing
III. SECURE SUM
In the course of building a classification model we would like to indicate the total number of
records that belong to a salary class less than 10K. At one of the classification step we need to
compute the number of records that belong to a particular class. Records are distributed through
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 4, July-August (2013), © IAEME
206
various parties we need them to jointly perform the computation. Secure addition secure sum
protocols are used for this purpose. A discussion on secure union is given in [4] and [5].
A. Random Secure Sum Protocol
As shown in fig 2 and [10], a party p1 generates a random to distort his private input and the
summation is computed along the cycle p1->p2->p3->p1. p1 then obtains the result by subtracting the
value obtained by the random number. However it been proved that the collusion of pi’s immediate
predecessor and immediate successor can find out the private input. As the result this approach has
hardly any capability of resisting collusion.
Fig. 3. Random Secure Sum Protocol
B. Privacy Preserving K-Secure Sum Protocol
In this approach as shown in fig 3 and mentioned in [11] and [12] of secure sum computation
the party1 divides its data into segments. The amount of segments into which the data is to be divided
is collectively decided by all the parties involved in the computation. Party1 distributes each of its
segments to other parties and retains one for it. Other parties too divide their data into segments and
distribute these segments to all the other parties.
Fig. 4. k-secure sum protocol
This approach provides outstanding security when the number of parties is greater than 3 and
each of the parties have a computing facility. All the parties agree on number of segments of a data.
2 5 2 3
1 3 2 4 4 6 4 6
0 5 1 3
P1
P2 P4
P3
Protocol Initiator
Computation Path
Distribution Path
P1
(n1) P2
(n2)
P3 (n3)
R+ n1
R+ n1+n2
R+ n1+n2 +
n3
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 4, July-August (2013), © IAEME
207
C. Secure sum protocol using Homomorphic Encryption
In this protocol the homomorphic encryption technique, Paillier cryptosystem approach has
been used. The algorithm is as follows:
1. Generate an integer X> . xj is the value to be added at party j to obtain the final sum.
2. Party p1 generates a random number ri , encryption(E) , decryption(D) keys and then encrypts
its data x1+ r1 and forwards it to the its next party. It also forwards the (E) to the next party.
3. Each of the remaining parties pi compute E(x1+x2+..+xi+(r1+r2+...+ri)*X) and passes it to
p(i+1).
4. At last p1 obtains D (E ( + X* )) mod X = .
Where n is the number of parties involved in the computation of sum.
Fig. 5. Secure sum using homomorphic encryption
The security of this approach largely depends on the homomorphic technique used. Since
paillier public key encryption technique is used capability of collusion resistance is larger when
compared to the other protocols. However the disadvantage of this method is its high computation
cost owing to employing homomorphic cryptosystem.
D. Comparison
Protocol Advantages Disadvantages
Random Secure Sum Protocol Simple Hardly any capability of resisting
collusion
Privacy Preserving K-Secure
Sum Protocol
Capability of resisting
collusion.
Works well when number of
parties >3
Secure sum protocol using
Homomorphic Encryption
Capability of resisting
collusion.
Works well for parties >=2
High Computation Cost because of
homomorphic Encryption
Table 1: Comparison of the secure sum protocols
As shown in table1 a comparison of the various secure sum protocols implemented have been
discussed. We have used to secure sum protocol using homomorphic encryption for secure sum
computations on the finance dataset.
P1(n1)
(R1,E,D) P2(n2)
(R2,E)
P3(n3)
(R3,E)
E(R1+ n1),E
E(R1+ n1)+E(R2+n2),E
E(R1+ n1)+ E(R2+n2)+
E(R3+n2)
R+ n1+n2 + n3
P1 finally performs
D(E( + X* ))mod X =
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 4, July-August (2013), © IAEME
208
The computation cost involved on implementing the above three secure sum approaches on 4
sites interacting with each other. We have implemented the protocols in Java using the client server
concepts where the server initiates the process of computation and the client interact in a ring format.
As observed in the chart the secure sum protocol using homomorphic encryption takes more time
compared to the previous approach but is much more secure.
0
0.2
0.4
0.6
0.8
1
1.2
Computation
time in ms
10 100 1000 10000 100000
maximum size of the data at each site
Random
4-secure
encryption
Fig. 6. Computation time of the secure sum protocols in millisecond
IV. SECURE UNION
Let us imagine a situation where data miners would want to know the tuples that satisfy a
criterion. Here the assumption is that data is vertically distributed, which means information
(characteristics/attributes) regarding each record is maintained at multiple sites. Sites should
collectively obtain the union of the tuples. The computation of union is to be performed in a secure
manner without revealing any other information other than what has been queried for. A discussion on
secure union is given in [4] and [5].
A. Commutative Secure Union protocol
Given in Fig.7 is the first level commutative secure union protocol as mentioned in [6]. This
protocol starts with party 1 who encrypts its data and forwards it to site 2. Party 2 encrypts its values
as well as the encrypted result values obtained by the other sites. These values are moved on to the
neighboring parties where again they are encrypted by the key provided by the party. In the process
all the values maintained by the n parties are encrypted n times by the encryption keys of each of the
parties.
Fig. 7. level 1 of the Commutative Secure Union Protocol
A,B,C
A,B,C
E1(ABC)
E3(E1(ABC))
E3(ABC)
E2(E3(E1(ABC))
E2(ABC)
E2(E3(ABC))
A,B,D
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 4, July-August (2013), © IAEME
209
Once the data maintained at each of the sites is encrypted. Party1 shuffles all the n times
encrypted values and eliminates the duplicate values. Because of commutative encryption property
used while deciding on encryption and decryption approach i.e. E3 (E2 (E1 (ABC)))) = E2 (E3 (E1
(ABC)))), we can identify duplicate values. Finally the encrypted values are decrypted by each of the
n sites to know that the union of all the data maintained by multiple sites.
For the example in fig 7, union of 3 parties will result in ABC and ABD. The above approach
uses commutative encryption technique which adds a large overhead to the mining process. This
protocol requires the need for a trusted party.
B. Secure Union using Public-key Cryptography
Site 1 generates a public encryption key k1 and a private key k2 (decryption). Site1 then
forwards its encrypted values to site2 who adds its encrypted values to the database sent by site1 and
shuffles them.
The shuffled dataset is passed to the next site. The next site repeats the step of encryption,
shuffling and forwarding. All sites works locally finding local values and encrypting them using the
public key sent by site 1. The last party passed the database obtained, shuffles it and sends it to
site1.Site1 obtains the union, decrypts them and forwards it to all the other parties. Public key
cryptography used for 3 parties with data is as shown in fig 8.
This method reduces the time of mining process compared to the previous method. Also the
parties can share the union of their data without the need for an outside trusted party.
Fig. 8. Secure union using public key cryptography
C. Comparison
Fig. 9. Computation time for Algo1 and Algo2 with the pohlig hellman encryption
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 4, July-August (2013), © IAEME
210
Given that algo1 is secure union protocol using commutative encryption and algo2 is secure
union protocol using public encryption. Both the algorithms have been implemented for securely
computing the union of data available at 3 parties. The computation time required for each of the
approaches when, given the number of tuples involved in secure union computation is being plotted in
fig 9. This graph shows that algo2 has a better computation method over algo1.
V. SECURE DIVIDE
As shown in [8] , where naïve Bayesian approach is used for privacy preserving classification.
Here as per the protocol used on horizontal distributed datasets, to find the number of tuples that
belongs to a class and with certain features, besides secure sum, secure division protocol is used. ie
All parties want to calculate pyz = Cyz/ny. where Cyz represents number of instances belonging to class
y and having an attribute value of z and ny indicates number of instances belonging to class y.
A. Secure Division using Secure Log Approach
As mentioned in [8] the algorithm is implemented as follows. This is implemented by 2 parties
p1 and last party pn
• Party p1 generates two random values Rc and Rn and forwards it to pn .
• Party pn generates Rc + Cyz mod p and Rn + ny mod p for some value p which is large
enough to fit the result.
• Party 1 generates another random value v1 and u1 and forwards it to party pn.
• Party n obtains v2 = C.ln(Rc + Cyz –Rc mod p) mod p – v1 and u2 = C.ln(Rn + ny–Rn mod p)
mod p – u1.
Where C is a large value assume by party n.
• Party n calculates sk = v2- u2 mod p and sends C(to all parties) and sk to party1.
• Party 1 calculates the s1 = sk + v1 – u1 mod p and sends it to all parties.
• Now all parties can calculate the divided result as exp (s1/C).
However in this approach the amount of security is less since the numerator cannot exceed
512 bits. This approach will also work when the numerator and the denominator are encrypted. The
values are in encrypted form in most of the cryptographical approaches of data mining. Hence this
method is not suitable.
B. Secure Division for encrypted Data
Since the numerator(n) and the denominator(d) are in the encrypted form we use this method.
The encrypted values are of BigInteger type that exceeds the size of 512 bits as in the earlier
approach. The working[13] is as follows:
• The sub-linear protocol for obtaining 2ld
is used by first obtaining the binary equivalent of d (l-
bit size) and using binary search approach on bits in d.
• Then the inverse of 2ld
is generated i.e. 2-ld
.
From this [p] = (2ld
-d) . 2-ld
• Then party 1 a~ = 2k
. [2-ld
]. poly(p). where poly(p) uses the square and multiply method to
obtain a evaluate where w = 2R
for some integer R.
• The q^ = n . a~
• q~ = truncate q^.
• generate [r] = n – d.q~
• Obtain pos_err = result of the bit comparison (<=)between[d]+[d] and [r]+[d].
• Obtain neg_err = result of the bit comparison (>) between[d] and [r] + [d].
• Obtain the divided result q = q~ + pos_err – neg_err.
Party 1 circulates q to all the sites which is the divided result.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 4, July-August (2013), © IAEME
211
The entire sequence of events are performed in party 1 itself hence except for broadcasting the
result to all the sites there is no other communication cost. Also security is high since the
computations are performed on the encrypted datasets. It has also been observed that the number of
rounds is O (log2l) where l is the bit size of d.
C. Comparison
Given below is the comparison between the two protocols used for performing secure
divisions. Secure division approach involves paillier encryption approach hence though computation
cost increases the communication cost is reduced compared to the secure log approach. As observed
in fig 10 secure division is better than secure log approach for performing secure distributed division.
The results have been obtained with data maintained at 3 sites. X axis indicates the number of tuples
in each of the site. Y axis indicates the time in millisecond.
Fig. 10. Computation time with dataset size on the X axis and execution time in the Y axis
VI. CONCLUSIONS
The preprocessing techniques have been used on the datasets maintained on each of the sites
in order to prepare the data for mining. Secure protocols have been implemented in Java platform
with a minimum of 3 parties and analyzed the working of the above methods. The best approaches
such as secure sum using homomorphic encryption, secure union using encryption and secure
division on encrypted data has been used in implementing our data mining approaches on the
horizontally classified datasets maintained at 3 sites.
VII. ACKNOWLEDGMENT
We acknowledge Manipal University and M S Ramaiah Institute of Technology for giving us
an opportunity for working and publishing this paper.
REFERENCES
Journal Papers
[1] Sotiris Kotsiantis,”On implementing a Financial Decision Support System”, International
Journal of Computer Science and Network Security, 2006.
[2] Mohamed MEdhat Gaber, Arkady Zaslavsky,”Mining Data Streams:A Review”, ACM,
SIGMOD Record, June 2007.
[3] Somayyeh Seifi Moradi, Mohammad Reza ,”Classification and Evaluation of the Privacy
preserving Distributed Data Mining Techniques”, Journal of Theoretical and Applied
Information Technology, March 2012.
Dataset Size
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 4, July-August (2013), © IAEME
212
[4] Wenliang Du, Mikhail J Atallah, “Secure Multi-Party Computation Problems and
Applications”, Journal of Security Paradigms, 2001.
[5] Bart Kuijpers, Karl Tuyls,” Privacy Preserving ID3 over Horizontally, Vertically and Grid
Partitioned Data”, Journal of Security, 2006
[6] Murat Kantarcioglu, Chris Clifton,” Privacy-preserving Distributed Mining of Association
Rules on Horizontally Partitioned Data”, IEEE Transactions on Knowledge and Data
Engineering, 2003.
[7] Murat Kantarcioglu, Jaideep Vaidya,” Privacy Preserving Naive Bayes Classifier for
Horizontally Partitioned Data”, ACM Transactions on Information Systems Security,2008
[8] Sameep Mehta , Srinivasan Parthasarathy,”Correlation Preserving Discretization” , IEEE
transactions 2006.
[9] Omar Hasan, Elisa Bertino,”Efficient Privacy Preserving Reputation protocols inspired by
Secure sum”, IEEE transactions, 2010.
[10] Rashad Sheikh, Beerendra Kumar,”Privacy Preserving k-secure sum Protocol”, International
Journal of Computer Science and Information Security.
[11] Rashad Sheikh, Durgesh Kumar Mishra,” A Distributed k-secure Sum Protocol for Secure
Multi-Party Computations, Journal of Computing, March 2010.
[12] Morten Dahl, Chao Ning, and Tomas Toft, “ On Secure Two-party Integer Division” ,
Financial Cryptography and data security , Volume 7397, 2012,pp164-178.
[13] Y. Lindell and B. Pinkas, Privacy Preserving Data Mining, Advances in Cryptology –
CRYPTO '00. Lecture Notes in Computer Science, Vol. 1880, Springer-Verlag, 2000, pp. 36-
53
Books:
[14] Pang-Ning Tan, “Introduction to Data Mining”, Pearson Education,2007.
Conferences:
[15] Agrawal, R., and Srikant, R. (2000). Privacy Preserving Data Mining. ACM SIGMOD
International Conference on Management of Data, SIGMOD’00, Dallas, USA.439-450.

Weitere ähnliche Inhalte

Was ist angesagt?

Recommendation system using bloom filter in mapreduce
Recommendation system using bloom filter in mapreduceRecommendation system using bloom filter in mapreduce
Recommendation system using bloom filter in mapreduceIJDKP
 
An Improved Differential Evolution Algorithm for Data Stream Clustering
An Improved Differential Evolution Algorithm for Data Stream ClusteringAn Improved Differential Evolution Algorithm for Data Stream Clustering
An Improved Differential Evolution Algorithm for Data Stream ClusteringIJECEIAES
 
A Comprehensive review of Conversational Agent and its prediction algorithm
A Comprehensive review of Conversational Agent and its prediction algorithmA Comprehensive review of Conversational Agent and its prediction algorithm
A Comprehensive review of Conversational Agent and its prediction algorithmvivatechijri
 
Data Imputation by Soft Computing
Data Imputation by Soft ComputingData Imputation by Soft Computing
Data Imputation by Soft Computingijtsrd
 
Variance rover system
Variance rover systemVariance rover system
Variance rover systemeSAT Journals
 
Variance rover system web analytics tool using data
Variance rover system web analytics tool using dataVariance rover system web analytics tool using data
Variance rover system web analytics tool using dataeSAT Publishing House
 
PRIVACY PRESERVING DATA MINING BASED ON VECTOR QUANTIZATION
PRIVACY PRESERVING DATA MINING BASED  ON VECTOR QUANTIZATION PRIVACY PRESERVING DATA MINING BASED  ON VECTOR QUANTIZATION
PRIVACY PRESERVING DATA MINING BASED ON VECTOR QUANTIZATION ijdms
 
Association Rule Mining using RHadoop
Association Rule Mining using RHadoopAssociation Rule Mining using RHadoop
Association Rule Mining using RHadoopIRJET Journal
 
5 parallel implementation 06299286
5 parallel implementation 062992865 parallel implementation 06299286
5 parallel implementation 06299286Ninad Samel
 
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)IRJET Journal
 
A Survey on Features and Techniques Description for Privacy of Sensitive Info...
A Survey on Features and Techniques Description for Privacy of Sensitive Info...A Survey on Features and Techniques Description for Privacy of Sensitive Info...
A Survey on Features and Techniques Description for Privacy of Sensitive Info...IRJET Journal
 
A Review on Reversible Data Hiding Scheme by Image Contrast Enhancement
A Review on Reversible Data Hiding Scheme by Image Contrast EnhancementA Review on Reversible Data Hiding Scheme by Image Contrast Enhancement
A Review on Reversible Data Hiding Scheme by Image Contrast EnhancementIJERA Editor
 
Anonymization of data using mapreduce on cloud
Anonymization of data using mapreduce on cloudAnonymization of data using mapreduce on cloud
Anonymization of data using mapreduce on cloudeSAT Journals
 
Different Classification Technique for Data mining in Insurance Industry usin...
Different Classification Technique for Data mining in Insurance Industry usin...Different Classification Technique for Data mining in Insurance Industry usin...
Different Classification Technique for Data mining in Insurance Industry usin...IOSRjournaljce
 
IRJET- Error Reduction in Data Prediction using Least Square Regression Method
IRJET- Error Reduction in Data Prediction using Least Square Regression MethodIRJET- Error Reduction in Data Prediction using Least Square Regression Method
IRJET- Error Reduction in Data Prediction using Least Square Regression MethodIRJET Journal
 
Survey Performance Improvement Construct FP-Growth Tree
Survey Performance Improvement Construct FP-Growth TreeSurvey Performance Improvement Construct FP-Growth Tree
Survey Performance Improvement Construct FP-Growth Treeijsrd.com
 
Parametric comparison based on split criterion on classification algorithm
Parametric comparison based on split criterion on classification algorithmParametric comparison based on split criterion on classification algorithm
Parametric comparison based on split criterion on classification algorithmIAEME Publication
 
A mathematical model of access control in big data using confidence interval ...
A mathematical model of access control in big data using confidence interval ...A mathematical model of access control in big data using confidence interval ...
A mathematical model of access control in big data using confidence interval ...csandit
 
Comparative analysis of association rule generation algorithms in data streams
Comparative analysis of association rule generation algorithms in data streamsComparative analysis of association rule generation algorithms in data streams
Comparative analysis of association rule generation algorithms in data streamsIJCI JOURNAL
 

Was ist angesagt? (20)

Recommendation system using bloom filter in mapreduce
Recommendation system using bloom filter in mapreduceRecommendation system using bloom filter in mapreduce
Recommendation system using bloom filter in mapreduce
 
An Improved Differential Evolution Algorithm for Data Stream Clustering
An Improved Differential Evolution Algorithm for Data Stream ClusteringAn Improved Differential Evolution Algorithm for Data Stream Clustering
An Improved Differential Evolution Algorithm for Data Stream Clustering
 
A Comprehensive review of Conversational Agent and its prediction algorithm
A Comprehensive review of Conversational Agent and its prediction algorithmA Comprehensive review of Conversational Agent and its prediction algorithm
A Comprehensive review of Conversational Agent and its prediction algorithm
 
Data Imputation by Soft Computing
Data Imputation by Soft ComputingData Imputation by Soft Computing
Data Imputation by Soft Computing
 
Variance rover system
Variance rover systemVariance rover system
Variance rover system
 
Variance rover system web analytics tool using data
Variance rover system web analytics tool using dataVariance rover system web analytics tool using data
Variance rover system web analytics tool using data
 
PRIVACY PRESERVING DATA MINING BASED ON VECTOR QUANTIZATION
PRIVACY PRESERVING DATA MINING BASED  ON VECTOR QUANTIZATION PRIVACY PRESERVING DATA MINING BASED  ON VECTOR QUANTIZATION
PRIVACY PRESERVING DATA MINING BASED ON VECTOR QUANTIZATION
 
Association Rule Mining using RHadoop
Association Rule Mining using RHadoopAssociation Rule Mining using RHadoop
Association Rule Mining using RHadoop
 
5 parallel implementation 06299286
5 parallel implementation 062992865 parallel implementation 06299286
5 parallel implementation 06299286
 
Study on Positive and Negative Rule Based Mining Techniques for E-Commerce Ap...
Study on Positive and Negative Rule Based Mining Techniques for E-Commerce Ap...Study on Positive and Negative Rule Based Mining Techniques for E-Commerce Ap...
Study on Positive and Negative Rule Based Mining Techniques for E-Commerce Ap...
 
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)
 
A Survey on Features and Techniques Description for Privacy of Sensitive Info...
A Survey on Features and Techniques Description for Privacy of Sensitive Info...A Survey on Features and Techniques Description for Privacy of Sensitive Info...
A Survey on Features and Techniques Description for Privacy of Sensitive Info...
 
A Review on Reversible Data Hiding Scheme by Image Contrast Enhancement
A Review on Reversible Data Hiding Scheme by Image Contrast EnhancementA Review on Reversible Data Hiding Scheme by Image Contrast Enhancement
A Review on Reversible Data Hiding Scheme by Image Contrast Enhancement
 
Anonymization of data using mapreduce on cloud
Anonymization of data using mapreduce on cloudAnonymization of data using mapreduce on cloud
Anonymization of data using mapreduce on cloud
 
Different Classification Technique for Data mining in Insurance Industry usin...
Different Classification Technique for Data mining in Insurance Industry usin...Different Classification Technique for Data mining in Insurance Industry usin...
Different Classification Technique for Data mining in Insurance Industry usin...
 
IRJET- Error Reduction in Data Prediction using Least Square Regression Method
IRJET- Error Reduction in Data Prediction using Least Square Regression MethodIRJET- Error Reduction in Data Prediction using Least Square Regression Method
IRJET- Error Reduction in Data Prediction using Least Square Regression Method
 
Survey Performance Improvement Construct FP-Growth Tree
Survey Performance Improvement Construct FP-Growth TreeSurvey Performance Improvement Construct FP-Growth Tree
Survey Performance Improvement Construct FP-Growth Tree
 
Parametric comparison based on split criterion on classification algorithm
Parametric comparison based on split criterion on classification algorithmParametric comparison based on split criterion on classification algorithm
Parametric comparison based on split criterion on classification algorithm
 
A mathematical model of access control in big data using confidence interval ...
A mathematical model of access control in big data using confidence interval ...A mathematical model of access control in big data using confidence interval ...
A mathematical model of access control in big data using confidence interval ...
 
Comparative analysis of association rule generation algorithms in data streams
Comparative analysis of association rule generation algorithms in data streamsComparative analysis of association rule generation algorithms in data streams
Comparative analysis of association rule generation algorithms in data streams
 

Andere mochten auch

Predictors of customer retention in online health care system ohcs
Predictors of customer retention in online health care system ohcsPredictors of customer retention in online health care system ohcs
Predictors of customer retention in online health care system ohcsIAEME Publication
 
Effect of corrosion on concrete reinforcement mechanical and physical 2
Effect of corrosion on concrete reinforcement mechanical and physical 2Effect of corrosion on concrete reinforcement mechanical and physical 2
Effect of corrosion on concrete reinforcement mechanical and physical 2IAEME Publication
 
Improving impact and mechanical properties of gap graded concrete
Improving impact and mechanical properties of gap graded concreteImproving impact and mechanical properties of gap graded concrete
Improving impact and mechanical properties of gap graded concreteIAEME Publication
 
Object tracking by dtcwt feature vectors 2-3-4
Object tracking by dtcwt feature vectors 2-3-4Object tracking by dtcwt feature vectors 2-3-4
Object tracking by dtcwt feature vectors 2-3-4IAEME Publication
 
His human identification schemes on web
His human identification schemes on webHis human identification schemes on web
His human identification schemes on webIAEME Publication
 
Process parameters optimization in sls process using design of experiments 2
Process parameters optimization in sls process using design of experiments 2Process parameters optimization in sls process using design of experiments 2
Process parameters optimization in sls process using design of experiments 2IAEME Publication
 
A review on privatization in education is the boon for percentages of educated
A review on privatization in education is the boon for percentages of educatedA review on privatization in education is the boon for percentages of educated
A review on privatization in education is the boon for percentages of educatedIAEME Publication
 
Perceiving and recovering degraded data on secure cloud
Perceiving and recovering degraded data on secure cloudPerceiving and recovering degraded data on secure cloud
Perceiving and recovering degraded data on secure cloudIAEME Publication
 
Factors influencing guests’ loyalty behaviour a case study of selected hotels
Factors influencing guests’ loyalty behaviour a case study of selected hotelsFactors influencing guests’ loyalty behaviour a case study of selected hotels
Factors influencing guests’ loyalty behaviour a case study of selected hotelsIAEME Publication
 

Andere mochten auch (9)

Predictors of customer retention in online health care system ohcs
Predictors of customer retention in online health care system ohcsPredictors of customer retention in online health care system ohcs
Predictors of customer retention in online health care system ohcs
 
Effect of corrosion on concrete reinforcement mechanical and physical 2
Effect of corrosion on concrete reinforcement mechanical and physical 2Effect of corrosion on concrete reinforcement mechanical and physical 2
Effect of corrosion on concrete reinforcement mechanical and physical 2
 
Improving impact and mechanical properties of gap graded concrete
Improving impact and mechanical properties of gap graded concreteImproving impact and mechanical properties of gap graded concrete
Improving impact and mechanical properties of gap graded concrete
 
Object tracking by dtcwt feature vectors 2-3-4
Object tracking by dtcwt feature vectors 2-3-4Object tracking by dtcwt feature vectors 2-3-4
Object tracking by dtcwt feature vectors 2-3-4
 
His human identification schemes on web
His human identification schemes on webHis human identification schemes on web
His human identification schemes on web
 
Process parameters optimization in sls process using design of experiments 2
Process parameters optimization in sls process using design of experiments 2Process parameters optimization in sls process using design of experiments 2
Process parameters optimization in sls process using design of experiments 2
 
A review on privatization in education is the boon for percentages of educated
A review on privatization in education is the boon for percentages of educatedA review on privatization in education is the boon for percentages of educated
A review on privatization in education is the boon for percentages of educated
 
Perceiving and recovering degraded data on secure cloud
Perceiving and recovering degraded data on secure cloudPerceiving and recovering degraded data on secure cloud
Perceiving and recovering degraded data on secure cloud
 
Factors influencing guests’ loyalty behaviour a case study of selected hotels
Factors influencing guests’ loyalty behaviour a case study of selected hotelsFactors influencing guests’ loyalty behaviour a case study of selected hotels
Factors influencing guests’ loyalty behaviour a case study of selected hotels
 

Ähnlich wie Privacy-Preserving Data Mining Techniques

Privacy preserving clustering on centralized data through scaling transf
Privacy preserving clustering on centralized data through scaling transfPrivacy preserving clustering on centralized data through scaling transf
Privacy preserving clustering on centralized data through scaling transfIAEME Publication
 
A novel ppdm protocol for distributed peer to peer information sources
A novel ppdm protocol for distributed peer to peer information sourcesA novel ppdm protocol for distributed peer to peer information sources
A novel ppdm protocol for distributed peer to peer information sourcesIAEME Publication
 
IRJET- A Study of Privacy Preserving Data Mining and Techniques
IRJET- A Study of Privacy Preserving Data Mining and TechniquesIRJET- A Study of Privacy Preserving Data Mining and Techniques
IRJET- A Study of Privacy Preserving Data Mining and TechniquesIRJET Journal
 
IRJET - Coarse Grain Load Balance Algorithm for Detecting
IRJET - Coarse Grain Load Balance Algorithm for DetectingIRJET - Coarse Grain Load Balance Algorithm for Detecting
IRJET - Coarse Grain Load Balance Algorithm for DetectingIRJET Journal
 
IRJET- Efficient Geometric Range Search on RTREE Occupying Encrypted Spatial ...
IRJET- Efficient Geometric Range Search on RTREE Occupying Encrypted Spatial ...IRJET- Efficient Geometric Range Search on RTREE Occupying Encrypted Spatial ...
IRJET- Efficient Geometric Range Search on RTREE Occupying Encrypted Spatial ...IRJET Journal
 
IRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud DataIRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud DataIRJET Journal
 
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...IRJET Journal
 
Implementation of Secured Network Based Intrusion Detection System Using SVM ...
Implementation of Secured Network Based Intrusion Detection System Using SVM ...Implementation of Secured Network Based Intrusion Detection System Using SVM ...
Implementation of Secured Network Based Intrusion Detection System Using SVM ...IRJET Journal
 
IRJET- Improving the Performance of Smart Heterogeneous Big Data
IRJET- Improving the Performance of Smart Heterogeneous Big DataIRJET- Improving the Performance of Smart Heterogeneous Big Data
IRJET- Improving the Performance of Smart Heterogeneous Big DataIRJET Journal
 
Survey paper on Big Data Imputation and Privacy Algorithms
Survey paper on Big Data Imputation and Privacy AlgorithmsSurvey paper on Big Data Imputation and Privacy Algorithms
Survey paper on Big Data Imputation and Privacy AlgorithmsIRJET Journal
 
Implementing Proof of Retriavaibility for Multiple Replica of Data File using...
Implementing Proof of Retriavaibility for Multiple Replica of Data File using...Implementing Proof of Retriavaibility for Multiple Replica of Data File using...
Implementing Proof of Retriavaibility for Multiple Replica of Data File using...IRJET Journal
 
Fundamentals of data mining and its applications
Fundamentals of data mining and its applicationsFundamentals of data mining and its applications
Fundamentals of data mining and its applicationsSubrat Swain
 
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
Secure Privacy Preserving Using Multilevel Trust For Cloud StorageSecure Privacy Preserving Using Multilevel Trust For Cloud Storage
Secure Privacy Preserving Using Multilevel Trust For Cloud StorageIRJET Journal
 
Misusability Measure Based Sanitization of Big Data for Privacy Preserving Ma...
Misusability Measure Based Sanitization of Big Data for Privacy Preserving Ma...Misusability Measure Based Sanitization of Big Data for Privacy Preserving Ma...
Misusability Measure Based Sanitization of Big Data for Privacy Preserving Ma...IJECEIAES
 
A Brief Survey on Various Technologies Involved in Cloud Computing Security
A Brief Survey on Various Technologies Involved in Cloud Computing SecurityA Brief Survey on Various Technologies Involved in Cloud Computing Security
A Brief Survey on Various Technologies Involved in Cloud Computing SecurityAssociate Professor in VSB Coimbatore
 
CSPCR: Cloud Security, Privacy and Compliance Readiness - A Trustworthy Fram...
CSPCR: Cloud Security, Privacy and Compliance  Readiness - A Trustworthy Fram...CSPCR: Cloud Security, Privacy and Compliance  Readiness - A Trustworthy Fram...
CSPCR: Cloud Security, Privacy and Compliance Readiness - A Trustworthy Fram...IJECEIAES
 
IRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
IRJET- An Efficient Solitude Securing Ranked Keyword Search TechniqueIRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
IRJET- An Efficient Solitude Securing Ranked Keyword Search TechniqueIRJET Journal
 
Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240Editor IJARCET
 
Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240Editor IJARCET
 

Ähnlich wie Privacy-Preserving Data Mining Techniques (20)

Privacy preserving clustering on centralized data through scaling transf
Privacy preserving clustering on centralized data through scaling transfPrivacy preserving clustering on centralized data through scaling transf
Privacy preserving clustering on centralized data through scaling transf
 
A novel ppdm protocol for distributed peer to peer information sources
A novel ppdm protocol for distributed peer to peer information sourcesA novel ppdm protocol for distributed peer to peer information sources
A novel ppdm protocol for distributed peer to peer information sources
 
IRJET- A Study of Privacy Preserving Data Mining and Techniques
IRJET- A Study of Privacy Preserving Data Mining and TechniquesIRJET- A Study of Privacy Preserving Data Mining and Techniques
IRJET- A Study of Privacy Preserving Data Mining and Techniques
 
IRJET - Coarse Grain Load Balance Algorithm for Detecting
IRJET - Coarse Grain Load Balance Algorithm for DetectingIRJET - Coarse Grain Load Balance Algorithm for Detecting
IRJET - Coarse Grain Load Balance Algorithm for Detecting
 
IRJET- Efficient Geometric Range Search on RTREE Occupying Encrypted Spatial ...
IRJET- Efficient Geometric Range Search on RTREE Occupying Encrypted Spatial ...IRJET- Efficient Geometric Range Search on RTREE Occupying Encrypted Spatial ...
IRJET- Efficient Geometric Range Search on RTREE Occupying Encrypted Spatial ...
 
IRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud DataIRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud Data
 
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
 
Implementation of Secured Network Based Intrusion Detection System Using SVM ...
Implementation of Secured Network Based Intrusion Detection System Using SVM ...Implementation of Secured Network Based Intrusion Detection System Using SVM ...
Implementation of Secured Network Based Intrusion Detection System Using SVM ...
 
IRJET- Improving the Performance of Smart Heterogeneous Big Data
IRJET- Improving the Performance of Smart Heterogeneous Big DataIRJET- Improving the Performance of Smart Heterogeneous Big Data
IRJET- Improving the Performance of Smart Heterogeneous Big Data
 
Survey paper on Big Data Imputation and Privacy Algorithms
Survey paper on Big Data Imputation and Privacy AlgorithmsSurvey paper on Big Data Imputation and Privacy Algorithms
Survey paper on Big Data Imputation and Privacy Algorithms
 
Implementing Proof of Retriavaibility for Multiple Replica of Data File using...
Implementing Proof of Retriavaibility for Multiple Replica of Data File using...Implementing Proof of Retriavaibility for Multiple Replica of Data File using...
Implementing Proof of Retriavaibility for Multiple Replica of Data File using...
 
Fundamentals of data mining and its applications
Fundamentals of data mining and its applicationsFundamentals of data mining and its applications
Fundamentals of data mining and its applications
 
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
Secure Privacy Preserving Using Multilevel Trust For Cloud StorageSecure Privacy Preserving Using Multilevel Trust For Cloud Storage
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
 
Misusability Measure Based Sanitization of Big Data for Privacy Preserving Ma...
Misusability Measure Based Sanitization of Big Data for Privacy Preserving Ma...Misusability Measure Based Sanitization of Big Data for Privacy Preserving Ma...
Misusability Measure Based Sanitization of Big Data for Privacy Preserving Ma...
 
A Brief Survey on Various Technologies Involved in Cloud Computing Security
A Brief Survey on Various Technologies Involved in Cloud Computing SecurityA Brief Survey on Various Technologies Involved in Cloud Computing Security
A Brief Survey on Various Technologies Involved in Cloud Computing Security
 
CSPCR: Cloud Security, Privacy and Compliance Readiness - A Trustworthy Fram...
CSPCR: Cloud Security, Privacy and Compliance  Readiness - A Trustworthy Fram...CSPCR: Cloud Security, Privacy and Compliance  Readiness - A Trustworthy Fram...
CSPCR: Cloud Security, Privacy and Compliance Readiness - A Trustworthy Fram...
 
IRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
IRJET- An Efficient Solitude Securing Ranked Keyword Search TechniqueIRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
IRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
 
Ck34520526
Ck34520526Ck34520526
Ck34520526
 
Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240
 
Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240
 

Mehr von IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEIAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
 

Mehr von IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Kürzlich hochgeladen

Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 

Kürzlich hochgeladen (20)

Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 

Privacy-Preserving Data Mining Techniques

  • 1. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 4, July-August (2013), © IAEME 203 PREPROCESSING AND SECURE COMPUTATIONS FOR PRIVACY PRESERVATION DATA MINING Sumana M1 , Hareesha K S2 1 Information Science and Engineering Department, MSRIT,India 2 Department of Computer Applications, Manipal Institute of Technology, Manipal, India ABSTRACT Privacy Preserving Data Mining is very largely used for extracting knowledge from the data distributed over multiple sites without disclosing information. Dataset maintained by different organizations/sites involved in collaboration include missing, noisy, redundant and irrelevant data. Such data has to be preprocessed for obtaining efficient mining results from multiple sites. This paper discusses the essential preprocessing tasks performed by the individual sites to prepare the data for mining. Also in order to retain privacy, sites should jointly perform computations such as addition, division and union/intersection in a secure manner. The various implemented secure protocols to perform computations on the preprocessed datasets while classification/prediction have been conversed indicating the best approaches. Keywords: data mining, data preprocessing, privacy preservation, secure sum, secure union, secure division. I. INTRODUCTION Let us consider the following scenario where several banks present in different localities want salary status of an individual satisfying certain criteria, or want to predict a fraud while issuing credit card or would like to obtain the characteristics of with salary less than 50K per month. These banks do not want to reveal any information about their data in the process of mining. Hence mining has to be done by preserving privacy. Each of the sites has to preprocess their data to obtain appropriate mining results. For finance dataset some essential preprocessing tasks needs to be performed before performing any form of computations or mining on them. The earlier approach includes transforming nominal and categorical INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) ISSN 0976 – 6367(Print) ISSN 0976 – 6375(Online) Volume 4, Issue 4, July-August (2013), pp. 203-212 © IAEME: www.iaeme.com/ijcet.asp Journal Impact Factor (2013): 6.1302 (Calculated by GISI) www.jifactor.com IJCET © I A E M E
  • 2. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 4, July-August (2013), © IAEME 204 attributes to their numeric form and normalizing them. But most of the data mining results need to be interpreted with different types of attributes. In order to avoid obtaining irrelevant, inaccurate results while performing data mining tasks on the dataset we need to eliminate irrelevant information[9]. Also, certain attributes were repetitive. For example detailed occupation code (numeric attribute) has an equivalent attribute called major occupation code(categorical) in the dataset. Besides in the mining process of finding results, values of the education and class of worker attributes need to be available at various levels of abstraction. We use the concept of taxonomy trees. Data perturbation, anonymization, or cryptographical methods have been used for privacy preserving classification as mentioned in [15]. However cryptographical methods are one the effective approaches for mining and maintaining privacy [3]. These methods use secure multiparty protocols to perform computations during knowledge discovery. Protocols such as secure sum, secure log, union, intersection and dot product have been used in most of the cryptographical data mining procedures. In this paper we discuss the various secure protocols implemented by us and compare them with the existing techniques. Two or more parties want to conduct a computation based on their private inputs, but neither party is willing to disclose its own input to anybody else[5]. The problem is how to conduct such a computation while preserving the privacy of the inputs. Most of these protocols have been build using homomorphic or commutative encryption techniques. Many encryption algorithms are widely available and used in information security. They can be categorized into Symmetric (private) and Asymmetric (public) keys encryption. As mentioned earlier some of the commonly used secure protocols while mining are secure sum, union /intersection protocols. II. DATA PREPROCESSING Preparing the data for mining is known as data preprocessing as mentioned in [1] and [2]. Dataset include redundant attributes and records, missing values, irrelevant data and attributes with values at the lowest level of abstraction. Certain essential modifications that we have performed on the dataset while mining are as follows A. Handling Irrelavant Data While working on the finance datasets we needed to analyze the value of the age attribute. For age less than 18, had a job, children and a salary greater than 50000 then we would term such a record as irrelevant. For analyzing the characteristics of people based on the salary (using clustering method) we require to use only those objects with salary age individual sites need to update their datasets based on the age attribute. On testing our dataset it was observed that only 5% of the total records were irrelevant based on the age criteria. Such records hinder the accuracy of the models build. Hence such noisy data were placed in a different location for further analysis. However it is important that these noisy data need to eliminated from the dataset used for mining. B. Taxonomy Trees For the data mining methods such as classification and clustering on the datasets we want the data of certain attributes to be available at higher levels of abstraction for example education attributes of the finance dataset. Such attributes can be discretized using the concept of taxonomy trees as shown in fig 1. The data miner at a site can access the values of the education attribute at the preschool, highschool or advanced level of abstraction. Using this concept interpreting of the results for classifying and clustering new datasets can be performed in an effective manner.
  • 3. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 4, July-August (2013), © IAEME 205 Fig. 1. Taxonomy tree of the education attribute C. Eliminate Redundancy Every dataset include duplicated entries. One of the most suitable approaches while mining involves sorting the tuples of the dataset based on quasi-identifiers, for example in finance dataset {age, occupation, and gender}, after which repetitive records are eliminated. In the process of the entries were reduced from the dataset maintained in each of the site. D. Handling Missing Values Most of the dataset have missing values[14]. In order to obtain results that yield better patterns from the dataset, these missing values needs to handle. Different ways[14] of managing missing values include computing and placing the mean for numeric values, finding and inserting the value that has occurred the maximum number of times, estimate the missing value by using the remaining values. For the type of data mining we intend to perform we have replaced the missing values with the average attribute value of the nearest neighbours for numeric values and the most probable values using the Euclidean distance measures for categorical values. On performing preprocessing on the census dataset, the accuracy of the decision tree classifier on the rapidminer tool is shown in fig 2. As shown, the accuracy of the ID3 decision classifier is better for preprocessed data as compared to the dataset before preprocessing. 0 20 40 60 80 100 10000 20000 30000 40000 50000 60000 Dataset Size AccuracyofClassification Before After Fig. 2. Accuracy before and after preprocessing III. SECURE SUM In the course of building a classification model we would like to indicate the total number of records that belong to a salary class less than 10K. At one of the classification step we need to compute the number of records that belong to a particular class. Records are distributed through
  • 4. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 4, July-August (2013), © IAEME 206 various parties we need them to jointly perform the computation. Secure addition secure sum protocols are used for this purpose. A discussion on secure union is given in [4] and [5]. A. Random Secure Sum Protocol As shown in fig 2 and [10], a party p1 generates a random to distort his private input and the summation is computed along the cycle p1->p2->p3->p1. p1 then obtains the result by subtracting the value obtained by the random number. However it been proved that the collusion of pi’s immediate predecessor and immediate successor can find out the private input. As the result this approach has hardly any capability of resisting collusion. Fig. 3. Random Secure Sum Protocol B. Privacy Preserving K-Secure Sum Protocol In this approach as shown in fig 3 and mentioned in [11] and [12] of secure sum computation the party1 divides its data into segments. The amount of segments into which the data is to be divided is collectively decided by all the parties involved in the computation. Party1 distributes each of its segments to other parties and retains one for it. Other parties too divide their data into segments and distribute these segments to all the other parties. Fig. 4. k-secure sum protocol This approach provides outstanding security when the number of parties is greater than 3 and each of the parties have a computing facility. All the parties agree on number of segments of a data. 2 5 2 3 1 3 2 4 4 6 4 6 0 5 1 3 P1 P2 P4 P3 Protocol Initiator Computation Path Distribution Path P1 (n1) P2 (n2) P3 (n3) R+ n1 R+ n1+n2 R+ n1+n2 + n3
  • 5. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 4, July-August (2013), © IAEME 207 C. Secure sum protocol using Homomorphic Encryption In this protocol the homomorphic encryption technique, Paillier cryptosystem approach has been used. The algorithm is as follows: 1. Generate an integer X> . xj is the value to be added at party j to obtain the final sum. 2. Party p1 generates a random number ri , encryption(E) , decryption(D) keys and then encrypts its data x1+ r1 and forwards it to the its next party. It also forwards the (E) to the next party. 3. Each of the remaining parties pi compute E(x1+x2+..+xi+(r1+r2+...+ri)*X) and passes it to p(i+1). 4. At last p1 obtains D (E ( + X* )) mod X = . Where n is the number of parties involved in the computation of sum. Fig. 5. Secure sum using homomorphic encryption The security of this approach largely depends on the homomorphic technique used. Since paillier public key encryption technique is used capability of collusion resistance is larger when compared to the other protocols. However the disadvantage of this method is its high computation cost owing to employing homomorphic cryptosystem. D. Comparison Protocol Advantages Disadvantages Random Secure Sum Protocol Simple Hardly any capability of resisting collusion Privacy Preserving K-Secure Sum Protocol Capability of resisting collusion. Works well when number of parties >3 Secure sum protocol using Homomorphic Encryption Capability of resisting collusion. Works well for parties >=2 High Computation Cost because of homomorphic Encryption Table 1: Comparison of the secure sum protocols As shown in table1 a comparison of the various secure sum protocols implemented have been discussed. We have used to secure sum protocol using homomorphic encryption for secure sum computations on the finance dataset. P1(n1) (R1,E,D) P2(n2) (R2,E) P3(n3) (R3,E) E(R1+ n1),E E(R1+ n1)+E(R2+n2),E E(R1+ n1)+ E(R2+n2)+ E(R3+n2) R+ n1+n2 + n3 P1 finally performs D(E( + X* ))mod X =
  • 6. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 4, July-August (2013), © IAEME 208 The computation cost involved on implementing the above three secure sum approaches on 4 sites interacting with each other. We have implemented the protocols in Java using the client server concepts where the server initiates the process of computation and the client interact in a ring format. As observed in the chart the secure sum protocol using homomorphic encryption takes more time compared to the previous approach but is much more secure. 0 0.2 0.4 0.6 0.8 1 1.2 Computation time in ms 10 100 1000 10000 100000 maximum size of the data at each site Random 4-secure encryption Fig. 6. Computation time of the secure sum protocols in millisecond IV. SECURE UNION Let us imagine a situation where data miners would want to know the tuples that satisfy a criterion. Here the assumption is that data is vertically distributed, which means information (characteristics/attributes) regarding each record is maintained at multiple sites. Sites should collectively obtain the union of the tuples. The computation of union is to be performed in a secure manner without revealing any other information other than what has been queried for. A discussion on secure union is given in [4] and [5]. A. Commutative Secure Union protocol Given in Fig.7 is the first level commutative secure union protocol as mentioned in [6]. This protocol starts with party 1 who encrypts its data and forwards it to site 2. Party 2 encrypts its values as well as the encrypted result values obtained by the other sites. These values are moved on to the neighboring parties where again they are encrypted by the key provided by the party. In the process all the values maintained by the n parties are encrypted n times by the encryption keys of each of the parties. Fig. 7. level 1 of the Commutative Secure Union Protocol A,B,C A,B,C E1(ABC) E3(E1(ABC)) E3(ABC) E2(E3(E1(ABC)) E2(ABC) E2(E3(ABC)) A,B,D
  • 7. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 4, July-August (2013), © IAEME 209 Once the data maintained at each of the sites is encrypted. Party1 shuffles all the n times encrypted values and eliminates the duplicate values. Because of commutative encryption property used while deciding on encryption and decryption approach i.e. E3 (E2 (E1 (ABC)))) = E2 (E3 (E1 (ABC)))), we can identify duplicate values. Finally the encrypted values are decrypted by each of the n sites to know that the union of all the data maintained by multiple sites. For the example in fig 7, union of 3 parties will result in ABC and ABD. The above approach uses commutative encryption technique which adds a large overhead to the mining process. This protocol requires the need for a trusted party. B. Secure Union using Public-key Cryptography Site 1 generates a public encryption key k1 and a private key k2 (decryption). Site1 then forwards its encrypted values to site2 who adds its encrypted values to the database sent by site1 and shuffles them. The shuffled dataset is passed to the next site. The next site repeats the step of encryption, shuffling and forwarding. All sites works locally finding local values and encrypting them using the public key sent by site 1. The last party passed the database obtained, shuffles it and sends it to site1.Site1 obtains the union, decrypts them and forwards it to all the other parties. Public key cryptography used for 3 parties with data is as shown in fig 8. This method reduces the time of mining process compared to the previous method. Also the parties can share the union of their data without the need for an outside trusted party. Fig. 8. Secure union using public key cryptography C. Comparison Fig. 9. Computation time for Algo1 and Algo2 with the pohlig hellman encryption
  • 8. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 4, July-August (2013), © IAEME 210 Given that algo1 is secure union protocol using commutative encryption and algo2 is secure union protocol using public encryption. Both the algorithms have been implemented for securely computing the union of data available at 3 parties. The computation time required for each of the approaches when, given the number of tuples involved in secure union computation is being plotted in fig 9. This graph shows that algo2 has a better computation method over algo1. V. SECURE DIVIDE As shown in [8] , where naïve Bayesian approach is used for privacy preserving classification. Here as per the protocol used on horizontal distributed datasets, to find the number of tuples that belongs to a class and with certain features, besides secure sum, secure division protocol is used. ie All parties want to calculate pyz = Cyz/ny. where Cyz represents number of instances belonging to class y and having an attribute value of z and ny indicates number of instances belonging to class y. A. Secure Division using Secure Log Approach As mentioned in [8] the algorithm is implemented as follows. This is implemented by 2 parties p1 and last party pn • Party p1 generates two random values Rc and Rn and forwards it to pn . • Party pn generates Rc + Cyz mod p and Rn + ny mod p for some value p which is large enough to fit the result. • Party 1 generates another random value v1 and u1 and forwards it to party pn. • Party n obtains v2 = C.ln(Rc + Cyz –Rc mod p) mod p – v1 and u2 = C.ln(Rn + ny–Rn mod p) mod p – u1. Where C is a large value assume by party n. • Party n calculates sk = v2- u2 mod p and sends C(to all parties) and sk to party1. • Party 1 calculates the s1 = sk + v1 – u1 mod p and sends it to all parties. • Now all parties can calculate the divided result as exp (s1/C). However in this approach the amount of security is less since the numerator cannot exceed 512 bits. This approach will also work when the numerator and the denominator are encrypted. The values are in encrypted form in most of the cryptographical approaches of data mining. Hence this method is not suitable. B. Secure Division for encrypted Data Since the numerator(n) and the denominator(d) are in the encrypted form we use this method. The encrypted values are of BigInteger type that exceeds the size of 512 bits as in the earlier approach. The working[13] is as follows: • The sub-linear protocol for obtaining 2ld is used by first obtaining the binary equivalent of d (l- bit size) and using binary search approach on bits in d. • Then the inverse of 2ld is generated i.e. 2-ld . From this [p] = (2ld -d) . 2-ld • Then party 1 a~ = 2k . [2-ld ]. poly(p). where poly(p) uses the square and multiply method to obtain a evaluate where w = 2R for some integer R. • The q^ = n . a~ • q~ = truncate q^. • generate [r] = n – d.q~ • Obtain pos_err = result of the bit comparison (<=)between[d]+[d] and [r]+[d]. • Obtain neg_err = result of the bit comparison (>) between[d] and [r] + [d]. • Obtain the divided result q = q~ + pos_err – neg_err. Party 1 circulates q to all the sites which is the divided result.
  • 9. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 4, July-August (2013), © IAEME 211 The entire sequence of events are performed in party 1 itself hence except for broadcasting the result to all the sites there is no other communication cost. Also security is high since the computations are performed on the encrypted datasets. It has also been observed that the number of rounds is O (log2l) where l is the bit size of d. C. Comparison Given below is the comparison between the two protocols used for performing secure divisions. Secure division approach involves paillier encryption approach hence though computation cost increases the communication cost is reduced compared to the secure log approach. As observed in fig 10 secure division is better than secure log approach for performing secure distributed division. The results have been obtained with data maintained at 3 sites. X axis indicates the number of tuples in each of the site. Y axis indicates the time in millisecond. Fig. 10. Computation time with dataset size on the X axis and execution time in the Y axis VI. CONCLUSIONS The preprocessing techniques have been used on the datasets maintained on each of the sites in order to prepare the data for mining. Secure protocols have been implemented in Java platform with a minimum of 3 parties and analyzed the working of the above methods. The best approaches such as secure sum using homomorphic encryption, secure union using encryption and secure division on encrypted data has been used in implementing our data mining approaches on the horizontally classified datasets maintained at 3 sites. VII. ACKNOWLEDGMENT We acknowledge Manipal University and M S Ramaiah Institute of Technology for giving us an opportunity for working and publishing this paper. REFERENCES Journal Papers [1] Sotiris Kotsiantis,”On implementing a Financial Decision Support System”, International Journal of Computer Science and Network Security, 2006. [2] Mohamed MEdhat Gaber, Arkady Zaslavsky,”Mining Data Streams:A Review”, ACM, SIGMOD Record, June 2007. [3] Somayyeh Seifi Moradi, Mohammad Reza ,”Classification and Evaluation of the Privacy preserving Distributed Data Mining Techniques”, Journal of Theoretical and Applied Information Technology, March 2012. Dataset Size
  • 10. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 4, July-August (2013), © IAEME 212 [4] Wenliang Du, Mikhail J Atallah, “Secure Multi-Party Computation Problems and Applications”, Journal of Security Paradigms, 2001. [5] Bart Kuijpers, Karl Tuyls,” Privacy Preserving ID3 over Horizontally, Vertically and Grid Partitioned Data”, Journal of Security, 2006 [6] Murat Kantarcioglu, Chris Clifton,” Privacy-preserving Distributed Mining of Association Rules on Horizontally Partitioned Data”, IEEE Transactions on Knowledge and Data Engineering, 2003. [7] Murat Kantarcioglu, Jaideep Vaidya,” Privacy Preserving Naive Bayes Classifier for Horizontally Partitioned Data”, ACM Transactions on Information Systems Security,2008 [8] Sameep Mehta , Srinivasan Parthasarathy,”Correlation Preserving Discretization” , IEEE transactions 2006. [9] Omar Hasan, Elisa Bertino,”Efficient Privacy Preserving Reputation protocols inspired by Secure sum”, IEEE transactions, 2010. [10] Rashad Sheikh, Beerendra Kumar,”Privacy Preserving k-secure sum Protocol”, International Journal of Computer Science and Information Security. [11] Rashad Sheikh, Durgesh Kumar Mishra,” A Distributed k-secure Sum Protocol for Secure Multi-Party Computations, Journal of Computing, March 2010. [12] Morten Dahl, Chao Ning, and Tomas Toft, “ On Secure Two-party Integer Division” , Financial Cryptography and data security , Volume 7397, 2012,pp164-178. [13] Y. Lindell and B. Pinkas, Privacy Preserving Data Mining, Advances in Cryptology – CRYPTO '00. Lecture Notes in Computer Science, Vol. 1880, Springer-Verlag, 2000, pp. 36- 53 Books: [14] Pang-Ning Tan, “Introduction to Data Mining”, Pearson Education,2007. Conferences: [15] Agrawal, R., and Srikant, R. (2000). Privacy Preserving Data Mining. ACM SIGMOD International Conference on Management of Data, SIGMOD’00, Dallas, USA.439-450.