Proposed Approach to Sensitive Association Rules Protection based on Compressing and Cryptography: (SARP-CC)

Privacy-preserving data mining is a modern technology that has been studied by many researchers. There are two types of Privacy-preserving association rules regarding the type of sensitive dataset to be protected, either protect the raw data before performing the data mining process or protect the sensitive knowledge extracted after performing the data mining process. In this research, we will suggest a technique called (SARP-CC) for privacy-preserving data mining. It will be used to protect sensitive knowledge (sensitive association rules) by changing the representation of knowledge from its known form to another, where it is more compressed and encrypted so that it can be sent over a network. The results show that this new compressed and encrypted form reduces storage space and transmission time and facilitates the transmission process over the network, and very beneficial especially for insecure networks. It can also be used as part of secure distributed association rules mining algorithms.

[1]  M.Saravanan Privacy Preserving and Enhancing Security in Association Rule Mining using Robfrugal Algorithm , 2018 .

[2]  Sattar B. Sadkhan,et al.  Security Evaluation of Cryptosystems based on Orthogonal Transformation , 2020, 2020 6th International Engineering Conference “Sustainable Technology and Development" (IEC).

[3]  Jifu Zhang,et al.  FiDoop: Parallel Mining of Frequent Itemsets Using MapReduce , 2016, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[4]  Privacy Preserving Data Mining using Secure Multiparty Computation Based on Apriori and Fp-Tree Structure of Fp-Growth Algorithm , 2020 .

[5]  Enaas M Hussein,et al.  Encryption of Association Rules Using Modified Dynamic Mapping and Modified (AES) Algorithm , 2019, 2019 First International Conference of Computer and Applied Sciences (CAS).

[6]  P. Santhi Thilagam,et al.  Hierarchical Homomorphic Encryption Based Privacy Preserving Distributed Association Rule Mining , 2014, 2014 International Conference on Information Technology.

[7]  Ansari Saleh Ahmar,et al.  Secure a Transaction Activity with Base64 Algorithm and Word Auto Key Encryption Algorithm , 2018 .

[8]  Rana Saad Mohammed,et al.  A novel technique of privacy preserving association rule mining , 2016, 2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA).

[9]  Zahid Anwar,et al.  Data mining techniques and applications — A decade review , 2017, 2017 23rd International Conference on Automation and Computing (ICAC).

[10]  Lili Yu,et al.  The Application of Hybrid Encryption Algorithm in Software Security , 2013, 2012 Fourth International Conference on Computational Intelligence and Communication Networks.

[11]  Ahmed Z. Emam,et al.  Comprehensive Survey on Privacy Preserving Association Rule Mining: Models, Approaches, Techniques and Algorithms , 2014, Int. J. Artif. Intell. Tools.

[12]  Sattar B. Sadkhan,et al.  Security evaluation of cryptosystems used in cloud networks , 2016, 2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA).

[13]  Udai Pratap Rao,et al.  Privacy-preserving association rule mining for horizontally partitioned healthcare data: a case study on the heart diseases , 2018, Sādhanā.

[14]  Udai Pratap Rao,et al.  Privacy Preserving Distributed Association Rule Mining Approach on Vertically Partitioned Healthcare Data , 2019, Procedia Computer Science.

[15]  Heri Nurdiyanto,et al.  Symmetric Stream Cipher using Triple Transposition Key Method and Base64 Algorithm for Security Improvement , 2017 .

[16]  Sandeep Varma,et al.  Secure Outsourced Association Rule Mining using Homomorphic Encryption , 2017 .

[17]  Sattar B. Sadkhan,et al.  A proposed identification method for multi-user chirp spread spectrum signals based on adaptive Neural-Fuzzy Inference System (ANFIS) , 2016, 2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA).

[18]  J. Shana,et al.  A Cryptography Based Privacy Preserving Association Rule Mining in Academic Analytics , 2015 .

[19]  Eng. Sattar B. Sadkhan A Comparative Analysis of Different BSS Algorithms Based on Neural Network , 2012 .

[20]  Sattar B. Sadkhan,et al.  Image Quality Assessment by Combining Fuzzy Similarity Measures using Neural Network , 2011 .

[21]  Kevin Fiscus Base64 Can Get You Pwned , 2019 .

[22]  Geeta S. Navale,et al.  Survey on Privacy Preserving Association Rule Data Mining , 2017, Int. J. Rough Sets Data Anal..

[23]  Gurpreet Singh,et al.  Modified Vigenere Encryption Algorithm and Its Hybrid Implementation with Base64 and AES , 2013, 2013 2nd International Conference on Advanced Computing, Networking and Security.

[24]  Lili Yu,et al.  The application of hybrid encryption algorithm in software security , 2013, 2013 3rd International Conference on Consumer Electronics, Communications and Networks.

[25]  Bipin B. Shinde,et al.  Privacy Preserving Data Mining Using Association Rule With Condensation Approach , 2014 .

[26]  Yongfeng Huang,et al.  An improved parallel association rules algorithm based on MapReduce framework for big data , 2014, 2014 11th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD).

[27]  Sattar B. Sadkhan,et al.  A Proposed Implementation of Raptor Code using a Microcontroller , 2019, 2019 First International Conference of Computer and Applied Sciences (CAS).