Professional Documents
Culture Documents
Volume: 6 Issue: 3 25 - 27
______________________________________________________________________________________
Providing Security to Outsourced Data Using Association Rule Mining on
Vertically Partitioned Databases
V. Methodology :
STEPS :
1. Pre-Processing
2. Mining
2.2 The cloud detects original data items from the fictious Description: The admin logins by his/her login id and
transcations with data owners help. password and uploads the files by choosing the file from the
selected folder and browse the image then uploads the file.
2.3 The cloud outsources the encrypted database to the
interested parties.
3. Post-Processing
26
IJRITCC | March 2018, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 6 Issue: 3 25 - 27
______________________________________________________________________________________
interested parties through a cloud. encryption and
association rule mining algorithms are used for that purpose.
Only authorized parties can decrypt and use the outsourced
data. In future more robust encryption schemes can be used
in Whirlpool algorithm. Also instead of only key words a
more secure method can be used to identify parties.
REFERENCES :
VI. Conclusion :
27
IJRITCC | March 2018, Available @ http://www.ijritcc.org
_______________________________________________________________________________________