Documente Academic
Documente Profesional
Documente Cultură
(mod p))
i.e
Yl=g
k
(mod p) Y2=
m (mod p)
4. Sender sends ciphertext (Y
b
yz) to receiver.
3. Decryption:
The decryption algorithm (D) works as follows: Receiver
can decrypt the cipher text with private key x.
Receivers decryption procedure will actually return the same
plaintext message that sender has encrypted.
Since
The decryption calculation restores the plaintext m.
VI. MODEL PREDICTION BY ANN
A. Data Mining Process Based on Neural Netork
The data mining based on neural network is composed of three
phases [9]: data preparation, rules extracting and rules
assessment, as shown in Fig.3.Data preparation phase includes
data cleansing, data option, data preprocessing and data
848
expression. Rules extraction is a method of extracting rules
fom recursive network. Then, the rules can be assessed with
several objectives. They fnd the optimal sequence of
extracting rules, test the accuracy of the rules extracted, detect
how much knowledge in the neural network has not been
extracted and detect the inconsistency between the extracted
rules and the trained neural network.
Urfl Ru es
Ru Alessmellt
Fig.3. Data Mining Process based on Neural Network
B. Artificial Neural Netork in Colorectal Cancer Prediction
ANN is a branch of computational intelligence that
employs a multiplicity of optimization tools to gain
knowledge fom past experiences and use this prior training to
predict and recognize new patters. In [14], Artifcial Neural
Network is used to diagnosis of thyroid disorders. Here, these
neural network models have been used for the prediction of
risk factors in Colorectal Cancer. Colon consist four sections:
transverse colon, ascending colon, descending colon and
sigmoid colon. Colorectal cancer is most common cancer that
developing in the colon or the rectum. The third leading cause
of cancer death is colorectal cancer.
TALE!. GENERAL CHARACTERISTIC OF THE PATIENTS WITH
COLORECT AL CANCER
\.r. Ne . re' Colol ,,;mc
Etlmil)'
Hhrsk
bl \or
Typ offrr
latmlt
P. thQl
s(ae
Mae
Female
fme
Ollxr
Peial
Az
Ku
lu:
O!I_t
Has
H S'.
Snllery
Ch"llllhapy
tclior1P
Biopy
Pm,u
Ad'd
9:.5
95 -8._
3 13
}S 9.1
,_
5
L
5 2,
S 4:5
11
-
.5
18 91.
lO -.9
.4
101 "L
9S 4S.
t
6]6
32 38'
69 9 . 8
S7
]9
1 t _.6
5: 6.9
50 69
S- 11.3
'59
.6 63.l
"6 3.6
9 1..6
103 13.8
, S 1
,- i
2013 Interational Conference on Circuits, Power and Computing Technologies [ICCPCT-2013]
In [13], a general characteristic of the patients with colorectal
cancer is listed. It is shown in Table.!.
Artifcial Neural Network is used to simulate human brain
fnctions. It is composed of parallel computing units called
Neurons. These neurons can be linked in several ways to form
dissimilar Neural Network architectures. The most popular
architecture is the Multi-layer Perceptron (MLP). It contains
two or more layers of neuron in which the layers are joined in
sequential manner. Every one of the neuron is connected to
other neurons in the different layer by weighted path ways.
Signals are passed through these pathways to the other
neurons. Each neuron sums the weighted signals and sends
the resulting signal as the output of the neuron by an activation
fnction. Then the output signal is transmitted to the other
neurons in the subsequent layers. The input layer receives
signals fom the data entering into the network. The output
layer generates the outcome to the outside world. The
complete methodology [23] is shown in Fig 4.
Coil ect data set for Col orectal Cncer
Data processi ng
Si mulate ANN mod el s
Trai ni ng and Testi ng phase
Predi ct on and Di agnosis Dec isi on
Performance Co mparison o f AN N mod el s
Fig4. Complete Methodology of AN
In this paper, predictors for ANN are smoking, red meat
eating, obesity, physical activity usage of aspirin and other
medicines respectively. The complete methodology of ANN is
associated with service provider (Data Miner). Accuracy of
ANN is measured by the Root Mean Square Eror (RMSE).
849
H|0000l8y0|80|lw|lO0 M00|lO0. Hyp0mOll0 |80g00I
JIpJ| l8y0|80I|wI|O0 M00IlO0. l000|lIy
5ynapt`cWe`ght>O
5ynapt`cWe`ght<O
Fig 5. AN Network Diagram for colorectal cancer
VII. CONCLUSION
In this paper, we proposed a novel approach to hide
sensitive data in multiparty collaborative mining. The
proposed method, a Binary Integer Programming Model can
be used to mask sensitive information while presenting it on a
publicly accessible platform by collaborative data providers.
Furthermore, semantically secured EIGamal encryption
scheme can be applied to protect confdentiality of the data,
when it's crossed over the network fom data providers to
service provider. Finally, this paper has discussed the
complete methodology of ANN to predict model for colorectal
cancer. As future work, in an experimental way to analyses the
accuracy and effectiveness of this approach towards privacy
and security.
(1|
|J
|`J
|!J
(`J
(J
|J
REFERENCES
Yehuda Lindell and Benny Pinkasy, "Secure Multiparty Computation for
Privacy-Preserving Data Mining," The Joural of Privacy and
Confidentialit (2009), Number I, pp. 59-98, 2009.
1. Breckling, Ed. , "The Analysis of Directional Time Series:
Applications to Wind Speed and Direction," Lecture Notes in Statistics.
Berlin, Germany: Springer,Vot. 61,1989.
Justin Zhal, Sta Matwinl, Nathalie Japkowiczl, LiWu
Chang,"Privacy-Preserving Collaborative Association Rule Mining,"
The Fourth International Conference on Electronic Business
(ICEB2004) / Beiing 2004.
Yasien, A.H., "Preserving privacy in association rule mining," Ph.D
Thesis, Universit of Grifith, 2007.
Keke Chen, and Ling Liu,"Privacy-preserving Multiparty Collaborative
Mining with Geometric Data Perturbation," IEEE Transactions on
Parallel and Distributed Computing, Dec 2009.
1.Vaidya and C.Clifon,"Privacy preserving K-means clustering over
vertically partitioned data," Proceedings ACM SIGKDD International
ConferenceKnowledge Discovery and Data Mining, 2003.
V.Verykios, E.Bertino, LFovino, L.Provenza, y.Saygin and
Y.Theodoridis," State-of-the-art in privacy preserving data mining,"
|'J
,1U|
,11J
,1J
|1`J
,1!J
|1`J
,1J
|1J
,1^J
|1'J
|J
|1J
,J
,'J
|!J
2013 Interational Conference on Circuits, Power and Computing Technologies [ICCPCT-2013]
SIGREC'04: Proceedings of the 2004 ACM SIGMOD Record,
pp.50-57, 2004.
H LU,R Setiono, ad H Liu,"Efctive data mining using neural
network," IEEE Transaction on Knowledge and Data Engineering,1996,
pp.957-961.
Xianjun Ni,"Research of data mining based on neural network," World
Academy of Science, Engineering and Technolog, May 2008.
Justin Zhang,stan Matwin, "A crypto-based approach to privacy
preserving collaborative data mining," Sixth IEEE Interational
Conference on Data Mining-Workshops (ICDMW'06),
Dec 2006, pp.546-550.
Elgamal,T,"A public key cryptosystem and a signature scheme based on
discrete logarithms, Information theory," IEEE Transactions,Vol 31,
No 4,JuI1985,pp.469-472.
Wenbo mao,"Moder Cryptography theor and Practice," pearson
press, 2n
d
edition 2010.
Akbar Biglarial, Enayatollah Bakhshi, Mahmood Reza Gohari ad
Reza Khodabakhshi," Artifcial Neural Network for Prediction of
Distat Metastasis in Colorectal Cancer," Asian Pacific Journal of
Cancer Prevention, Vol 13, pp.927-930, 2012.
T.Z. Tan, C. Quek, G.S. Ng a, E.Y.K. Ng, "A novel cognitive
interpretation of breast cancer thermography with complementary
learning fuzzy neural memory structure," Expert Systems with
Applications, pp. 652-666, 2007.
S. Golwasser and S. Micali,"Probabilistic encryption,"Journal of
Computer and SystemSciences, Vo1.28, pp.270-299, 1984.
C.Clipton, M.Kantarcioglu and J.Vaidya,"Defning privacy for data
mining," WGDM'02: National Science Foundation Workshop on next
generation Data Mining, pp.126-133, 2002.
Vaidya, 1., Clifon, c., & Zhu, M," Privacy Preserving Data Mining,"
New York: Springer, 2006.
W. Du and Z. Zhan, "Using randomized response techniques for
privacy-preserving data mining", In proceedings of the 9th ACM
SIGKDD interational conference on knowledge discover and data
mining, Washington, DC, USA, Aug. 2003,pp.24-27.
Aris Gkoulalas-Divanis Vassilios S. Verykios,"An Integer Programming
Approach for Frequent Itemset Hiding," CIKM'06, November 5-11,
2006, Arlington, Virginia, USA.
S. Menon,S. Sarkar ad S. Mukheee,"Maximizing accuracy of shared
databases when concealing sensitive patterns," Information Systems
Research,pp.256-270,2005.
K.Chen ad L.Liu,"Towards attack-resilient geometric
perturbation," in SIAM Data Mining Conference, 2007.
data
Durgesh Kumar Mishra, Priyanka Jangde and Gajendra Singh
Chandel,"Hybrid Technique for secure sum protocol," World of
Computer Science Information Technolog Joural (WT), Vol.I,
No. 5, pp 198-201, 2011.
S. Bhanumathi and P.Sakhivel,"Privacy Preserving Multiparty
Collaborative Mining using Integer Programming Model", Conference
on Recent Trends in Computer and Networking Technologies, Dec 21-
23'd 2012.
Yaping li,Minghua Chen,Qiwei Li and Wei Zhang,"Enabling multilevel
trust in privacy preserving data mining," IEEE Transaction on
Knowledge and Data Engineering,YoI.24,No.9,Sep 2012.
850