FREE ELECTRONIC LIBRARY - Theses, dissertations, documentation

«Information Security in Big Data using Encryption and Decryption SHASHANK -PG Student II year MCA S.K.Saravanan, Assistant Professor (Sel.Gr) ...»

International Research Journal of Computer Science (IRJCS) ISSN: 2393-9842

Issue 5, Volume 2 (May 2015) www.irjcs.com

Information Security in Big Data using Encryption and


SHASHANK -PG Student II year MCA

S.K.Saravanan, Assistant Professor (Sel.Gr)

G.Rekha, Assistant Professor (Sen.Gr)

Department of Computer Applications, Valliammai Engineering College

SRM Nagar,Kattankulathur-603203


The growing popularity and development of data mining technologies bring serious threat to the security of individual's sensitive information. An emerging research topic in data mining, known as privacy preserving data mining (PPDM), has been extensively studied in recent years. The basic idea of PPDM is to modify the data in such a way so as to perform data mining algorithms effectively without compromising the security of sensitive information contained in the data.

Current studies of PPDM mainly focus on how to reduce the privacy risk brought by data mining operations, while in fact, unwanted disclosure of sensitive information may also happen in the process of data collecting, data publishing, and information (i.e., the data mining results) delivering. In this paper, we view the privacy issues related to data mining from a wider perspective and investigate various approaches that can help to protect sensitive information. In particular, we identify four different types of users involved in data mining applications, namely, data provider, data collector, data miner, and decision maker. For each type of user, we discuss his privacy concerns and the methods that can be adopted to protect sensitive information. We briefly introduce the basics of related research topics, review state-of-the-art approaches, and present some preliminary thoughts on future research directions. Besides exploring the privacy-preserving approaches for each type of user, we also review the game theoretical approaches, which are proposed for analyzing the interactions among different users in a data mining scenario, each of whom has his own valuation on the sensitive information. By differentiating the responsibilities of different users with respect to security of sensitive information, we would like to provide some useful insights into the study of PPDM.

INDEX TERMS Data mining, sensitive information, privacy-preserving data mining, anonymization, provenance, game theory, and privacy auction, anti-tracking.

1. INTRODUCTION Data mining has attracted more and more attention in recent years, probably because of the popularity of the ``big data'' concept. Data mining is the process of discovering interesting patterns and knowledge from large amounts of data. As a highly application-driven discipline, data mining has been successfully applied to many domains, such as business intelligence, Web search, scientific discovery, digital libraries, etc.

The term data mining'' is often treated as a synonym for another term ``knowledge discovery from data'' (KDD) which highlights the goal of the mining process. To obtain useful knowledge from data, the following steps are performed in an iterative

way (see Fig. 1.1):

–  –  –

 Data Provider: The user who owns some data that are desired by the data mining task.

 Data Collector: The users who collects data from data providers and then publish the data to the data miner.

 Data Miner: The user who perfo0rms data mining tasks on the data.

 Decision Maker: The user who makes decisions based on the data mining results in order to achieve certain goals.

The data that is provided by the user can be breached or can be get by other users of the database since there is less security in data base the data provided by the user is not safe and sensitive data is not fully secured we have to developed an application that encrypts the data and then stores the data in database so that other unauthorized user cannot get the data and does not know the data that is been hidden in the encrypted data.


PPDP mainly studies anonymization approaches for publishing useful data while preserving privacy. The original data is

assumed to be a private table consisting of multiple records. Each record consists of the following 4 types of attributes:

 Identifier (ID): Attributes that can directly and uniquely identify an individual, such as name, ID number and mobile number.

 Quasi-identifier (QID): Attributes that can be linked with external data to re-identify individual records, such as gender, age and zip code.

 Sensitive Attribute (SA): Attributes that an individual wants to conceal, such as disease and salary.

 Non-sensitive Attribute (NSA): Attributes other than ID, QID and SA.

Before being published to others, the table is anonym zed, that is, identifiers are removed and quasi-identifiers are modified. As a result, individual's identity and sensitive attribute values can be hidden from adversaries.

The standard security techniques in database management system, such as username and password or access control mechanisms, does not provide full security to the data that is been provided by the data provider.


 Security computations in distributed programming frameworks  Security best practices for non-relational data stores  Secure data storage and transactions logs  End-point input validation/filtering  Real-time security monitoring  Scalable and compostable privacy-preserving data mining and analytics  Granular access control  Granular audits  Data provenance

–  –  –

The first category considers that the adversary is able to identify the record of a target individual by linking the record to data from other sources, such as liking the record to a record in a published data table (called record linkage), to a sensitive attribute in a published data table (called attribute linkage), or to the published data table itself (called table linkage). The second category considers that the adversary has enough background knowledge to carry out a probabilistic attack, that is, the adversary is able to make a confident inference about whether the target's record exist in the table or which value the target's sensitive attribute would take. Typical privacy models. Includes k-anonymity (for preventing record linkage), l-diversity (for preventing record linkage and attribute linkage), t-closeness (for preventing attribute linkage and probabilistic attack), epsilon-differential privacy (for preventing table linkage and probabilistic attack), etc.

–  –  –


Encryption: a process of encoding a message so that it’s meaning is not obvious Decryption: the reverse process (encipher) vs. decode (decipher) Encoding: the process of translating entire words or phrases to other words or phrases Enciphering: translating letters or symbols individually Encryption: the group term that covers both encoding and enciphering P(plaintext): the original form of a message C(ciphertext): the encrypted form Basic operations plaintext to ciphertext: encryption: C = E(P) ciphertext to plaintext: decryption: P = D(C) requirement: P = D(E(P))

–  –  –

Presentation layer is the end user layer where the data collector will collect the data and enter the data into the system.

Business layer is the software where it is used as an end application layer used by the data collector.

Data Access layer is the layer where the data is been accessed from the database to the application layer.

SQL Database is the database where it is used to store the data it act as a data source.

FIGURE 4.2: SHA3 Encryption and decryption.

Encryption is the process of adding the key to the plain text and hiding the information stored and showing different kind of data.

Decryption is the reverse process of encryption removing the key that is added to the plain text. Plain text that is added with the key is called chipper text. Plain text is the original text where the data without the key added. In cryptography encryption is the process of encoding message or information in such a way that only authorized parties can read it. Encryption does not of itself prevent interception, but denies the message content to the interceptor. There are two types of encryption available they are symmetric key encryption and public key encryption.

–  –  –

Here we are going to create an application which will provide more security for the data in the database. I have used the SHA3 encryption and decryption algorithm for encrypt the data and then store it into the database.

–  –  –

The system implementation I have used VB.NET and SQL DATABASE software’s to handle the data. The user is provided two types of options to secure the data they are “ENCRYPTION” and “DECRYPTION” The user also provided more operation to manipulate the data available in the database they are ADD NEW, UPDATE, DELETE, EDIT, AND SEARCH. Thus this Application provides more security for the data and if any security breach occurs then the attacker will not get any data from the database. This application is less cost and easy to access the data.


–  –  –

A dynamic secret-based encryption scheme is designed to secure the data that is been stored in the database to reduce its complexity, the retransmission sequence is proposed to update dynamic encryption key, here we are using the SHA3 encryption and decryption algorithm. It provides more security to the data.

A demo system is developed to show the performance and security of SHA3 encryption and decryption algorithm. An application is been developed with the help of using the application VB.NET and SQL database. To implement the big data security we have taken the student database management system for the implement of encryption and decryption technique.

This application will provide many operations and flexibility of the data that is been stored in the data base. The user will have the permission for adding, deleting, editing, updating and searching of data. The data is encrypted and then stored in the database and in search operation the data is decrypted and then searched in the database. While adding new data the data is provided as a normal data by the user and the data is encrypted and then stored in the database.

If the user retrieve the data from the database the data is been decrypted and then shown to the end user. The user is also provided options to encrypt and decrypt the data.

–  –  –

[1] J. Han, M. Kamber, and J. Pei, Data Mining: Concepts and Techniques. San Mateo, CA, USA: Morgan Kaufmann, 2006.

[2] L. Brankovic and V. Estivill-Castro, ``Privacy issues in knowledge discovery and data mining,'' in Proc. Austral. Inst. Comput.

Ethics Conf., 1999, [3] R. Agrawal and R. Srikant, ``Privacy-preserving data mining,'' ACM SIGMOD Rec., vol. 29, no. 2, pp. 439_450, 2000.

[4] Y. Lindell and B. Pinkas, ``Privacy preserving data mining,'' in Advances in Cryptology. Berlin, Germany: Springer-Verlag, 2000, pp. 36_54 [5] C. C. Aggarwal and S. Y. Philip, A General Survey of Privacy- Preserving Data Mining Models and Algorithms. New York, NY, USA: Springer-Verlag, 2008.

–  –  –

Similar works:

«periodistas 21 periodistas 21 Periodistas 21 bitacoras.com Los telediarios de la era Julio Somoano no funcionan. El cambio en la línea editorial, la presencia permanente de miembros del gobierno con declaraciones Periodistas Serie decine21.com Periodistas Serie dirigida por Begoña Álvarez Rojas, Jesús Rodrigo, Daniel Écija, Felipe Pontón, protagonizada por Alicia Borrachero, Belén Rueda Journalists Killed in Brazil Committee to 10 Journalists Killed in Brazil/Motive Unconfirmed...»

«Unitrends Enterprise Backup 8.1  Deployment Guide for VMware version 2.06262015 • • • 2 • • • Copyright Copyright © 2015 Unitrends Incorporated. All rights reserved. Content in this publication is copyright material and may not be copied or duplicated in any form  without prior written permission from Unitrends, Inc (“Unitrends”). This information is subject to ...»

«Annual Financial Report Fiscal Years Ended September 30, 2014 and 2013 Annual Financial Report For the Fiscal Years Ended September 30, 2014 and 2013 Annual Financial Report Elected, Appointed and Principal Officials City Council Glen C. Robertson Mayor Jim Gerlt Mayor Pro Tem – District 4 Victor Hernandez Council Member – District 1 Floyd Price Council Member – District 2 Jeff Griffith Council Member – District 3 Karen Gibson Council Member – District 5 Latrelle Joy Council Member...»

«Distributional learning of vowel categories in infants and adults Distributional learning of vowel categories in infants and adults Karin Wanrooij The research described in this thesis was performed at the Amsterdam Center for Language and Communication (ACLC) of the University of Amsterdam. ISBN: 978-94-6259-489-0 NUR: 616 Author: Karin Wanrooij Cover design: Matthijs Wanrooij Printed by: Ipskamp Drukkers, Enschede, The Netherlands © Karin Wanrooij, 2015 All rights reserved. No part of this...»

«Available online at www.sciencedirect.com ScienceDirect Procedia Social and Behavioral Sciences 153 (2014) 298 – 307 AicQoL2014Kota Kinabalu AMER International Conference on Quality of Life The Pacific Sutera Hotel, Sutera Harbour, Kota Kinabalu, Sabah, Malaysia 4-5 January 2014 “Quality of Life in the Built & Natural Environment” Identity of Malay Garden Design to be Promoted as the Cultural Tourism Product in Malaysia Ahmad Zamil Zakaria*, Ismail Hafiz Salleh, Mohd Sabrizaa Abd Rashid...»

«RFP# DOE-SGA-2012-15 Renaissance Learning, Inc. Response Template Attachment # 3 Due: October 29, 2012 Page 1 of 34 Offeror Name: Renaissance Learning™, Inc. Proposed Assessment Name: STAR Reading Enterprise™ Content Area(s) and Grade Level(s) Assessed: Reading, grades 1–12 Section 1: Overview of Tests Requirement: 1.1 1.1 Describe the specific grade(s) and subject area(s) covered by each assessment and provide an overview of the content and skills measured. Include the types of test...»

«Pat Selinger Speaks Out on Why System R Was So Successful, Interactions with the INGRES and QBE Teams, How to Do Techology Transfer, How to Manage Difficult People, How to Mentor 3,000 People at Once, and More by Marianne Winslett Pat Selinger Welcome to this installment of ACM SIGMOD Record's series of interviews with influential members of the database community. I'm Marianne Winslett and today we’re in San Diego, site of the 2003 SIGMOD and PODS conference. I have here with me Pat...»

«Discussion Paper Addressing the Problem of Distracted Driving and its Impacts to Road Safety Ministry of Public Safety and Solicitor General Office of the Superintendent of Motor Vehicles PSSG09‐009  TABLE OF CONTENTS Table of Contents Executive Summary Background and Context A Note About Scope The Problem Perception Failure with Respect to the Law of Large Numbers Research Overview New and Young Drivers Costs of Driver Distraction Inter-jurisdictional Approaches Other Supporting Measures to...»

«Mellonta Tauta Edgar Allan Poe Author : Short Stories Category : Larcon_2 October 2009 Submit by : Read this on Full Online Books Link : www.fullonlinebooks.com Source : TO THE EDITORS OF THE LADY'S BOOK: I have the honor of sending you, for your magazine, an article which I hope you will be able to comprehend rather more distinctly than I do myself. It is a translation, by my friend, Martin Van Buren Mavis, (sometimes called the Poughkeepsie Seer) of an odd-looking MS. which I found, about a...»

«Papers on Social Representations Volume 25, Issue 1, pages 2.1-2.23 (2016) Peer Reviewed Online Journal ISSN 1021-5573 © 2016 The Authors [http://www.psych.lse.ac.uk/psr/] Understanding Responses To A UK High-Voltage Powerline Proposal: The Role Of Place And Project-Based Social Representations ETIENNE BAILEY1, PATRICK DEVINE-WRIGHT1, SUSANA BATEL2 University Of Exeter, Exeter, United Kingdom Instituto Universitário De Lisboa (ISCTE-IUL), Cis-IUL, Lisboa, Portugal ABSTRACT In going beyond the...»

«ATLANTIS Journal of the Spanish Association of Anglo-American Studies 36.1 ( June 2014): 123-37 issn 0210-6124 Essentialism in Children’s Literature: The Emergence of Retrogressive Discourses in post9/11 Picture Books Agustín Reyes-Torres Universitat de València agustin.reyes@uv.es Immediately following the 9/11 attacks, a number of picture books for children were published as a response to the new socio-political context in the United States. This article explores how these books...»

«Allied Academies International Conference Maui, Hawaii October 14-17, 1997 Academy of Free Enterprise Education Proceedings Affiliates Journals International Academy for Case Studies Journal of the International Academy for Case Studies Academy of Entrepreneurship Academy of Entrepreneurship Journal and the Entrepreneurial Executive Academy of Accounting and Financial Studies Academy of Accounting and Financial Studies Journal Academy of Managerial Communications Academy of Managerial...»

<<  HOME   |    CONTACTS
2016 www.theses.xlibx.info - Theses, dissertations, documentation

Materials of this site are available for review, all rights belong to their respective owners.
If you do not agree with the fact that your material is placed on this site, please, email us, we will within 1-2 business days delete him.