Secure Data Mining in Cloud using Homomorphic Encryption

被引:0
|
作者
Mittal, Deepti [1 ]
Kaur, Damandeep [1 ]
Aggarwal, Ashish [1 ]
机构
[1] Thapar Univ, Comp Sci Engn Dept, Patiala 147001, Punjab, India
关键词
cloud computing; Security; k-means; data mining; encryption;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the advancement in technology, industry, e-commerce and research a large amount of complex and pervasive digital data is being generated which is increasing at an exponential rate and often termed as big data. Traditional Data Storage systems are not able to handle Big Data and also analyzing the Big Data becomes a challenge and thus it cannot be handled by traditional analytic tools. Cloud Computing can resolve the problem of handling, storage and analyzing the Big Data as it distributes the big data within the cloudlets. No doubt, Cloud Computing is the best answer available to the problem of Big Data storage and its analyses but having said that, there is always a potential risk to the security of Big Data storage in Cloud Computing, which needs to be addressed. Data Privacy is one of the major issues while storing the Big Data in a Cloud environment. Data Mining based attacks, a major threat to the data, allows an adversary or an unauthorized user to infer valuable and sensitive information by analyzing the results generated from computation performed on the raw data. This thesis proposes a secure k-means data mining approach assuming the data to be distributed among different hosts preserving the privacy of the data. The approach is able to maintain the correctness and validity of the existing k-means to generate the final results even in the distributed environment.
引用
收藏
页码:155 / 160
页数:6
相关论文
共 50 条
  • [21] Homomorphic Encryption for Secure Information Retrieval from the Cloud
    Anand, V.
    Satapathy, Suresh Chandra
    [J]. FIRST INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN ENGINEERING, TECHNOLOGY AND SCIENCE - ICETETS 2016, 2016,
  • [22] Secure cloud computing based on threshold homomorphic encryption
    Varnovskiy, N. P.
    Martishin, S. A.
    Khrapchenko, M. V.
    Shokurov, A. V.
    [J]. PROGRAMMING AND COMPUTER SOFTWARE, 2015, 41 (04) : 215 - 218
  • [23] Secure cloud computing based on threshold homomorphic encryption
    N. P. Varnovskiy
    S. A. Martishin
    M. V. Khrapchenko
    A. V. Shokurov
    [J]. Programming and Computer Software, 2015, 41 : 215 - 218
  • [24] Making cloud computing more secure: Homomorphic encryption
    Naone, Erica
    [J]. Technology Review, 2011, 114 (03) : 50 - 51
  • [25] Homomorphic Encryption for Security of Cloud Data
    Potey, Manish M.
    Dhote, C. A.
    Sharma, Deepak H.
    [J]. PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING AND VIRTUALIZATION (ICCCV) 2016, 2016, 79 : 175 - 181
  • [26] A Secure Processor Using Homomorphic Encryption
    Echandouri, Bouchra
    Gahi, Youssef
    Guennoun, Mouhcine
    Omary, Fouzia
    [J]. Networked Systems, NETYS 2016, 2016, 9944 : 376 - 376
  • [27] Secure and efficient online data storage and sharing over cloud environment using probabilistic with homomorphic encryption
    Jayapandian, N.
    Rahman, A. M. J. Md. Zubair
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2017, 20 (02): : 1561 - 1573
  • [28] Secure Optimal k-NN on Encrypted Cloud Data using Homomorphic Encryption with Query Users
    Shankar, K.
    Ilayaraja, M.
    [J]. 2018 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI), 2018,
  • [29] Secure and efficient online data storage and sharing over cloud environment using probabilistic with homomorphic encryption
    N. Jayapandian
    A. M. J. Md. Zubair Rahman
    [J]. Cluster Computing, 2017, 20 : 1561 - 1573
  • [30] A secure data protection technique for healthcare data in the cloud using homomorphic encryption and Jaya-Whale optimization algorithm
    Sudha, I
    Nedunchelian, R.
    [J]. INTERNATIONAL JOURNAL OF MODELING SIMULATION AND SCIENTIFIC COMPUTING, 2019, 10 (06)