SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Downloaden Sie, um offline zu lesen
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 6597
Achieving Data Truthfulness and Privacy Preservation in
Data Markets
Mrs. F. Mary Herin Fernandez1, R. Ramya2, P. Sreevarsha3
1Assistant Professor, Computer Science Department, Jeppiaar SRR Engineering College, Tamil Nadu
2,3Computer Science Department, Jeppiaar SRR Engineering College, Tamil Nadu
--------------------------------------------------------------------------***----------------------------------------------------------------------------
ABSTRACT:- A major business paradigm, several on line
info platform have emerged to satisfy society’s desires for
person specify knowledge, wherever a service supplier
collects information from data contributor, so supply
added knowledge services to data shopper. However,
within the knowledge commerce layer, the information
shopper faces a pressing downside, i.e., the way to verify
whether or not the service supplier has honestly collected
and method knowledge. What is more, the information
contributor are sometimes unwilling to revel their
sensitive personal data and real identity to data
contributors. In here, TPDM is been planned, that with
efficiency integrates honesties and privacy preservation in
knowledge market. Also it, instantiate TPDM with profile
matching service and an information distribution service,
and extensively judge the performances rating datasets.
This analysis and analysis results revels that TPDM
achieves many fascinating properties, whereas acquisition
low computation and commutation overheads once
supporting large-scale knowledge markets.
Keywords: Data market, TPDM, Privacy Preservation,
Message Authentication Code, Homomorphism
Encryption, Data Truthfulness.
1. INTRODUCTION
Data mining is that the method of analyzing
knowledge from totally different views and summarizing it
into helpful info. Data processing software package is one
in all variety of analytical tools for analyzing knowledge. It
permits users to investigate knowledge from many various
dimensions or angles, categorise it, and summarize the
relationships known. Technically, data mining is that the
process of finding correlations or patterns among dozens
of fields in massive relative databases. Data processing
involves six common categories of tasks: Anomaly
detection the identification of surprising knowledge
records, which may be attention grabbing or knowledge
errors that need more investigation. Dependency
modelling searches for relationships between variables.
For instance a grocery would possibly gather knowledge
on client buying habits. Exploitation association rule
learning, the grocery will confirm that merchandise are
often bought along and use this info for promoting
functions. This is often generally stated as market basket
analysis. Bunch is that the task of discovering teams and
structures within the knowledge that are in a way or
another "similar", while not exploitation better known
structures within the knowledge. Therefore, so as to
reduce the expenditure for knowledge acquisition,
associate timeserving method for the service supplier is to
mingle some imitative or artificial data into the
information sets. Yet, to scale back operation price, a
strategic service supplier could give data services
supported a set of the entire information set, or perhaps
come a faux result while not process the Classification is
that the task of generalizing better known structure to use
to new knowledge. For instance, associate e-mail program
would possibly try to classify an e-mail as "legitimate" or
as "spam". Regression makes an attempt to seek out a
operate that models the information with the smallest
amount error. Summarisation providing a lot of compact
illustration of the information set, together with image and
report generation. In the era of huge knowledge, society
has developed associate insatiable appetency for sharing
personal knowledge. Realizing the potential of non public
data’s value in higher cognitive process and user expertise
sweetening, many open info platforms have emerged to
change person specific knowledge to be changed on the
web. However, there exists a crucial security downside in
these market-based platforms, i.e., it's troublesome to
ensure the honesties in terms of information assortment
and processing, particularly once privacies of the
information contributors are required to be preserved.
Guaranteeing honesties and protective the privacies of
information contributors are each necessary to the long
run healthy development of data markets. On one hand,
the last word goal of the service supplier during
acknowledge market is to maximise information from
selected data sources. The service supplier ought to be
ready to collect data from an oversized range of
information contributors with low latency. Because of the
timeliness of some varieties of person-specific knowledge,
the service supplier should sporadically collect recent
information to satisfy the varied demands of high-quality
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 6598
data services. For instance, twenty five billion knowledge
assortment activities happen. Meanwhile, the service
supplier has to verify knowledge authentication and data
integrity. One basic approach is to let every data
contributor sign her information. However, classical digital
signature schemes, that verify the received signatures one
once another, could fail to satisfy the rigorous time
demand of information market.
2. RELATED WORK
The thorniest style challenge is that supportive the
honesties of information assortment and protective the
privacy appear to be contradictory objectives. This method
lies in the way to guarantee the honesties of information
process, below the data imbalance between the
information shopper and also the service supplier because
of data confidentiality. The potency demand of information
markets, particularly for knowledge acquisition, service
supplier should sporadically collect recent information to
satisfy the varied demands of prime quality data services.
3. PROPOSED SYSTEM
On two real-world during this project, we've got
planned the primary economical secure theme TPDM for
knowledge markets, that at the same time guarantees
knowledge honesties and privacy preservation. In TPDM,
the information contributors must honestly submit their
own data, however cannot impersonate others. Besides,
the service supplier is enforced to honestly collect and
method knowledge. What is more, each the in person
identifiable info and also the sensitive information of
information contributors are well protected. Additionally,
we've got instantiated TPDM with two totally different
knowledge services, and extensively evaluated their
performances datasets.
4. SYSTEM IMPLEMENTATION
The Achieving data truthfulness and privacy
preservations is illustrated as follows:
No Yes
Fig 1: Flow Diagram
Data Contributor
Create Profile
(Service)
Collects Profiles
From Provider
Collector
Generate
Authenticated
Database
Purchase
Authenticated
Database
Broker
Provide Requested
Service
Recommending
Service
User
Is
the
service
Access The
Service
Stop
Start
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 6599
Implementation of achieving data truthfulness
and privacy preservation in data markets is break down
into four models :
A. Data contributor
B. Data collector
C. Data provider
D. Data consumer.
A. DATA CONTRIBUTOR
The user undergoes registration method the
Registration centre can give the pseudo identity and
provides them to the user. We have a tendency to assume
that the registration centre sets up the system parameters
at the start of information commerce. The verification
conducted by each the service supplier and also the
knowledge shopper. Between the two-layer batch
verifications, we have a tendency to introduce processing
and signatures aggregation done by the service supplier.
At last, we have a tendency to gift outcome verifications
conducted by the information shopper. The information
contributors is in have to expose the service that provided
by them, in terms of the entire package of the service. The
package that comprises the small print like a product that
give by the contributor and also the various price for the
every product in commission. And a complete price of the
service. The information contributor is ready to turn out
any range (N numbers) of service and every are declared
as separate package. Data contributor login page as shown
in fig(1).
Fig2:DataContributor Login
B. DATA COLLECTOR
The collector surfs with the contributor services and
choose the required package of services. And also the
collector submits the resource request to the various CSP
of service. If the CSP acknowledge the collector request of
resource, currently the collector is prepared to access the
resource details and to supply the various resource to
requesting service supplier. Collector serves a
intermediate between the broker and also the CSP. Data
imported from contributor as shown in fig(2).
Fig 3: Data Imported from Contributor
C. DATA PROVIDER
The service provider will ready to choose the service
that in would like from the service provided by the
collector from the CSP. If the service supplier selects their
desired package of service, then the service supplier ought
to pay money for the various services. If the service
supplier is paid with the service the service provider will
access the service from collector. And currently the service
supplier is prepared to source the service that bought from
the collector to the user as shown in fig (3).
Fig 4: Broker collects Data
D. DATA CONSUMER
The buyer hunt for the service that they have from the
assorted service suppliers. And if the buyer finds the
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 6600
required service they request the service to the service
supplier and obtain use with the resource. And verify or
cross check the resource that bought from the service
supplier that whether or not service provider serves the
proper resource in cheap price.
Fig 5: Data provided by Broker
Fig 6: Cheated by Data Broker
Fig 7:Genunine service by Broker
Table Computing Metrics of SVM Classifier
Metrics Invalid
Product
SVM
Classifier
Output
True
Positive(TP)
Positive Data Positive Data
True
Negative(TN)
Negative Data Negative Data
False
Positive(FP)
Negative Data Positive Data
False
Negative(FN)
Positive Data Negative Data
Table 2 Comparative Analysis of Related Work
Performance Metrics
Invalid
Product
TP TN FP FN Precision Recall
10 5 3 2 1 0.714 0.833
30 10 12 5 3 0.666 0.769
50 21 11 9 9 0.7 0.7
70 30 25 11 4 0.731 0.882
100 45 39 8 8 0.849 0.849
Where , IP- Invalid Product
Fig 8. Sample bar grap
5. MERKLE HASH FUNCTION
This function is employed in achieving knowledge
honesties and privacy preservation is MERKLE HASH rule.
In cryptography and engineering, an Merkle tree could be
a tree within which each leaf node is tagged with the hash
of an information block ,and every non-leaf node is tagged
with the crypto logical hash of the labels of its kid nodes.
Hash tree permit economical and secure verification of the
0
0.2
0.4
0.6
0.8
1
10
RM
30
RM
50
RM
70
RM
100
RM
Precision Recall
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 6601
contents of enormous knowledge structures. Hash tree are
a generalization of hash lists and hash chains.
LIMITATIONS
Verification in digital signature schemes needs the
knowledge of information, and may simply leak an
information contributor’s real identity. Relating to a
message authentication code(MAC), the information
contributors and also the data customers have to agree on
a shared secret key, that is unpractical in knowledge
markets.
ADVANTAGES
TPDM is structured internally during a method of
encipher then sign exploitation partly similarity
cryptography and identity-based signature. Its to verify
honesties of privacy preservation in knowledge market.
6. CONCLUSION AND FUTUREWORK
This paper, the information contributors must
honestly submit their own data, however cannot
impersonate others. Besides, the service supplier is
enforced to honestly collect and method knowledge. What
is more, each the in person known info and also the
sensitive information and data contributor are well
protected. additionally, we've got instantiated TPDM with
two totally different knowledge services, and extensively
evaluated their performances on two real-world datasets.
System analysis results have the contest in the
measurability of TPDM within the context of enormous
user base, particularly from computation and
communication overheads. At last, we've got shown the
practicable of introducing the semi-honest registration
centre with elaborated theoretical analysis and substantial
analysis.
7. REFERENCES
[1] M. Barbara, T. Zeller, and S. Hansel, A Face is Exposed
for AOL Searcher no. 4417749, New York, NY, USA:
ny Times, Aug. 2006.
[2] B.C.M. Fung, K. Wang, R. Chen, P. S. Yu, "Privacy-
preserving knowledge publishing: A survey of
recent developments", ACM computation Surveys,
vol. 42, no. 4, pp.
[3] G.Ghinita, P. Kalnis, Y. Tao, "Anonymous publication
of sensitive transactional data1-53, Jun. 2010.
[4] T.W. Chim, S. Yiu, L. C. K. Hui, V. O. K ZLi, "SPECS:
Secure and privacy enhancing communicatiing
scheme for VANETs", Ad Hoc Network, vol. 9, no. 2,
pp. 189-203, 2011. ", IEEE dealings data knowledge
Eng., vol. 23, no. 2, pp. 161-174, Feb. 2011.
[5] Z. Erkin, T. Veugen, T. Toft, and R. L. Lagendijk,
“Generating personal recommendations with
efficiency exploitation similarity cryptography and
knowledge packing”, IEEE dealings info Forensics
Security, vol. 7, no. 3, pp. 1053–1066, Jun. 2012.
[6] Z. Zheng, Y. Peng, F. Wu, S. Tang, and G. Chemm,
“Trading data within the crowd : Profit-driven data
acquisition for mobile crowd sensing ”, IEEE J. Sel.
Areas Communication, vol. 35, no. 2, pp. 486–
501,Feb. 2017.

Weitere ähnliche Inhalte

Was ist angesagt?

Information systems and it's types
Information systems and it's typesInformation systems and it's types
Information systems and it's typesJaipal Dhobale
 
Data warehouse,data mining & Big Data
Data warehouse,data mining & Big DataData warehouse,data mining & Big Data
Data warehouse,data mining & Big DataRavinder Kamboj
 
An efficient data pre processing frame work for loan credibility prediction s...
An efficient data pre processing frame work for loan credibility prediction s...An efficient data pre processing frame work for loan credibility prediction s...
An efficient data pre processing frame work for loan credibility prediction s...eSAT Journals
 
Bloor Research Comparative costs and uses for data integration platforms
Bloor Research Comparative costs and uses for data integration platformsBloor Research Comparative costs and uses for data integration platforms
Bloor Research Comparative costs and uses for data integration platformsFiona Lew
 
Mca & diplamo java titles
Mca & diplamo java titlesMca & diplamo java titles
Mca & diplamo java titlestema_solution
 
IRJET- Improving the Performance of Smart Heterogeneous Big Data
IRJET- Improving the Performance of Smart Heterogeneous Big DataIRJET- Improving the Performance of Smart Heterogeneous Big Data
IRJET- Improving the Performance of Smart Heterogeneous Big DataIRJET Journal
 
Dn31538540
Dn31538540Dn31538540
Dn31538540IJMER
 
CXAIR for Data Migration
CXAIR for Data MigrationCXAIR for Data Migration
CXAIR for Data MigrationConnexica
 
Hybrid distributed application in banking transaction using remote method inv...
Hybrid distributed application in banking transaction using remote method inv...Hybrid distributed application in banking transaction using remote method inv...
Hybrid distributed application in banking transaction using remote method inv...TELKOMNIKA JOURNAL
 

Was ist angesagt? (9)

Information systems and it's types
Information systems and it's typesInformation systems and it's types
Information systems and it's types
 
Data warehouse,data mining & Big Data
Data warehouse,data mining & Big DataData warehouse,data mining & Big Data
Data warehouse,data mining & Big Data
 
An efficient data pre processing frame work for loan credibility prediction s...
An efficient data pre processing frame work for loan credibility prediction s...An efficient data pre processing frame work for loan credibility prediction s...
An efficient data pre processing frame work for loan credibility prediction s...
 
Bloor Research Comparative costs and uses for data integration platforms
Bloor Research Comparative costs and uses for data integration platformsBloor Research Comparative costs and uses for data integration platforms
Bloor Research Comparative costs and uses for data integration platforms
 
Mca & diplamo java titles
Mca & diplamo java titlesMca & diplamo java titles
Mca & diplamo java titles
 
IRJET- Improving the Performance of Smart Heterogeneous Big Data
IRJET- Improving the Performance of Smart Heterogeneous Big DataIRJET- Improving the Performance of Smart Heterogeneous Big Data
IRJET- Improving the Performance of Smart Heterogeneous Big Data
 
Dn31538540
Dn31538540Dn31538540
Dn31538540
 
CXAIR for Data Migration
CXAIR for Data MigrationCXAIR for Data Migration
CXAIR for Data Migration
 
Hybrid distributed application in banking transaction using remote method inv...
Hybrid distributed application in banking transaction using remote method inv...Hybrid distributed application in banking transaction using remote method inv...
Hybrid distributed application in banking transaction using remote method inv...
 

Ähnlich wie Achieving data truthfulness and privacy in markets

Technology & Innovation - User Experience in Business Database Systems
Technology & Innovation - User Experience in Business Database SystemsTechnology & Innovation - User Experience in Business Database Systems
Technology & Innovation - User Experience in Business Database SystemsCris Ong
 
IRJET - Customer Churn Analysis in Telecom Industry
IRJET - Customer Churn Analysis in Telecom IndustryIRJET - Customer Churn Analysis in Telecom Industry
IRJET - Customer Churn Analysis in Telecom IndustryIRJET Journal
 
The Cloud Computing Approach for Secured Health Maintenance Record of Patient...
The Cloud Computing Approach for Secured Health Maintenance Record of Patient...The Cloud Computing Approach for Secured Health Maintenance Record of Patient...
The Cloud Computing Approach for Secured Health Maintenance Record of Patient...IRJET Journal
 
Strategies to Monetize Energy Data - How Utilities Can Increase Their 'Earnin...
Strategies to Monetize Energy Data - How Utilities Can Increase Their 'Earnin...Strategies to Monetize Energy Data - How Utilities Can Increase Their 'Earnin...
Strategies to Monetize Energy Data - How Utilities Can Increase Their 'Earnin...Indigo Advisory Group
 
IRJET- Development and Design of Recommendation System for User Interest Shop...
IRJET- Development and Design of Recommendation System for User Interest Shop...IRJET- Development and Design of Recommendation System for User Interest Shop...
IRJET- Development and Design of Recommendation System for User Interest Shop...IRJET Journal
 
Providing Highly Accurate Service Recommendation over Big Data using Adaptive...
Providing Highly Accurate Service Recommendation over Big Data using Adaptive...Providing Highly Accurate Service Recommendation over Big Data using Adaptive...
Providing Highly Accurate Service Recommendation over Big Data using Adaptive...IRJET Journal
 
Proposed ranking for point of sales using data mining for telecom operators
Proposed ranking for point of sales using data mining for telecom operatorsProposed ranking for point of sales using data mining for telecom operators
Proposed ranking for point of sales using data mining for telecom operatorsijdms
 
IRJET- Data Privacy and Security Industry – Opportunities and Challenges
IRJET- Data Privacy and Security Industry – Opportunities and ChallengesIRJET- Data Privacy and Security Industry – Opportunities and Challenges
IRJET- Data Privacy and Security Industry – Opportunities and ChallengesIRJET Journal
 
Data Mining in Telecommunication Industry
Data Mining in Telecommunication IndustryData Mining in Telecommunication Industry
Data Mining in Telecommunication Industryijsrd.com
 
Mining the Web Data for Classifying and Predicting Users’ Requests
Mining the Web Data for Classifying and Predicting Users’ RequestsMining the Web Data for Classifying and Predicting Users’ Requests
Mining the Web Data for Classifying and Predicting Users’ RequestsIJECEIAES
 
IRJET- Competitive Analysis of Attacks on Social Media
IRJET-  	 Competitive Analysis of Attacks on Social MediaIRJET-  	 Competitive Analysis of Attacks on Social Media
IRJET- Competitive Analysis of Attacks on Social MediaIRJET Journal
 
IRJET- A Novel Approach for Accomplishing Data Reliability and Isolation Safe...
IRJET- A Novel Approach for Accomplishing Data Reliability and Isolation Safe...IRJET- A Novel Approach for Accomplishing Data Reliability and Isolation Safe...
IRJET- A Novel Approach for Accomplishing Data Reliability and Isolation Safe...IRJET Journal
 
A Muilt-Keyword Ranked Based Search and Privacy Preservation of Distributed D...
A Muilt-Keyword Ranked Based Search and Privacy Preservation of Distributed D...A Muilt-Keyword Ranked Based Search and Privacy Preservation of Distributed D...
A Muilt-Keyword Ranked Based Search and Privacy Preservation of Distributed D...IRJET Journal
 
A Muilt-Keyword Ranked Based Search and Privacy Preservation of Distributed D...
A Muilt-Keyword Ranked Based Search and Privacy Preservation of Distributed D...A Muilt-Keyword Ranked Based Search and Privacy Preservation of Distributed D...
A Muilt-Keyword Ranked Based Search and Privacy Preservation of Distributed D...IRJET Journal
 
IRJET - Digital Advertisement using Artificial Intelligence for Data Anal...
IRJET -  	  Digital Advertisement using Artificial Intelligence for Data Anal...IRJET -  	  Digital Advertisement using Artificial Intelligence for Data Anal...
IRJET - Digital Advertisement using Artificial Intelligence for Data Anal...IRJET Journal
 
How secure is the cloud? and Amazon vs Walmart which giant will dominant?
How secure is the cloud? and Amazon vs Walmart which giant will dominant?How secure is the cloud? and Amazon vs Walmart which giant will dominant?
How secure is the cloud? and Amazon vs Walmart which giant will dominant?Mohammad Mydul Islam
 
IRJET - An Intelligent Recommendation for Social Contextual Image using H...
IRJET -  	  An Intelligent Recommendation for Social Contextual Image using H...IRJET -  	  An Intelligent Recommendation for Social Contextual Image using H...
IRJET - An Intelligent Recommendation for Social Contextual Image using H...IRJET Journal
 
INTEGRATION OF MACHINE LEARNING TECHNIQUES TO EVALUATE DYNAMIC CUSTOMER SEGME...
INTEGRATION OF MACHINE LEARNING TECHNIQUES TO EVALUATE DYNAMIC CUSTOMER SEGME...INTEGRATION OF MACHINE LEARNING TECHNIQUES TO EVALUATE DYNAMIC CUSTOMER SEGME...
INTEGRATION OF MACHINE LEARNING TECHNIQUES TO EVALUATE DYNAMIC CUSTOMER SEGME...IJDKP
 

Ähnlich wie Achieving data truthfulness and privacy in markets (20)

Gc3310851089
Gc3310851089Gc3310851089
Gc3310851089
 
Technology & Innovation - User Experience in Business Database Systems
Technology & Innovation - User Experience in Business Database SystemsTechnology & Innovation - User Experience in Business Database Systems
Technology & Innovation - User Experience in Business Database Systems
 
IRJET - Customer Churn Analysis in Telecom Industry
IRJET - Customer Churn Analysis in Telecom IndustryIRJET - Customer Churn Analysis in Telecom Industry
IRJET - Customer Churn Analysis in Telecom Industry
 
The Cloud Computing Approach for Secured Health Maintenance Record of Patient...
The Cloud Computing Approach for Secured Health Maintenance Record of Patient...The Cloud Computing Approach for Secured Health Maintenance Record of Patient...
The Cloud Computing Approach for Secured Health Maintenance Record of Patient...
 
Strategies to Monetize Energy Data - How Utilities Can Increase Their 'Earnin...
Strategies to Monetize Energy Data - How Utilities Can Increase Their 'Earnin...Strategies to Monetize Energy Data - How Utilities Can Increase Their 'Earnin...
Strategies to Monetize Energy Data - How Utilities Can Increase Their 'Earnin...
 
IRJET- Development and Design of Recommendation System for User Interest Shop...
IRJET- Development and Design of Recommendation System for User Interest Shop...IRJET- Development and Design of Recommendation System for User Interest Shop...
IRJET- Development and Design of Recommendation System for User Interest Shop...
 
Providing Highly Accurate Service Recommendation over Big Data using Adaptive...
Providing Highly Accurate Service Recommendation over Big Data using Adaptive...Providing Highly Accurate Service Recommendation over Big Data using Adaptive...
Providing Highly Accurate Service Recommendation over Big Data using Adaptive...
 
Proposed ranking for point of sales using data mining for telecom operators
Proposed ranking for point of sales using data mining for telecom operatorsProposed ranking for point of sales using data mining for telecom operators
Proposed ranking for point of sales using data mining for telecom operators
 
IRJET- Data Privacy and Security Industry – Opportunities and Challenges
IRJET- Data Privacy and Security Industry – Opportunities and ChallengesIRJET- Data Privacy and Security Industry – Opportunities and Challenges
IRJET- Data Privacy and Security Industry – Opportunities and Challenges
 
20 ccp using logistic
20 ccp using logistic20 ccp using logistic
20 ccp using logistic
 
Data Mining in Telecommunication Industry
Data Mining in Telecommunication IndustryData Mining in Telecommunication Industry
Data Mining in Telecommunication Industry
 
Mining the Web Data for Classifying and Predicting Users’ Requests
Mining the Web Data for Classifying and Predicting Users’ RequestsMining the Web Data for Classifying and Predicting Users’ Requests
Mining the Web Data for Classifying and Predicting Users’ Requests
 
IRJET- Competitive Analysis of Attacks on Social Media
IRJET-  	 Competitive Analysis of Attacks on Social MediaIRJET-  	 Competitive Analysis of Attacks on Social Media
IRJET- Competitive Analysis of Attacks on Social Media
 
IRJET- A Novel Approach for Accomplishing Data Reliability and Isolation Safe...
IRJET- A Novel Approach for Accomplishing Data Reliability and Isolation Safe...IRJET- A Novel Approach for Accomplishing Data Reliability and Isolation Safe...
IRJET- A Novel Approach for Accomplishing Data Reliability and Isolation Safe...
 
A Muilt-Keyword Ranked Based Search and Privacy Preservation of Distributed D...
A Muilt-Keyword Ranked Based Search and Privacy Preservation of Distributed D...A Muilt-Keyword Ranked Based Search and Privacy Preservation of Distributed D...
A Muilt-Keyword Ranked Based Search and Privacy Preservation of Distributed D...
 
A Muilt-Keyword Ranked Based Search and Privacy Preservation of Distributed D...
A Muilt-Keyword Ranked Based Search and Privacy Preservation of Distributed D...A Muilt-Keyword Ranked Based Search and Privacy Preservation of Distributed D...
A Muilt-Keyword Ranked Based Search and Privacy Preservation of Distributed D...
 
IRJET - Digital Advertisement using Artificial Intelligence for Data Anal...
IRJET -  	  Digital Advertisement using Artificial Intelligence for Data Anal...IRJET -  	  Digital Advertisement using Artificial Intelligence for Data Anal...
IRJET - Digital Advertisement using Artificial Intelligence for Data Anal...
 
How secure is the cloud? and Amazon vs Walmart which giant will dominant?
How secure is the cloud? and Amazon vs Walmart which giant will dominant?How secure is the cloud? and Amazon vs Walmart which giant will dominant?
How secure is the cloud? and Amazon vs Walmart which giant will dominant?
 
IRJET - An Intelligent Recommendation for Social Contextual Image using H...
IRJET -  	  An Intelligent Recommendation for Social Contextual Image using H...IRJET -  	  An Intelligent Recommendation for Social Contextual Image using H...
IRJET - An Intelligent Recommendation for Social Contextual Image using H...
 
INTEGRATION OF MACHINE LEARNING TECHNIQUES TO EVALUATE DYNAMIC CUSTOMER SEGME...
INTEGRATION OF MACHINE LEARNING TECHNIQUES TO EVALUATE DYNAMIC CUSTOMER SEGME...INTEGRATION OF MACHINE LEARNING TECHNIQUES TO EVALUATE DYNAMIC CUSTOMER SEGME...
INTEGRATION OF MACHINE LEARNING TECHNIQUES TO EVALUATE DYNAMIC CUSTOMER SEGME...
 

Mehr von IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

Mehr von IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Kürzlich hochgeladen

The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGSIVASHANKAR N
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesPrabhanshu Chaturvedi
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 

Kürzlich hochgeladen (20)

The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and Properties
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 

Achieving data truthfulness and privacy in markets

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 6597 Achieving Data Truthfulness and Privacy Preservation in Data Markets Mrs. F. Mary Herin Fernandez1, R. Ramya2, P. Sreevarsha3 1Assistant Professor, Computer Science Department, Jeppiaar SRR Engineering College, Tamil Nadu 2,3Computer Science Department, Jeppiaar SRR Engineering College, Tamil Nadu --------------------------------------------------------------------------***---------------------------------------------------------------------------- ABSTRACT:- A major business paradigm, several on line info platform have emerged to satisfy society’s desires for person specify knowledge, wherever a service supplier collects information from data contributor, so supply added knowledge services to data shopper. However, within the knowledge commerce layer, the information shopper faces a pressing downside, i.e., the way to verify whether or not the service supplier has honestly collected and method knowledge. What is more, the information contributor are sometimes unwilling to revel their sensitive personal data and real identity to data contributors. In here, TPDM is been planned, that with efficiency integrates honesties and privacy preservation in knowledge market. Also it, instantiate TPDM with profile matching service and an information distribution service, and extensively judge the performances rating datasets. This analysis and analysis results revels that TPDM achieves many fascinating properties, whereas acquisition low computation and commutation overheads once supporting large-scale knowledge markets. Keywords: Data market, TPDM, Privacy Preservation, Message Authentication Code, Homomorphism Encryption, Data Truthfulness. 1. INTRODUCTION Data mining is that the method of analyzing knowledge from totally different views and summarizing it into helpful info. Data processing software package is one in all variety of analytical tools for analyzing knowledge. It permits users to investigate knowledge from many various dimensions or angles, categorise it, and summarize the relationships known. Technically, data mining is that the process of finding correlations or patterns among dozens of fields in massive relative databases. Data processing involves six common categories of tasks: Anomaly detection the identification of surprising knowledge records, which may be attention grabbing or knowledge errors that need more investigation. Dependency modelling searches for relationships between variables. For instance a grocery would possibly gather knowledge on client buying habits. Exploitation association rule learning, the grocery will confirm that merchandise are often bought along and use this info for promoting functions. This is often generally stated as market basket analysis. Bunch is that the task of discovering teams and structures within the knowledge that are in a way or another "similar", while not exploitation better known structures within the knowledge. Therefore, so as to reduce the expenditure for knowledge acquisition, associate timeserving method for the service supplier is to mingle some imitative or artificial data into the information sets. Yet, to scale back operation price, a strategic service supplier could give data services supported a set of the entire information set, or perhaps come a faux result while not process the Classification is that the task of generalizing better known structure to use to new knowledge. For instance, associate e-mail program would possibly try to classify an e-mail as "legitimate" or as "spam". Regression makes an attempt to seek out a operate that models the information with the smallest amount error. Summarisation providing a lot of compact illustration of the information set, together with image and report generation. In the era of huge knowledge, society has developed associate insatiable appetency for sharing personal knowledge. Realizing the potential of non public data’s value in higher cognitive process and user expertise sweetening, many open info platforms have emerged to change person specific knowledge to be changed on the web. However, there exists a crucial security downside in these market-based platforms, i.e., it's troublesome to ensure the honesties in terms of information assortment and processing, particularly once privacies of the information contributors are required to be preserved. Guaranteeing honesties and protective the privacies of information contributors are each necessary to the long run healthy development of data markets. On one hand, the last word goal of the service supplier during acknowledge market is to maximise information from selected data sources. The service supplier ought to be ready to collect data from an oversized range of information contributors with low latency. Because of the timeliness of some varieties of person-specific knowledge, the service supplier should sporadically collect recent information to satisfy the varied demands of high-quality
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 6598 data services. For instance, twenty five billion knowledge assortment activities happen. Meanwhile, the service supplier has to verify knowledge authentication and data integrity. One basic approach is to let every data contributor sign her information. However, classical digital signature schemes, that verify the received signatures one once another, could fail to satisfy the rigorous time demand of information market. 2. RELATED WORK The thorniest style challenge is that supportive the honesties of information assortment and protective the privacy appear to be contradictory objectives. This method lies in the way to guarantee the honesties of information process, below the data imbalance between the information shopper and also the service supplier because of data confidentiality. The potency demand of information markets, particularly for knowledge acquisition, service supplier should sporadically collect recent information to satisfy the varied demands of prime quality data services. 3. PROPOSED SYSTEM On two real-world during this project, we've got planned the primary economical secure theme TPDM for knowledge markets, that at the same time guarantees knowledge honesties and privacy preservation. In TPDM, the information contributors must honestly submit their own data, however cannot impersonate others. Besides, the service supplier is enforced to honestly collect and method knowledge. What is more, each the in person identifiable info and also the sensitive information of information contributors are well protected. Additionally, we've got instantiated TPDM with two totally different knowledge services, and extensively evaluated their performances datasets. 4. SYSTEM IMPLEMENTATION The Achieving data truthfulness and privacy preservations is illustrated as follows: No Yes Fig 1: Flow Diagram Data Contributor Create Profile (Service) Collects Profiles From Provider Collector Generate Authenticated Database Purchase Authenticated Database Broker Provide Requested Service Recommending Service User Is the service Access The Service Stop Start
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 6599 Implementation of achieving data truthfulness and privacy preservation in data markets is break down into four models : A. Data contributor B. Data collector C. Data provider D. Data consumer. A. DATA CONTRIBUTOR The user undergoes registration method the Registration centre can give the pseudo identity and provides them to the user. We have a tendency to assume that the registration centre sets up the system parameters at the start of information commerce. The verification conducted by each the service supplier and also the knowledge shopper. Between the two-layer batch verifications, we have a tendency to introduce processing and signatures aggregation done by the service supplier. At last, we have a tendency to gift outcome verifications conducted by the information shopper. The information contributors is in have to expose the service that provided by them, in terms of the entire package of the service. The package that comprises the small print like a product that give by the contributor and also the various price for the every product in commission. And a complete price of the service. The information contributor is ready to turn out any range (N numbers) of service and every are declared as separate package. Data contributor login page as shown in fig(1). Fig2:DataContributor Login B. DATA COLLECTOR The collector surfs with the contributor services and choose the required package of services. And also the collector submits the resource request to the various CSP of service. If the CSP acknowledge the collector request of resource, currently the collector is prepared to access the resource details and to supply the various resource to requesting service supplier. Collector serves a intermediate between the broker and also the CSP. Data imported from contributor as shown in fig(2). Fig 3: Data Imported from Contributor C. DATA PROVIDER The service provider will ready to choose the service that in would like from the service provided by the collector from the CSP. If the service supplier selects their desired package of service, then the service supplier ought to pay money for the various services. If the service supplier is paid with the service the service provider will access the service from collector. And currently the service supplier is prepared to source the service that bought from the collector to the user as shown in fig (3). Fig 4: Broker collects Data D. DATA CONSUMER The buyer hunt for the service that they have from the assorted service suppliers. And if the buyer finds the
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 6600 required service they request the service to the service supplier and obtain use with the resource. And verify or cross check the resource that bought from the service supplier that whether or not service provider serves the proper resource in cheap price. Fig 5: Data provided by Broker Fig 6: Cheated by Data Broker Fig 7:Genunine service by Broker Table Computing Metrics of SVM Classifier Metrics Invalid Product SVM Classifier Output True Positive(TP) Positive Data Positive Data True Negative(TN) Negative Data Negative Data False Positive(FP) Negative Data Positive Data False Negative(FN) Positive Data Negative Data Table 2 Comparative Analysis of Related Work Performance Metrics Invalid Product TP TN FP FN Precision Recall 10 5 3 2 1 0.714 0.833 30 10 12 5 3 0.666 0.769 50 21 11 9 9 0.7 0.7 70 30 25 11 4 0.731 0.882 100 45 39 8 8 0.849 0.849 Where , IP- Invalid Product Fig 8. Sample bar grap 5. MERKLE HASH FUNCTION This function is employed in achieving knowledge honesties and privacy preservation is MERKLE HASH rule. In cryptography and engineering, an Merkle tree could be a tree within which each leaf node is tagged with the hash of an information block ,and every non-leaf node is tagged with the crypto logical hash of the labels of its kid nodes. Hash tree permit economical and secure verification of the 0 0.2 0.4 0.6 0.8 1 10 RM 30 RM 50 RM 70 RM 100 RM Precision Recall
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 6601 contents of enormous knowledge structures. Hash tree are a generalization of hash lists and hash chains. LIMITATIONS Verification in digital signature schemes needs the knowledge of information, and may simply leak an information contributor’s real identity. Relating to a message authentication code(MAC), the information contributors and also the data customers have to agree on a shared secret key, that is unpractical in knowledge markets. ADVANTAGES TPDM is structured internally during a method of encipher then sign exploitation partly similarity cryptography and identity-based signature. Its to verify honesties of privacy preservation in knowledge market. 6. CONCLUSION AND FUTUREWORK This paper, the information contributors must honestly submit their own data, however cannot impersonate others. Besides, the service supplier is enforced to honestly collect and method knowledge. What is more, each the in person known info and also the sensitive information and data contributor are well protected. additionally, we've got instantiated TPDM with two totally different knowledge services, and extensively evaluated their performances on two real-world datasets. System analysis results have the contest in the measurability of TPDM within the context of enormous user base, particularly from computation and communication overheads. At last, we've got shown the practicable of introducing the semi-honest registration centre with elaborated theoretical analysis and substantial analysis. 7. REFERENCES [1] M. Barbara, T. Zeller, and S. Hansel, A Face is Exposed for AOL Searcher no. 4417749, New York, NY, USA: ny Times, Aug. 2006. [2] B.C.M. Fung, K. Wang, R. Chen, P. S. Yu, "Privacy- preserving knowledge publishing: A survey of recent developments", ACM computation Surveys, vol. 42, no. 4, pp. [3] G.Ghinita, P. Kalnis, Y. Tao, "Anonymous publication of sensitive transactional data1-53, Jun. 2010. [4] T.W. Chim, S. Yiu, L. C. K. Hui, V. O. K ZLi, "SPECS: Secure and privacy enhancing communicatiing scheme for VANETs", Ad Hoc Network, vol. 9, no. 2, pp. 189-203, 2011. ", IEEE dealings data knowledge Eng., vol. 23, no. 2, pp. 161-174, Feb. 2011. [5] Z. Erkin, T. Veugen, T. Toft, and R. L. Lagendijk, “Generating personal recommendations with efficiency exploitation similarity cryptography and knowledge packing”, IEEE dealings info Forensics Security, vol. 7, no. 3, pp. 1053–1066, Jun. 2012. [6] Z. Zheng, Y. Peng, F. Wu, S. Tang, and G. Chemm, “Trading data within the crowd : Profit-driven data acquisition for mobile crowd sensing ”, IEEE J. Sel. Areas Communication, vol. 35, no. 2, pp. 486– 501,Feb. 2017.