A Research Homomorphic Encryption Scheme to Secure Data Mining in Cloud Computing for Banking System

Authors(4) :-Sneha Sakharkar, Shubhangi Karnuke, Snehal Doifode, Vaishnavi Deshmukh

Big data is difficult to handle, process and analyse using traditional approach. Using services, we can resolve problem like resource sharing, storage capacity and data transfer bottlenecks etc. But there is a main issue of data mining based attacks, allows an adversary or an unauthorized user to extract valuable and sensitive information by analysing the results generated from computation performed on the raw data. In order to provide privacy, security for cloud user as well as cloud provider. We proposed a system for secure data mining using well known techniques like homomorphic encryption system, RSA algorithm. In this process flow, cloud server is unware of data uploaded by the user and the client only gets the computational results. Through an experimental evaluation, we can maintain correctness and confidentiality of final result.

Authors and Affiliations

Sneha Sakharkar
Department of Computer Science & Engineering, RTMNU/ KDK’s Smt. Rajshree Mulak College of Engineering for Women/Nagpur, Maharashtra, India
Shubhangi Karnuke
Department of Computer Science & Engineering, RTMNU/ KDK’s Smt. Rajshree Mulak College of Engineering for Women/Nagpur, Maharashtra, India
Snehal Doifode
Department of Computer Science & Engineering, RTMNU/ KDK’s Smt. Rajshree Mulak College of Engineering for Women/Nagpur, Maharashtra, India
Vaishnavi Deshmukh
Assistant Professor, Department Of Computer Science and Engineering, KDK’s Smt. Rajshree Mulak College of Engineering for Women/ Nagpur, Maharashtra, India

Homomorphism Encryption, Decryption, Data mining, Security, Cloud Computing.

  1. Deepti Mittal, Damandeep Kaur, Ashish Aggarwal, "Secure Data Mining in Cloud using Homomorphic Encryption". IEEE Cloud Security.
  2. SunandaRavindran , ParsiKalpana,"Data storage security using partially homomorphic Encryption in cloud", International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 4.
  3. Hemalatha , Dr. R. Manickachezian, "Performance of ring based fully homomorphic Encryption for securing data in cloud computing", International Journal of Advanced Research in Computer and Communication Engineering ,Vol. 3, Issue 11, November 2014.
  4. Mr. V. Biksham , Dr. D. Vasumathi, "Homomorphic encryption applied on cloud", International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 NATIONAL CONFERENCE on Developments, Advances & Trends in Engineering Sciences (NCDATES- 09th & 10th January 2015).
  5. S. SelvaRatna , Dr. T. Karthikeyan, "Survey on recent algorithms for privacy preserving data mining", S.SelvaRathna et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 6 (2) , 2015, 1835-1840.
  6. ShashankBajpai ,PadmijaShrivastava, "A fully homomorphic encryption Implementation on cloud computing", International Journal of Information & Computation Technology, ISSN 0974-2239 Volume 4, Number 8 (2014).
  7. V. Bhagat(2014), "Student Authentication framework in Online Examination Using Visual Cryptography", International Journal For Research In Applied Science And Engineering Technology(IJRASET),Vol. 02, Issue 07, PP.316-319.

Publication Details

Published in : Volume 4 | Issue 4 | March-April 2018
Date of Publication : 2018-04-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 276-280
Manuscript Number : IJSRSET184478
Publisher : Technoscience Academy

Print ISSN : 2395-1990, Online ISSN : 2394-4099

Cite This Article :

Sneha Sakharkar, Shubhangi Karnuke, Snehal Doifode, Vaishnavi Deshmukh, " A Research Homomorphic Encryption Scheme to Secure Data Mining in Cloud Computing for Banking System, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 4, Issue 4, pp.276-280, March-April-2018. Citation Detection and Elimination     |     
Journal URL : https://ijsrset.com/IJSRSET184478

Article Preview