Skip to main content

k-Nearest

k-Nearest  Neighbor  Classification over Semantically  Secure Encrypted Relational Data


Abstract:

Data Mining has wide applications in many areas such as banking, medicine, scientific research and among government agencies. Classification is one of the commonly used tasks in data mining applications. For the past decade,due to the rise of various privacy issues, many theoretical and practical solutions to the classification problem have been proposed under different security models. However, with the recent popularity of cloud computing, users now have the opportunity to outsource their data, in encrypted form, as well as the data mining tasks to the cloud. Since the data on the cloud is in encrypted form, existing privacy preserving classification techniques are not applicable. In this paper, we focus on solving the classification problem over encrypted data. In particular, we propose a secure k-NN classifier over encrypted data in the cloud.

Existing System:
Ensuring the security of data is therefore critical not only to preserve the data’s of employees’ highly personal information, but also to minimize    the legal risk to the organization as a whole. When some organizations not view the full datails of the job seekers CV.so for we have to provide the security for this CV.  When an organization takes care of reduce the manual workload an organization performs, they choose to replace those processes with various levels of security   systems.
Disadvantage:
     Data leakage..data theft by third person, clustering is not efficient.

Proposed System:
we propose a secure k-NN classifier over encrypted data in the cloud. The proposed k-NN protocol protects the confidentiality of the data, user’s input query, and data access patterns. To the best of our knowledge, our work is the first to develop a secure k-NN classifier over encrypted data under the standard semi-honest model. Also, we empirically analyze the efficiency of our solution through various experiments.

Algorithums:
               1.k-means clustering algorithum
               2. ElGamal Algorithums

Implementation Modules:
1.     Privacy-Preserving Data Mining (PPDM)
2.     Query processing over encrypted data.
3.     Security Analysis of Privacy-Preserving Primitives under the Semi-Honest Model
4.     Security proof.


Privacy-Preserving Data Mining (PPDM):
Privacy Preserving Data Mining (PPDM) is defined as the process of extracting/deriving the knowledge about data without compromising the privacy of data. In the past decade, many privacy-preserving classification techniques have been proposed in the literature in order to protect user privacy.  The notion of privacy-preserving under data mining applications. In particular to privacy preserving classification, the goal is to build a classifier in order to predict the class label of input data record based on the distributed training dataset without compromising the privacy of data.

Query processing over encrypted data:
The intermediate k-nearest neighbors in the classification process, should not be disclosed to the cloud or any users. We emphasize that the recent method in [54] reveals the k-nearest neighbors to the user. Secondly, even if we know the k-nearest neighbors, it is still very difficult to find the majority class label among these neighbors since they are encrypted at the first place to prevent the cloud from learning sensitive information. Third, the existing work did not addressed the access pattern issue which is a crucial privacy requirement from the user’s perspective.

Security Analysis of Privacy-Preserving Primitives under the Semi-Honest Model:
Here we provide a formal security proof for the proposed PPkNN protocol under the semi-honest model. First of all,we stress that due to the encryption of q and by semantic security of the Paillier cryptosystem, Bob’s input query q is protected from Alice, C1 and C2 in our PPkNN protocol. Apart from guaranteeing query privacy, remember that thegoal of PPkNN is to protect data confidentiality and hide data access patterns.In this paper, to prove a protocol’s security under the semi-honest model, we adopted the well-known securitydefinitions from the literature of secure multiparty computation (SMC). More specifically, as mentioned . we adopt the security proofs based on the standard simulation paradigm . For presentation purpose, weprovide formal security proofs (under the semi-honest model) for Stages 1 and 2 of PPkNN separately. Note that theoutputs returned by each sub-protocol are in encrypted form and known only to C1.

Security proof:
Data Security is the keeping data protected from corruption and unauthorized access and focus behind data security is to ensure the  privacy while protecting personal or(business) corporate data. This paper will manage complexity  of CV data’s. Its have various process like employees develop their personal and organizational skills, knowledge, and abilities. Security is of great aspect when it comes to choosing a human resources management system, especially when it means keeping company(corporate) data and the privacy of employee records safe from hackers. It is essential for companies to choose a solution(decision) that utilizes a method of secure transmission such as SSL which encrypts the data as it transmits over the job portals. An important is security is hiding of users particular details. So avoid the theft of the job seekers(or)employees details.

System Specifictions:
Hardware Requirements:System                          -    Pentium –IV 2.4 GHz

  • Speed                                -    1.1 Ghz
  • RAM                                 -  256MB(min)
  • Hard Disk                          -   40 GB
  • Key Board                         -    Standard Windows Keyboard
  • Mouse                                -  Logitech
  • Monitor                              -    15 VGA Color.

Software Requirements:

v   Operating System              :Windows/XP/7.
v   Application  Server            :   Tomcat 5.0/6.0                                           
v   Front End                          :   HTML, Java, Jsp
v    Scripts                                :   JavaScript.
v   Server side Script             :   Java Server Pages.
v   Database                            :   MongoDB
v   Database Connectivity      :   Robomongo-0.8.5-i386.






Comments

Popular posts from this blog

IDENTITY-BASED PROXY-ORIENTED DATA UPLOADING AND REMOTE DATA INTEGRITY CHECKING IN PUBLIC CLOUD report

IDENTITY-BASED PROXY-ORIENTED DATA UPLOADING AND REMOTE DATA INTEGRITY CHECKING IN PUBLIC CLOUD ABSTRACT More and more clients would like to store their data to PCS (public cloud servers) along with the rapid development of cloud computing. New security problems have to be solved in order to help more clients process their data in public cloud. When the client is restricted to access PCS, he will delegate its proxy to process his data and upload them. On the other hand, remote data integrity checking is also an important security problem in public cloud storage. It makes the clients check whether their outsourced data is kept intact without downloading the whole data. From the security problems, we propose a novel proxy-oriented data uploading and remote data integrity checking model in identity-based public key cryptography: IDPUIC (identity-based proxy-oriented data uploading and remote data integrity checking in public cloud). We give the formal definition, system model and se...

A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM

A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM ABSTRACT Authentication based on passwords is used largely in applications for computer security and privacy. However, human actions such as choosing bad passwords and inputting passwords in an insecure way are regarded as”the weakest link” in the authentication chain. Rather than arbitrary alphanumeric strings, users tend to choose passwords either short or meaningful for easy memorization. With web applications and mobile apps piling up, people can access these applications anytime and anywhere with various devices. This evolution brings great convenience but also increases the probability of exposing passwords to shoulder surfing attacks. Attackers can observe directly or use external recording devices to collect users’ credentials. To overcome this problem, we proposed a novel authentication system PassMatrix, based on graphical passwords to resist shoulder surfing attacks. With a one-time valid login indicator and ...

garbage monitoring using arduino code with gsm

#include <SoftwareSerial.h> #include <LiquidCrystal.h> //LiquidCrystal lcd(7, 6, 5, 4, 3, 2); LiquidCrystal lcd(13, 12, 11, 10, 9, 8); SoftwareSerial mySerial(0,1); #define trigPin 2 #define echoPin 3 #define PIR_sensor 4 #define m11 5 #define m12 6 void setup() {    lcd.begin(16, 2);    lcd.print("    Garbage    ");    Serial.println("garbage ");   lcd.setCursor(0,1);   lcd.print("   Open Close    ");   Serial.println(" open close");   delay(3000);   lcd.clear();   //lcd.print(" ");   delay(2000); mySerial.begin(9600); // Setting the baud rate of GSM Module Serial.begin (9600); pinMode(trigPin, OUTPUT); pinMode(echoPin, INPUT);  pinMode(m11, OUTPUT);   pinMode(m12, OUTPUT);   } void loop() {  readPIR();  pingDist();  SendMessage(); } void pingDist ()   {     long duration, distance;...