Efficiently Verifiable Computations on User Data for Behavior Analysis with Privacy Preservation

  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract

    Along with development of internet and web, online social network are becoming important information propagation platform with hundreds of million users worldwide. Online social network attract thousands of million users to use it every day for different purpose. So that tons of user behavior data is generated on internet. Developing endeavors have been committed to mining the inexhaustible behavior data to extract significant information for research purposes to  inquire about that, or analyst to develop better ecommerce strategies for business purpose. However the concern arises with this data is security, which is going to be presented to third parties. The most recent decade has seen an assortment of look into works endeavoring to perform information conglomeration in a privacy protecting manner. Most by far of existing  techniques give protection to users information yet at the cost of very limited data aggregation operations like calculating sum and mean of particular query, which barely fulfill the requirement of behavior analysis. So that, proposed system mainly focuses on privacy preservation and behavior analysis of online user data. In this paper we use general accumulation and specific collection for behavior analysis. Using cryptographic algorithm we prevent privacy disclosure from both  third party data aggregator and analyst.  We have executed our technique and assessed its execution utilizing a relational dataset. The results of the experiment shows that this research scheme handle both overall queries and various selective aggregate queries  with acceptable computation, privacy, and  overheads of the communication effectively.



  • Keywords

    Advance Encryption, Behavior Analysis, Data Aggregation, Privacy Preservation.

  • References

      [1] J. Qian, F.Qiu, Fan Wu, N. Ruan, G. Chen, S. Tang Privacy preservation Selective Aggregartion of Online user Behavior Data,IEEE Transaction On computers,vol 14, TC.2016.2595562, 2016.

      [2] J. Abawajy, Mohd Izuan Hafez Ninggal, Tutut Herawan Privacy Preserving Social Network Data Publication, IEEE Transaction, vol 27, 2016.

      [3] Thripthi. P. Balakrishnan , Mr.S.Vijayanand, T. Senthil Prakash, Efficiently Verifiable Computation On Encrypted Data, International Journal of Science and Engineering Research (IJ0SER), vol 4, Dec. 2016.

      [4] G. Calikli, M.Law, A. Bandara, A. Russo, L. Dickens, B.Price, A. Stuart, M. Levine, B.Nuseibeh Privacy Dynamics: Learning Privacy Norms for Social Software,IEEE/ACM 11th International Symposium on Software Engineering for Adaptive and Self-Managing Sytems, vol 10, 2016.

      [5] Jun Du, Chunxiao Jiang, Shui Yu, Kwang-Cheng Chen, Yong Ren Privacy Protection: A Community-Structured Evolutionary Game Approach,IEEE, vol 5, 2016.

      [6] Weihao Li, Hui Li LRDM: Local Record-Driving Mechanism for Big data Privacy Preservation in Social Networks, IEEE first International conference on data.

      [7] Taeho Jung, Xiang-Yang Li, Meng Wan, Collusion tolerable privacy preserving Sum and Product Calculation without Secure Channel, vol 14, 2015.

      [8] Linke Guo, Chi Zhang, Yuguang Fang, A Trust-based Privacy Preserving Friend Recommendation Scheme for Online Social Networks, IEEE Transaction on Dependable and Secure Computing, vol 14, 2015.

      [9] Borui Yang, Jianxin Li, Yingjie Cao, Hua Wei, Peiyuan Sun, Nannan Wu and Bo Li,Lu Liu, ShutterRoller: Preserving Social Network Privacy towards High Speed Domain Gateway, IEEE International Conference on Computer and Information Technology, vol 8, 2015.

      [10] Nihar VuppaJapati and Joan S. Park, Online Behavioral Advertising (OBA) with Privacy Protection, IEEE, 2014.

      [11] F. Chen, A. X. Liu, Privacy and Integrity preserving Multidimensional range queries for cloud computing,2014.

      [12] B. Mood, D. Gupta, K. Butler, J. Feigenbaum, Reuse it or Lose it: More Efficient secure computation through reuse of encrypted values , 2014.

      [13] Xun Yi, Mohammed Golam Kaosar, Russell Paulet, and Elisa Bertino, Single Database Private Information Retrieval from Fully Homomorphic Encryption,IEEE Transaction on Kowledge and Data Engineering, vol 25,May 2013.

      [14] Luca Ferretti, Michele Colajanni, and Mirco Marchetti, Distributed, concurrent, and independent access to encrypted cloud databases,IEEE Transaction on Parallel and Distributed System vol 11, 2013.

      [15] Peter Kairouz, Sewoong Oh, Pramod Viswanath, The Composition Theorem for Differential Privacy vol 10, 2013.

      [16] Taeho Jung , XuFei Mao, Xiang-Yang Li, Shao-Jie Tang , Wei Gong ,and Lan Zhang, Privacy Preserving Data Aggregation without Secure Channel: Multi-variate Polynomial Evaluation, vol 9, 2013.

      [17] J. C. Duchi, M.I. Jordan, M.J. Wainwright, Local Privacy and Statistical minmax rates,2013.

      [18] Ruichuan Chen, Istemi Ekin Akkus, Paul Francis, SplitX: High Performance Private Analytics, vol 12, 2013.

      [19] Ruichuan Chen, Alexey Reznichenko, Paul Francis, Johannes Gehrke, Towards Statistical Queries over Distributed Private User Data, vol 14, 2012.

      [20] Istemi Ekin Akkus, Ruichuan Chen, Michaela Hardt, Paul Francis, Johannes Gehrke, Non-tracking Web Analytics, vol 12, 2012.

      [21] A. Khalique, K. singh, S. Sood Implementation of Eliptical Curve Digital Signature Algorithm, IJCA, Vol 2, May 2010.




Article ID: 15227
DOI: 10.14419/ijet.v7i3.8.15227

Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.