Privacy Preservation of Stream Data Patterns Using Offset and Trusted Third Party Computation in Retail-Shop Market Basket Analysis

Author(s):  
Keshavamurthy B.N. ◽  
Durga Toshniwal
Author(s):  
Ajaysinh Devendrasinh Rathod ◽  
Saurabh Shah ◽  
Vivaksha J. Jariwala

In recent trends, growth of location based services have been increased due to the large usage of cell phones, personal digital assistant and other devices like location based navigation, emergency services, location based social networking, location based advertisement, etc. Users are provided with important information based on location to the service provider that results the compromise with their personal information like user’s identity, location privacy etc. To achieve location privacy of the user, cryptographic technique is one of the best technique which gives assurance. Location based services are classified as Trusted Third Party (TTP) & without Trusted Third Party that uses cryptographic approaches. TTP free is one of the prominent approach in which it uses peer-to-peer model. In this approach, important users mutually connect with each other to form a network to work without the use of any person/server. There are many existing approaches in literature for privacy preserving location based services, but their solutions are at high cost or not supporting scalability.  In this paper, our aim is to propose an approach along with algorithms that will help the location based services (LBS) users to provide location privacy with minimum cost and improve scalability.


Author(s):  
Eferoni Ndruru ◽  
Taronisokhi Zebua

Stenography and security are one of the techniques to develop art in securing data. Stenography has the most important aspect is the level of security in data hiding, which makes the third party unable to detect some information that has been secured. Usually used to hide textinformationThe (LSB) algorithm is one of the basic algorithms proposed by Arawak and Giant in 1994 to determine the frequent item set for Boolean association rules. A priory algorithm includes the type of association rules in data mining. The rule that states associations between attributes are often called affinity analysis or market basket analysis. OTP can be widely used in business. With the knowledge of text message, concealment techniques will make it easier for companies to know the number of frequencies of sales data, making it easier for companies to take an appropriate transaction action. The results of this study, hide the text message on the image (image) by using a combination of LSB and Otp methods.


Author(s):  
Ganesh Dagadu Puri ◽  
D. Haritha

<span>The existing methods for privacy preservation are available in variety of fields like social media, stock market, sentiment analysis, electronic health applications. The electronic health dynamic stream data is available in large quantity. Such large volume stream data is processed using delay free anonymization framework. Scalable privacy preserving techniques are required to satisfy the needs of processing large dynamic stream data. In this paper privacy preserving technique which can avoid similarity attack in big streaming data is proposed in distributed environment. It can process the data in parallel to reduce the anonymization delay.  In this paper the replacement technique is used for avoiding similarity attack. Late validation technique is used to reduce information loss. The application of this method is in medical diagnosis, e-health applications, health data processing at third party.</span>


ICIT Journal ◽  
2020 ◽  
Vol 6 (1) ◽  
pp. 94-104
Author(s):  
Fernando Siboro ◽  
Capri Eriansyah ◽  
Muhammad Adi Sofyan

Teknologi informasi saat ini terus berkembang semakin cepat, membuat pola berfikir manusia berubah, dengan proses pertumbuhan yang seperti ini, generasi akan datang diharuskan mempunyai keahlian yang lebih baik di bidang pemanfaatan teknologi informasi. Kebutuhan adanya kemudahan dari segi pemasaran, saat ini dirasa sangat penting, terutama bagi perusahaan yang bergerak dibidang penjulan atau distributor guna menunjang meningkatkan akurasi dan kualitas pemasaran itu sendiri. Namun pada kenyataanya, sistem yang berjalan masih tergolong kurang efektif dan efesien dalam melayani kebutuhan pelanggan, hal ini dikarenakan sistem pemasaran produk hanya bisa diakses secara manual, dan belum adanya media informasi seputar produk yang ditawarkan, oleh sebab itu dibuatlah suatu perancangan sistem informasi yang mengatur pemasaran produk dan dapat menjadi bahan dalam pembuatan laporan sistem penunjang keputusan. Dalam perancangan ini menggunakan metode data mining market basket analysis dan Max-Miner sebagai algoritma. Serta menggunakan metode penerapan sistem waterfall atau sering dinamakan siklus hidup klasik (classic life cycle). Dengan demikian rancang bangun sistem informasi ini, mengacu kepada bagaimana cara agar pemasaran produk dapat di akses dengan mudah, cepat, dan akurat dimanapun dan kapanpun, calon customer dapat mengakses tanpa terkendala waktu dan tempat, serta menjadi wadah dalam pengambilan keputusan oleh perusahaan. Metodologi desain menggunakan uml yang melimuti usecase, activity, squence dan untuk pengelolaan basis data menggunakan mysql. Sistem ini diharapkan mampu dijadikan salah satu penunjang keputusan untuk kebutuhan promosi produk. Kata Kunci: Penunjang pemasaran, promosi produk, algoritma Max-Miner


Sign in / Sign up

Export Citation Format

Share Document