Skip to main content

k-Nearest

k-Nearest  Neighbor  Classification over Semantically  Secure Encrypted Relational Data


Abstract:

Data Mining has wide applications in many areas such as banking, medicine, scientific research and among government agencies. Classification is one of the commonly used tasks in data mining applications. For the past decade,due to the rise of various privacy issues, many theoretical and practical solutions to the classification problem have been proposed under different security models. However, with the recent popularity of cloud computing, users now have the opportunity to outsource their data, in encrypted form, as well as the data mining tasks to the cloud. Since the data on the cloud is in encrypted form, existing privacy preserving classification techniques are not applicable. In this paper, we focus on solving the classification problem over encrypted data. In particular, we propose a secure k-NN classifier over encrypted data in the cloud.

Existing System:
Ensuring the security of data is therefore critical not only to preserve the data’s of employees’ highly personal information, but also to minimize    the legal risk to the organization as a whole. When some organizations not view the full datails of the job seekers CV.so for we have to provide the security for this CV.  When an organization takes care of reduce the manual workload an organization performs, they choose to replace those processes with various levels of security   systems.
Disadvantage:
     Data leakage..data theft by third person, clustering is not efficient.

Proposed System:
we propose a secure k-NN classifier over encrypted data in the cloud. The proposed k-NN protocol protects the confidentiality of the data, user’s input query, and data access patterns. To the best of our knowledge, our work is the first to develop a secure k-NN classifier over encrypted data under the standard semi-honest model. Also, we empirically analyze the efficiency of our solution through various experiments.

Algorithums:
               1.k-means clustering algorithum
               2. ElGamal Algorithums

Implementation Modules:
1.     Privacy-Preserving Data Mining (PPDM)
2.     Query processing over encrypted data.
3.     Security Analysis of Privacy-Preserving Primitives under the Semi-Honest Model
4.     Security proof.


Privacy-Preserving Data Mining (PPDM):
Privacy Preserving Data Mining (PPDM) is defined as the process of extracting/deriving the knowledge about data without compromising the privacy of data. In the past decade, many privacy-preserving classification techniques have been proposed in the literature in order to protect user privacy.  The notion of privacy-preserving under data mining applications. In particular to privacy preserving classification, the goal is to build a classifier in order to predict the class label of input data record based on the distributed training dataset without compromising the privacy of data.

Query processing over encrypted data:
The intermediate k-nearest neighbors in the classification process, should not be disclosed to the cloud or any users. We emphasize that the recent method in [54] reveals the k-nearest neighbors to the user. Secondly, even if we know the k-nearest neighbors, it is still very difficult to find the majority class label among these neighbors since they are encrypted at the first place to prevent the cloud from learning sensitive information. Third, the existing work did not addressed the access pattern issue which is a crucial privacy requirement from the user’s perspective.

Security Analysis of Privacy-Preserving Primitives under the Semi-Honest Model:
Here we provide a formal security proof for the proposed PPkNN protocol under the semi-honest model. First of all,we stress that due to the encryption of q and by semantic security of the Paillier cryptosystem, Bob’s input query q is protected from Alice, C1 and C2 in our PPkNN protocol. Apart from guaranteeing query privacy, remember that thegoal of PPkNN is to protect data confidentiality and hide data access patterns.In this paper, to prove a protocol’s security under the semi-honest model, we adopted the well-known securitydefinitions from the literature of secure multiparty computation (SMC). More specifically, as mentioned . we adopt the security proofs based on the standard simulation paradigm . For presentation purpose, weprovide formal security proofs (under the semi-honest model) for Stages 1 and 2 of PPkNN separately. Note that theoutputs returned by each sub-protocol are in encrypted form and known only to C1.

Security proof:
Data Security is the keeping data protected from corruption and unauthorized access and focus behind data security is to ensure the  privacy while protecting personal or(business) corporate data. This paper will manage complexity  of CV data’s. Its have various process like employees develop their personal and organizational skills, knowledge, and abilities. Security is of great aspect when it comes to choosing a human resources management system, especially when it means keeping company(corporate) data and the privacy of employee records safe from hackers. It is essential for companies to choose a solution(decision) that utilizes a method of secure transmission such as SSL which encrypts the data as it transmits over the job portals. An important is security is hiding of users particular details. So avoid the theft of the job seekers(or)employees details.

System Specifictions:
Hardware Requirements:System                          -    Pentium –IV 2.4 GHz

  • Speed                                -    1.1 Ghz
  • RAM                                 -  256MB(min)
  • Hard Disk                          -   40 GB
  • Key Board                         -    Standard Windows Keyboard
  • Mouse                                -  Logitech
  • Monitor                              -    15 VGA Color.

Software Requirements:

v   Operating System              :Windows/XP/7.
v   Application  Server            :   Tomcat 5.0/6.0                                           
v   Front End                          :   HTML, Java, Jsp
v    Scripts                                :   JavaScript.
v   Server side Script             :   Java Server Pages.
v   Database                            :   MongoDB
v   Database Connectivity      :   Robomongo-0.8.5-i386.






Comments

Popular posts from this blog

PUNCHING MACHINE

ACCIDENT AVOIDING SYSTEM FOR PUNCHING MACHINE SYNOPSIS The aim of our project is to take a system-wide approach to preventing the machine accident. The system includes not just the machine and the operator; but rather, it includes everything from the initial design of the machine to the training of everyone that is responsible for any aspect of it, to the documentation of all changes, to regular safety audits and a finally a corporate culture of safety-first. Design is the part of a machine's life where the greatest impact can be made in relation to avoiding accidents. The designer should ensure that the machine is safe to set up and operate, safe to install, safe to maintain, safe to repair, and safe to decommission. Although safe operation is usually at the forefront of a designer's mind, safe maintenance and repair should also be a high priority. Around 50% of fatal accidents involving industrial equipment are associated with maintenance activities, and design...

garbage monitoring using arduino code with gsm

#include <SoftwareSerial.h> #include <LiquidCrystal.h> //LiquidCrystal lcd(7, 6, 5, 4, 3, 2); LiquidCrystal lcd(13, 12, 11, 10, 9, 8); SoftwareSerial mySerial(0,1); #define trigPin 2 #define echoPin 3 #define PIR_sensor 4 #define m11 5 #define m12 6 void setup() {    lcd.begin(16, 2);    lcd.print("    Garbage    ");    Serial.println("garbage ");   lcd.setCursor(0,1);   lcd.print("   Open Close    ");   Serial.println(" open close");   delay(3000);   lcd.clear();   //lcd.print(" ");   delay(2000); mySerial.begin(9600); // Setting the baud rate of GSM Module Serial.begin (9600); pinMode(trigPin, OUTPUT); pinMode(echoPin, INPUT);  pinMode(m11, OUTPUT);   pinMode(m12, OUTPUT);   } void loop() {  readPIR();  pingDist();  SendMessage(); } void pingDist ()   {     long duration, distance;...