Implementation of Efficient Privacy Preserving Data Analysis for Secure Data Transmission
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Downloads: 109

Review Papers | Computer Science & Engineering | India | Volume 4 Issue 10, October 2015

Implementation of Efficient Privacy Preserving Data Analysis for Secure Data Transmission

Shital Gawahale, Rekha Jadhav

Privacy preserving is one of the most important research topics in the data security field and it has become a serious concern in the secure transformation of personal data in recent years. For example, different credit card companies and disease control centers may try to build better data sharing or publishing models for privacy protection through privacy preserving data mining techniques (PPDM). A model has been proposed to design the effective Privacy Preserving Mining Framework for secure private information transformation and Publishing. The system considers a distributed database such as bank database that is used to construct the incentive model. Basically incentive data are used to check the user knowledge that is the online processing user is correct person or not. Incentive Compatible Model based secure code computation process and PPDM techniques like Association rule mining, Randomization method and Cryptographic technique. An Encryption algorithm is used to identify which data sets need to be encrypted for preserving privacy in data storage publishing. Secure multi-party computation (SMC) has recently emerged as an answer to this problem but SMC model they had generate only one key for the each card and after some extent time there may be chance of hacking the password by the hackers. To overcome the above said problem in our proposed system we are using symmetric key cipher algorithm to increase the security measures. In this system it will encrypt the security code so if any hacker check for the key it will be in encrypted format so no one can hack the password. And to send the keys to the mail we are using Java Mail API directly to communicate with the Gmail server.

Keywords: PPDA, PPDM, SMC, TTP

Edition: Volume 4 Issue 10, October 2015

Pages: 2084 - 2088

Share this Article

How to Cite this Article?

Shital Gawahale, Rekha Jadhav, "Implementation of Efficient Privacy Preserving Data Analysis for Secure Data Transmission", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB158041, Volume 4 Issue 10, October 2015, 2084 - 2088

Enter Your Email Address




Similar Articles with Keyword 'PPDM'

Downloads: 109

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 2084 - 2088

Implementation of Efficient Privacy Preserving Data Analysis for Secure Data Transmission

Shital Gawahale, Rekha Jadhav

Share this Article

Downloads: 111

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 700 - 702

Privacy-Preserving Two-Party Distributed Association Rules Mining on Horizontally Partitioned Data

Patil Suraj Kakaso, Gadage Shriniwas

Share this Article

Downloads: 114

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2234 - 2236

A Survey on Privacy-Preserving Mining of Association Rule on Databases

Asavari G.Smart, P. M. Mane

Share this Article

Downloads: 119

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 149 - 152

Analysis and Design of Secured Privacy Data Mining Environment

Gundapaneni Murali, Punugoti Pavan Kumar

Share this Article

Downloads: 127

Review Papers, Computer Science & Engineering, India, Volume 2 Issue 2, February 2013

Pages: 186 - 190

Preserving Privacy Technique for Knowledge Discovery

Darshan.B. Patel, Dheeraj Kumar Singh

Share this Article

Similar Articles with Keyword 'SMC'

Downloads: 109

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 2084 - 2088

Implementation of Efficient Privacy Preserving Data Analysis for Secure Data Transmission

Shital Gawahale, Rekha Jadhav

Share this Article

Downloads: 115

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 2347 - 2353

A Novel Approach of Distributed Cooperative Caching in Social Wireless Networks

A. Kalyankumar, K. V. Srinivasa Rao

Share this Article

Similar Articles with Keyword 'TTP'

Downloads: 99 | Weekly Hits: ⮙2 | Monthly Hits: ⮙11

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 878 - 881

Detection of Malicious Client based HTTP/DoS Attack on Web Server

Dhanya Jayan, Pretty Babu

Share this Article

Downloads: 103 | Weekly Hits: ⮙2 | Monthly Hits: ⮙9

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1628 - 1631

A Survey On XML-Injection Attack Detection Systems

Swati Ramesh Kesharwani, Aarti Deshpande

Share this Article

Downloads: 104 | Monthly Hits: ⮙1

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2982 - 2984

Protection of Server from Proxy Based HTTP Attacks

Poonam Uttam Patil, Y. V. Chavan

Share this Article

Downloads: 107

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1887 - 1991

Analysis of Application Level Traffics and Routing Protocols in Mobile Ad Hoc Network

Rawendra Pratap Singh, Savita Shiwani

Share this Article

Downloads: 107

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1948 - 1954

A New Security Business Frame work for Resource Attestation in cloud Environment

Vallabhaneni. Hema Latha, Kolluru. Suresh Babu

Share this Article



Top