Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/365761
Title: Design of Secure Multi Party Computational Protocols for Classification Rule Mining
Researcher: Gangrade, Alka
Guide(s): Patel, Ravindra
Keywords: Computer Science
Computer Science Information Systems
Engineering and Technology
University: Rajiv Gandhi Proudyogiki Vishwavidyalaya
Completed Date: 2013
Abstract: Use of technology for data collection and analysis has seen an amazing growth in the last couple of decades. Nowadays privacy is becoming an increasingly important issue in many data mining applications. The data mining community has responded to this challenge by developing a new breed of algorithms that are privacy preserving. Specifically, cryptographic techniques outline the set of privacy preserving data mining algorithms for distributed computation environments. However, these algorithms require all parties in the distributed system to follow a massive privacy model and also make strong assumptions about the behavior of participating parties. These conditions do not necessarily hold true in practice. Therefore, most of the existing work in privacy preserving distributed data mining fails to serve the purpose when applied to real-world distributed data mining applications. In this thesis, the novel protocols have been developed for privacy preserving classification rule mining in a distributed data environment. The protocols allow parties to perform mining at their own sites, and transfer their intermediate results only. In this thesis, some Secure Multi-Party Computational (SMC) protocols are provided to protect the privacy of participating parties while still allowing users to mine useful trends and knowledge. Since the developed protocols are not required to transfer actual data, so the protocols are time efficient, memory efficient, secure and real-world adaptable. newlineIn this thesis, SMC protocols designed for privacy preserving classification rule mining in distributed environment are based on ID3 and Naïve Bayes classification algorithm. In the development of SMC protocols, two assumptions are made. In first, all participating parties communicate their intermediate results to each other and in second, all participating parties communicate their intermediate results to Un-trusted Third Party (UTP).
Pagination: 4.08MB
URI: http://hdl.handle.net/10603/365761
Appears in Departments:Department of Computer Applications

Files in This Item:
File Description SizeFormat 
01 _ title.pdfAttached File47.47 kBAdobe PDFView/Open
03 table of contents.pdf38.53 kBAdobe PDFView/Open
04 _list of tables.pdf153.66 kBAdobe PDFView/Open
05 _ list of figures.pdf155.96 kBAdobe PDFView/Open
06 _ acknowledgements.pdf127.15 kBAdobe PDFView/Open
07_ chapter 1.pdf378.06 kBAdobe PDFView/Open
08 _ chapter 2.pdf331.44 kBAdobe PDFView/Open
09 _ chapter 3.pdf888.21 kBAdobe PDFView/Open
10 _ a chapter 5.pdf239.68 kBAdobe PDFView/Open
10 _ chapter 4.pdf521.4 kBAdobe PDFView/Open
11 _ references.pdf166.79 kBAdobe PDFView/Open
12 _ list of publications.pdf130.04 kBAdobe PDFView/Open
80_recommendation.pdf7.52 kBAdobe PDFView/Open
abstract.pdf7.52 kBAdobe PDFView/Open
certificate and declaration.pdf792.74 kBAdobe PDFView/Open
_ glossary.pdf129.14 kBAdobe PDFView/Open
list of abbreviation.pdf15.8 kBAdobe PDFView/Open
preliminary page.pdf47.47 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: