Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/365761
Title: | Design of Secure Multi Party Computational Protocols for Classification Rule Mining |
Researcher: | Gangrade, Alka |
Guide(s): | Patel, Ravindra |
Keywords: | Computer Science Computer Science Information Systems Engineering and Technology |
University: | Rajiv Gandhi Proudyogiki Vishwavidyalaya |
Completed Date: | 2013 |
Abstract: | Use of technology for data collection and analysis has seen an amazing growth in the last couple of decades. Nowadays privacy is becoming an increasingly important issue in many data mining applications. The data mining community has responded to this challenge by developing a new breed of algorithms that are privacy preserving. Specifically, cryptographic techniques outline the set of privacy preserving data mining algorithms for distributed computation environments. However, these algorithms require all parties in the distributed system to follow a massive privacy model and also make strong assumptions about the behavior of participating parties. These conditions do not necessarily hold true in practice. Therefore, most of the existing work in privacy preserving distributed data mining fails to serve the purpose when applied to real-world distributed data mining applications. In this thesis, the novel protocols have been developed for privacy preserving classification rule mining in a distributed data environment. The protocols allow parties to perform mining at their own sites, and transfer their intermediate results only. In this thesis, some Secure Multi-Party Computational (SMC) protocols are provided to protect the privacy of participating parties while still allowing users to mine useful trends and knowledge. Since the developed protocols are not required to transfer actual data, so the protocols are time efficient, memory efficient, secure and real-world adaptable. newlineIn this thesis, SMC protocols designed for privacy preserving classification rule mining in distributed environment are based on ID3 and Naïve Bayes classification algorithm. In the development of SMC protocols, two assumptions are made. In first, all participating parties communicate their intermediate results to each other and in second, all participating parties communicate their intermediate results to Un-trusted Third Party (UTP). |
Pagination: | 4.08MB |
URI: | http://hdl.handle.net/10603/365761 |
Appears in Departments: | Department of Computer Applications |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01 _ title.pdf | Attached File | 47.47 kB | Adobe PDF | View/Open |
03 table of contents.pdf | 38.53 kB | Adobe PDF | View/Open | |
04 _list of tables.pdf | 153.66 kB | Adobe PDF | View/Open | |
05 _ list of figures.pdf | 155.96 kB | Adobe PDF | View/Open | |
06 _ acknowledgements.pdf | 127.15 kB | Adobe PDF | View/Open | |
07_ chapter 1.pdf | 378.06 kB | Adobe PDF | View/Open | |
08 _ chapter 2.pdf | 331.44 kB | Adobe PDF | View/Open | |
09 _ chapter 3.pdf | 888.21 kB | Adobe PDF | View/Open | |
10 _ a chapter 5.pdf | 239.68 kB | Adobe PDF | View/Open | |
10 _ chapter 4.pdf | 521.4 kB | Adobe PDF | View/Open | |
11 _ references.pdf | 166.79 kB | Adobe PDF | View/Open | |
12 _ list of publications.pdf | 130.04 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 7.52 kB | Adobe PDF | View/Open | |
abstract.pdf | 7.52 kB | Adobe PDF | View/Open | |
certificate and declaration.pdf | 792.74 kB | Adobe PDF | View/Open | |
_ glossary.pdf | 129.14 kB | Adobe PDF | View/Open | |
list of abbreviation.pdf | 15.8 kB | Adobe PDF | View/Open | |
preliminary page.pdf | 47.47 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: