Security and Verification of Server Data Using Frequent Itemset Mining in Ecommerce

Security and Verification of Server Data Using Frequent Itemset Mining in Ecommerce

Zuber Shaikh (Dr. D. Y. Patil School of Engineering and Technology, Pune, India), Antara Mohadikar (Dr. D. Y. Patil School of Engineering and Technology, Pune, India), Rachana Nayak (Dr. D. Y. Patil School of Engineering and Technology, Pune, India) and Rohith Padamadan (Dr. D. Y. Patil School of Engineering and Technology, Pune, India)
Copyright: © 2017 |Pages: 13
DOI: 10.4018/IJSE.2017010103
OnDemand PDF Download:
$30.00
List Price: $37.50

Abstract

Frequent itemsets refer to a set of data values (e.g., product items) whose number of co-occurrences exceeds a given threshold. The challenge is that the design of proofs and verification objects has to be customized for different data mining algorithms. Intended method will implement a basic idea of completeness verification and authentication approach in which the client will uses a set of frequent item sets as the evidence, and checks whether the server has missed any frequent item set as evidence in its returned result. It will help client detect untrusted server and system will become much more efficiency by reducing time. In authentication process CaRP is both a captcha and a graphical password scheme. CaRP addresses a number of security problems altogether, such as online guessing attacks, relay attacks, and, if combined with dual-view technologies, shoulder-surfing attacks.
Article Preview

Architecture Of Outsourced Transaction Database Model

There are mainly three entities involved in the outsourced transaction database model.

The three entities are:

  • 1.

    Data Owner;

  • 2.

    Service provider;

  • 3.

    Clients.

The design seems like given below of Outsourced Transaction Information Model. Generally, information owner and purchasers are thought of as trusting entity whereas service supplier is distrustful in context of disclosing information in associate unauthorized manner. The Data-owner is liable for update, insert, delete, modify, access databases. The information owner has the authority to permit or deny the purchasers for accessing the information. The Service supplier performs all the information maintenance tasks.

Complete Article List

Search this Journal:
Reset
Open Access Articles: Forthcoming
Volume 8: 2 Issues (2017)
Volume 7: 2 Issues (2016)
Volume 6: 2 Issues (2015)
Volume 5: 2 Issues (2014)
Volume 4: 2 Issues (2013)
Volume 3: 2 Issues (2012)
Volume 2: 2 Issues (2011)
Volume 1: 2 Issues (2010)
View Complete Journal Contents Listing