Techniques which are already existing are not
having the high clustering to the encrypted data on cloud,
therefore, to solve the classification problem on encrypted
data. A k-NN algorithm for classification of encrypted data
in the cloud, is also proposed for security purpose. In this
paper we proposed the the new DBSCAN algorithm which
will provide the better clustering than the K-NN clustering of
the data on the cloud, provides In day by day the popularity
of web services are attracting with their rapid development,
As a result, there is a huge amount of heterogeneous data.
The data needs to be mine for various applications in many
organizations like scientific research, medicine and among
government agencies. Data Mining is perspective is on a very
large scale. Classification of outsourced data is One of the
most important tasks in data mining applications. So in data
mining area many practical as well as theoretical solutions to
the classification problem have been proposed. As as a
privacy issues solution, Different security models used in
different solutions. The recent needs of IT make Cloud
Computing to exist. Always users can outsource encrypted
form of their data in and the data mining tasks to the cloud.
Privacy preserving classification security to user’s input
query and hiding the data accessing patterns on the cloud. As
well as it will provide better clustering solution for the
outsourced data.
Published In:IJCSN Journal Volume 5, Issue 4
Date of Publication : August 2016
Pages : 594-598
Figures :--
Tables : --
Chaitali Shewale : Computer Department, ZCOER
SPI Pune University
Pune, India
S.M. Sangve : Computer Department, ZCOER
SPI Pune University
Pune, India
This paper presents various existing methods from
different papers used for the privacy preserving query
processing in data mining and over encrypted data can
mention as (PPDM). To protect user data privacy, with
the discussion of various proposals of privacy-preserving
classification techniques are presented over the past
papers. The existing techniques are applicable to
outsourced database environments where the data resides
in encrypted form on a third-party server and also the
classification or clustering of the data with proper label is
discussed here This paper proposed a new privacypreserving
clustering protocol DBSCAN is used over
encrypted data of the cloud. This protocol protects the
confidentiality of the data, as a user’s input query, and
hides the data access patterns. As well as provide fast
access to data as better clustering is done using DBSCAN
algorithm.
[1] M. Kantarcioglu and C. Clifton, “Privately computing
a distributed k-nn classifier,” in PKDD, pp. 279–290,
2004.
[2] S. De Capitani di Vimercati, S. Foresti, and P.
Samarati, “Managing and accessing data in the cloud:
Privacy risks and approaches,” in CRiSIS, pp. 1 –9,
2012.
[3] P. Williams, R. Sion, and B. Carbunar, “Building
castles out of mud: practical access pattern privacy and
correctness on untrusted storage,” in ACM CCS, pp.
139–148, 2008.
[4] Y. Qi and M. J. Atallah, “Efficient privacy-preserving
k-nearest neighbor search,” in IEEE ICDCS, pp. 311–
319, 2008.
[5] C. Gentry and S. Halevi, “Implementing gentry’s
fullyhomomorphic encryption scheme,” in
EUROCRYPT, pp. 129–148, Springer, 2011.
[6] A. Shamir, “How to share a secret,” Commun. ACM,
vol. 22, pp. 612–613, Nov. 1979.
[7] D. Bogdanov, S. Laur, and J. Willemson, “Sharemind:
A framework for fast privacy-preserving
computations,” in ESORICS, pp. 192–206, Springer,
2008.
[8] R. Agrawal and R. Srikant, “Privacy-preserving data
mining,” in ACM Sigmod Record, vol. 29, pp. 439–
450, ACM, 2000.
[9] L. Xiong, S. Chitti, and L. Liu, “K nearest neighbor
classification across multiple private databases,” in
CIKM, pp. 840–841, ACM, 2006.
[10] P. Zhang, Y. Tong, S. Tang, and D. Yang, “Privacy
preserving naive bayes classification,” ADMA, pp.
744–752, 2005.
[11] Martin Ester, Hans-Peter Kriegel, Jörg Sander and
Xiaowei Xu, “ A Density-Based Algorithm for
Discovering Clusters in Large Spatial Databases with
Noise”, The Second International Conference on
Knowledge Discovery and Data Mining (KDD-96),
Portland, Oregon, USA, 1996
[12] R. J. Bayardo and R. Agrawal, “Data privacy through
optimal k-anonymization,” in IEEE ICDE, pp. 217–
228, 2005.
[13] H. Hu, J. Xu, C. Ren, and B. Choi, “Processing private
queries over untrusted data cloud through privacy
homomorphism,” in IEEE ICDE, pp. 601–612, 2011.
[14] R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu, “Order
preserving encryption for numeric data,” in ACM
SIGMOD, pp. 563–574, 2004.
[15] B. Hore, S. Mehrotra, M. Canim, and M. Kantarcioglu,
“Secure multidimensional range queries over
outsourced data,” The VLDB Journal, vol. 21, no. 3,
pp. 333–358, 2012.
[16] W. K. Wong, D. W.-l. Cheung, B. Kao, and N.
Mamoulis, “Secure knn computation on encrypted
databases,” in ACM SIGMOD, pp. 139–152, 2009.
[17] X. Xiao, F. Li, and B. Yao, “Secure nearest neighbor
revisited,” in IEEE ICDE, pp. 733–744, 2013.
[18] Y. Elmehdwi, B. K. Samanthula, and W. Jiang,
“Secure k- nearest neighbor query over encrypted data
in outsourced environments,” in IEEE ICDE, pp. 664–
675, 2014.