Open Access   Article Go Back

A novel approach for privacy preserving using Animal Migration Optimization and RSA algorithm

Nivedita Bairagi1 , Punit K. Johari2

  1. Department of CSE and IT, MITS, Gwalior, India.
  2. Department of CSE and IT, MITS, Gwalior, India.

Correspondence should be addressed to: bairaginivedita@gmail.com.

Section:Research Paper, Product Type: Journal Paper
Volume-5 , Issue-6 , Page no. 193-197, Jun-2017

Online published on Jun 30, 2017

Copyright © Nivedita Bairagi, Punit K. Johari . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Nivedita Bairagi, Punit K. Johari, “A novel approach for privacy preserving using Animal Migration Optimization and RSA algorithm,” International Journal of Computer Sciences and Engineering, Vol.5, Issue.6, pp.193-197, 2017.

MLA Style Citation: Nivedita Bairagi, Punit K. Johari "A novel approach for privacy preserving using Animal Migration Optimization and RSA algorithm." International Journal of Computer Sciences and Engineering 5.6 (2017): 193-197.

APA Style Citation: Nivedita Bairagi, Punit K. Johari, (2017). A novel approach for privacy preserving using Animal Migration Optimization and RSA algorithm. International Journal of Computer Sciences and Engineering, 5(6), 193-197.

BibTex Style Citation:
@article{Bairagi_2017,
author = {Nivedita Bairagi, Punit K. Johari},
title = {A novel approach for privacy preserving using Animal Migration Optimization and RSA algorithm},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {6 2017},
volume = {5},
Issue = {6},
month = {6},
year = {2017},
issn = {2347-2693},
pages = {193-197},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1325},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1325
TI - A novel approach for privacy preserving using Animal Migration Optimization and RSA algorithm
T2 - International Journal of Computer Sciences and Engineering
AU - Nivedita Bairagi, Punit K. Johari
PY - 2017
DA - 2017/06/30
PB - IJCSE, Indore, INDIA
SP - 193-197
IS - 6
VL - 5
SN - 2347-2693
ER -

VIEWS PDF XML
485 327 downloads 590 downloads
  
  
           

Abstract

In recent years, the quantity of data between organizations, companies and governments has been produced and transmitted with extremely increased in number. Privateness preserving is without doubt one of the primary challenges in a computer world, when you consider that of the large amount of sensitive information on the internet. Additionally, with the quick increase of data mining technologies hidden relationships between items in databases can now be exposed with ease, for the reason of decision making or to determine user’s preferences. In the existing work, k-anonymity method used for the safety of sensitive data from the leakage or distribution to unauthorized users. However it is not sufficient for the protection of attribute disclosure. This method is also difficult to reverse the data to get the content. To overcome this problem, we performed the Animal Migration Optimization on the basis of age and then encryption is performed using RSA algorithm for achieving the security of the data and preserve from heavy data loss.

Key-Words / Index Term

Privacy Preservation, Data Modification, Privacy preserving techniques , Animal Migration Optimization and RSA Algorithm.

References

[1] M. Patel, A. Hasan , S.Kumar, "A Survey: Preventing Discovering Association Rules for Large Data Base", International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.2, pp.30-32, 2013.
[2] Bullarao Domathoti, Rajia Begum and Nageswara Rao.P, "Privacy Preserving Collaborative Auditing Data Storage Scheme in Cloud Computing", International Journal of Computer Sciences and Engineering, Vol.3, Issue.5, pp.212-218, 2015.
[3] Md. Riyazuddin, Dr.V.V.S.S.S.Balaram, Md.Afroze, Md.JaffarSadiq, M.D.Zuber, “An Empirical Study on Privacy Preserving Data Mining”, ISSN: 2231-5381, Page 687, Volume3Issue6- 2012.
[4] Y. Lindell and B. Pinkas, “Privacy preserving data mining”, J. Cryptology, 15(3):177–206, 2002.
[5] R. Rajeswari and Mrs R. Kavitha ,”Privacy Preserving Mechanism for anonymizing data streams in data mining”, International conference on current research in Engineering Science and Technology(ICCREST-2016).
[6] Tong Li, Zheli Liu, Zin Li, Chunfu Jia and Kuan-Ching Li, “A Cryptographic Data Publishing System”, J. Comput. Syst. Sci. (2016), http://dx.doi.org/10.1016/j.jcss.2016.12.004.
[7] J. Jesu Vedha Nayahi and V. Kavitha,” Privacy and utility preserving data clustering for data anonymization and distribution on Hadoop”, Future Generation Computer Systems, 0167-739X/© 2016 Elsevier.
[8] Surbhi Sharma and Deepak Shukla, “Efficient multi-party privacy preserving data mining for vertically partitioned data”, Inventive Computation Technologies (ICICT), 10.1109/INVENTIVE.2016.7824852, © 2017 IEEE.
[9] Prakash, M., and G. Singaravel. "An approach for prevention of privacy breach and information leakage in sensitive data mining." Computers & Electrical Engineering 45 (2015): 134-140.
[10] V.K. Saxena, S. Pushkar, "Privacy Preserving using Encryption Proxy in Data Security", International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.2, pp.36-41, 2017.
[11] L. Sweeney,“An Achieving k-Anonymity Privacy Protection using Generalization and Suppression”, International Journal of Uncertainty, Fuzziness and Knowledge-Based System, 2002, pp571-588.
[12] Xiangtao Li, Jie Zhang and Minghao Yin, “Animal migration optimization: an optimization algorithm inspired by animal migration behavior,” Neural Comput & Applic (2014) 24:1867–1877.
[13] https://archive.ics.uci.edu/ml/machine-learning-databases/adult/adult.data