尊敬的 微信汇率:1円 ≈ 0.046166 元 支付宝汇率:1円 ≈ 0.046257元 [退出登录]
SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 04 | Apr 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2486
THE CRYPTO CLUSTERING FOR ENHANCEMENT OF DATA PRIVACY
JUTURU MANSI1, BHAVANA Y N2, ISHWARYA T3, LETHISHAA P4, SOWMYA S R5
1,2,3,4 Dept. of Information Science Engineering, Dayananda Sagar Academy of Technology and Management,
Karnataka, India
5 Prof. Sowmya S R, Dept. of Information Science Engineering, Dayananda Sagar Academy of Technology and
Management, Karnataka, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Due to the improved technology, large
amounts of Heterogeneous Data are collected. Though
there are benefits due this technology there are some
sensitive and private information that is exposed. Therefore,
it is very much important to implement the privacy-
preserving methods that helps us to protect the sensitive
data. In this paper we perform a systematic analysis on
some of the privacy preserving methods and result in
securing the Heterogeneous Sensitive Data.
Key Words: Data, Privacy, Cluster, Information,
Security, Euclidean Distance
1. INTRODUCTION
The data that is continuously collected by the new
technologies and many source have many advantages and
benefits despite these there is large exposure of the
private and the sensitive data of the user that is used for
malicious uses and illegal businesses. since this issue is
very common in today’s world and is more important
topic raised about the privacy concerns. To solve this
many methods are used, we are trying to automatize the
privacy protection by analysing the type of data and to
protect the accordingly. In order to reduce the
complications and third-party issues.
2. LITERATURE SURVEY
In the advancement [8] Health care data has incredible
potential for further developing the medical care
framework and furthermore giving quick and precise
results to patients, foreseeing sickness flare-ups,
acquiring significant data for expectation in future.
Concluding the authentic use of data while saving the
patient's character assurance is a mind-boggling task.
Medical care association generally embrace information
development to diminish costs and further develop
capability and quality in the medical care framework to
make it quick. Delicate information, for example,
identifiers, names, locations and federal retirement aide
number should be altered, changed or shortened from the
first data set, with the goal that any other individual who
gets the information can't think twice about security of
the licenses. Information security components
incorporate secrecy, honesty, accessibility and
responsibility. Innovations being used are verification,
encryption, veiling information, access control, examining
and checking, biometrics and cryptographic calculations.
A definitive way to deal with dealing with the utilization
and divulgence of individual wellbeing data is best for
patients, individual analysts, medical services associations
and society too. For the individuals who don't follow great
security and protection rehearses, the gamble is higher.
Ill-advised use or exposure of future regulations and
guidelines might increment information misfortune and
information break for unsafe purposes. Notwithstanding
the rising accentuation on research association ought to
apply similar general approaches to help the direct of
medical care for research.
Their method initially bothers clients' information locally
to meet neighborhood differential security. Then, in light
of the exceptionally concerned information, it reconsiders
the standard K-implies strategy to permit the specialist
co-op to deliver great grouping results by helping out
purchasers. They show that the plan takes into
consideration high utility bunching while at the same time
guaranteeing neighborhood differential security for every
client. They additionally recommend an upgraded way to
deal with work on the security and utility of our essential
model. In each round of this method, they upset the two
clients' touchy information and the between time
consequences of clients' bunches. Besides, they examine a
more nonexclusive situation where clients might have
fluctuating security needs. Broad tests are completed on
two genuine world datasets, with the outcomes exhibiting
that our answer may really hold the nature of grouping
results. [6]
They recommended a neighborhood differential security
based arrangement method for server farms. The
differential security insurance technique is acquainted
with server farm information mining to manage Laplace
commotion of delicate data in the example mining
process. Through severe numerical confirmation, they
conceived a way for measuring the nature of security
assurance. Tests have shown that this exploration's
differential protection based characterization technique is
more proficient, secure, and precise cycle. The calculation
gives strong security insurance characteristics and great
practicality to guarantee accessibility. [3]
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 04 | Apr 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2487
The idea of prescient security to form a moral guideline
safeguarding people and gatherings against differential
treatment.it investigations the commonplace information
handling pattern of prescient framework to give a bit by
bit conversation of moral ramifications, finding event of
prescient protection infringement. subjectively is a better
approach for prescient investigation challenges moral
standards like human pride and the thought of individual
security. The moral methodology of this paper tends to
the twofold test in regards to security and information
assurance because of the chance of prescient delicate data
about people from intermediary information through
sidelong correlation with be the information to numerous
information contributors. Assessment of prescient
framework utilizing insignificant model of ordinary
information handling cycle which incorporates preparing
information procurement, preparing the model,
dispersing the model, gathering intermediary information,
surmising, forecast, refreshing preparation information
and following
misprediction. [5]
The recommender framework idea has been around for
quite a while and is especially famous in electronic
commercial centers, which offer a phenomenal scope of
items. a. The calculation will be on express and implied
collaborations with the information search framework. A
few strategies and informational indexes will be applied
to catch such collaborations. Content-based sifting and
cooperative separating are usually utilized strategies to
channel information. After we have procured, separated,
and reviewed the information, we use it to make an
unaided learning model. Bunching is quite possibly the
most well known scientific procedure to bunch
comparative articles. The objective is to isolate bunches
with comparative things and dole out them into the
groups. Euclidean distance and progressive grouping are
the procedures that are not difficult to be applied and
choice trees will help in choosing the size of bunches. [7]
Security worries over their own information, particularly
after the rise of new advances for the top to bottom
investigation of the client's information, for example,
names, locations and recognizable proof card numbers
which raises worries about their protection. To tackle this
issue, we utilize nearby differential protection (LDP)- This
bothers the client's information locally before the
information leaves the client's gadget to such an extent
that main the proprietor can get to the information. The
private information is being grouped and safeguarded
utilizing LDP.
Utilization of LDP helps in replication and keep up with
authenticity of client information. [11]
3. PROPOSED WORK
The proposed work targets on the mixed data to be
protected based on the prediction of the sensitivity and
protection mechanism used.
Protection mechanism is the cryptographic
implementation based on the sensitive data identified.
Initially sensitivity is measured based on the methods
such as distance measured comparison etc. suitable for
the data type. The proposed work flow is as follows:
Fig -1: Proposed work
4. CONCLUSION
As the sensitive data is very important and plays vital role
in every fields it is important to protect and analyse the
data from external factors and predicting the sensitive
data from very large enormous heterogeneous data. From
the above literature survey we proposed the project work
which includes the methods of clustering and some
cryptographic techniques which help us to understand
and protect the sensitive data and its importance. The
security and privacy of sensitive data will help us in
making risk lower. Privacy and protection helps in
maintain strong security controls.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 04 | Apr 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2488
REFERENCES
[1] Xuancheng Guo, Hui Lin, Yulei Wu, Min Peng. "A
new data clustering strategy for enhancing mutual
privacy in healthcare IoT systems," Future
Generation Computer Systems, 2020
[2] Jaap Wieringa, P.K. Kannan, Xiao Ma, Thomas
Reutterer, Hans Risselada, Bernd Skiera. "Data
analytics in a privacy-concerned world," Journal
of Business Research, 2019
[3] Weibei Fan, Jing He, Mengjiao Guo, Peng Li,
ZhijieHan, Ruchuan Wang. "Privacypreserving
classification on local differential privacy in
datacenters," Journal of Parallel and Distributed
Computing, 2020
[4] "Advances in Big Data and Cloud Computing,"
Springer Science and Business Media LLC, 2019
[5] “Predictive privacy: towards an applied ethics of
data analytics” Springer Science and Business
Media LLC,2021Mühlhoff, Rainer. (2021)
[6] Chang Xia,Jingyu Hua,Wei Tong,Sheng Zhong”
Distributed K-Means Clustering guaranteeing
local differential privacy”, Journal of Computers
and security ,2020
[7] Ranjeet Devarakonda, Jitendra Kumar, Giri
Prakash.” Clustering based predictive analytics to
improve Scientific Data Discovery”
[8] Mukesh Soni, Yash Kumar Barot, S. Gomathi,” A
review of Privacy-Preserving Data Preprocessing”
Journal of Cybersecurity and Information
Management
[9] Aditya Hegde, Helen Mollering, Thomas
Schneider, Hossein Yalame”: Efficient privacy
preserving clustering” Proceedings on Privacy
Enhancing Technologies, 2021
[10] Jacob N Smith, Lisa Reece, Peter Szaniszlo,
Rosemary C Leary, James F Leary” Subtractive
clustering analysis” Proceedings of SPIE – The
International Society for Optical Engineering,
March 2005
[11] Mengmeng Yang, Lingjuan Lyu, Jun Zhao, Tianqing
Zhu, Kwok-Yan Lam” Local differential privacy
and its applications.” Journal of Latex Class files,
August 2015
[12] Wedel, Michel & Kannan, P. K.. (2016). Marketing
Analytics for Data-Rich Environments. Journal of
Marketing. 80. 10.1509/jm.15.0413.
[13] Erevelles, Sunil & Fukawa, Nobuyuki & Swayne,
Linda. (2015). Big Data Consumer Analytics and
the Transformation of Marketing. Journal of
Business Research.
10.1016/j.jbusres.2015.07.001.
[14] Sivarajah, Uthayasankar & Kamal, Muhammad &
Irani, Zahir & Weerakkody, Vishanth. (2016).
Critical analysis of Big Data challenges and
analytical methods. Journal of Business Research.
70. 10.1016/j.jbusres.2016.08.001.
BIOGRAPHIES
Juturu Mansi
1DT18IS040
Dept. of Information Science
Engineering
Dayananda Sagar Academy of
Technology and Management
Bhavana Y N
1DT18IS016
Dept. of Information Science
Engineering
Dayananda Sagar Academy of
Technology and Management
Ishwarya T
1DT18IS037
Dept. of Information Science
Engineering
Dayananda Sagar Academy of
Technology and Management
Lethishaa.P
1DT18IS046
Dept. of Information Science
Engineering
Dayananda Sagar Academy of
Technology and Management
Prof. Sowmya S R
Dept. of Information Science
Engineering
Dayananda Sagar Academy of
Technology and Management

More Related Content

Similar to THE CRYPTO CLUSTERING FOR ENHANCEMENT OF DATA PRIVACY

IRJET- Big Data Privacy and Security Challenges in Industries
IRJET- Big Data Privacy and Security Challenges in IndustriesIRJET- Big Data Privacy and Security Challenges in Industries
IRJET- Big Data Privacy and Security Challenges in Industries
IRJET Journal
 
IRJET- A Core Medical Treatment System forEmergency Management using Cloud
IRJET- A Core Medical Treatment System forEmergency Management using CloudIRJET- A Core Medical Treatment System forEmergency Management using Cloud
IRJET- A Core Medical Treatment System forEmergency Management using Cloud
IRJET Journal
 
Data security and privacy
Data security and privacyData security and privacy
Data security and privacy
rajab ssemwogerere
 
Anti Collusion Data Sharing Schema for Centralized Group in Cloud
Anti Collusion Data Sharing Schema for Centralized Group in CloudAnti Collusion Data Sharing Schema for Centralized Group in Cloud
Anti Collusion Data Sharing Schema for Centralized Group in Cloud
IRJET Journal
 
DATA SCIENCE METHODOLOGY FOR CYBERSECURITY PROJECTS
DATA SCIENCE METHODOLOGY FOR CYBERSECURITY PROJECTS DATA SCIENCE METHODOLOGY FOR CYBERSECURITY PROJECTS
DATA SCIENCE METHODOLOGY FOR CYBERSECURITY PROJECTS
cscpconf
 
FEDERAL LEARNING BASED SOLUTIONS FOR PRIVACY AND ANONYMITY IN INTERNET OF MED...
FEDERAL LEARNING BASED SOLUTIONS FOR PRIVACY AND ANONYMITY IN INTERNET OF MED...FEDERAL LEARNING BASED SOLUTIONS FOR PRIVACY AND ANONYMITY IN INTERNET OF MED...
FEDERAL LEARNING BASED SOLUTIONS FOR PRIVACY AND ANONYMITY IN INTERNET OF MED...
IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
 
Cloud Based Privacy Preserving Data Encryption
Cloud Based Privacy Preserving Data EncryptionCloud Based Privacy Preserving Data Encryption
Cloud Based Privacy Preserving Data Encryption
IRJET Journal
 
New approaches of Data Mining for the Internet of things with systems: Litera...
New approaches of Data Mining for the Internet of things with systems: Litera...New approaches of Data Mining for the Internet of things with systems: Litera...
New approaches of Data Mining for the Internet of things with systems: Litera...
IRJET Journal
 
IRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
IRJET- An Efficient Solitude Securing Ranked Keyword Search TechniqueIRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
IRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
IRJET Journal
 
Cluster Based Access Privilege Management Scheme for Databases
Cluster Based Access Privilege Management Scheme for DatabasesCluster Based Access Privilege Management Scheme for Databases
Cluster Based Access Privilege Management Scheme for Databases
Editor IJMTER
 
A Study on Big Data Privacy Protection Models using Data Masking Methods
A Study on Big Data Privacy Protection Models using Data Masking Methods A Study on Big Data Privacy Protection Models using Data Masking Methods
A Study on Big Data Privacy Protection Models using Data Masking Methods
IJECEIAES
 
IRJET- A Data Sharing Protocol to Minimize Security and Privacy Risks in Clou...
IRJET- A Data Sharing Protocol to Minimize Security and Privacy Risks in Clou...IRJET- A Data Sharing Protocol to Minimize Security and Privacy Risks in Clou...
IRJET- A Data Sharing Protocol to Minimize Security and Privacy Risks in Clou...
IRJET Journal
 
Secure Multimedia Content Protection and Sharing
Secure Multimedia Content Protection and SharingSecure Multimedia Content Protection and Sharing
Secure Multimedia Content Protection and Sharing
IRJET Journal
 
IRJET- An Data Sharing in Group Member with High Security using Symmetric Bal...
IRJET- An Data Sharing in Group Member with High Security using Symmetric Bal...IRJET- An Data Sharing in Group Member with High Security using Symmetric Bal...
IRJET- An Data Sharing in Group Member with High Security using Symmetric Bal...
IRJET Journal
 
A Novel Healthcare-based Block chain (HBC) System for Security Healthcare Dat...
A Novel Healthcare-based Block chain (HBC) System for Security Healthcare Dat...A Novel Healthcare-based Block chain (HBC) System for Security Healthcare Dat...
A Novel Healthcare-based Block chain (HBC) System for Security Healthcare Dat...
IRJET Journal
 
EPLQ:Efficient privacy preserving spatial range query for smart phones
EPLQ:Efficient privacy preserving spatial range query for smart phonesEPLQ:Efficient privacy preserving spatial range query for smart phones
EPLQ:Efficient privacy preserving spatial range query for smart phones
IRJET Journal
 
A systematic mapping study of security, trust and privacy in clouds
A systematic mapping study of security, trust and privacy in cloudsA systematic mapping study of security, trust and privacy in clouds
A systematic mapping study of security, trust and privacy in clouds
journalBEEI
 
IRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud DataIRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud Data
IRJET Journal
 
Sheet1Country ACountry BProduct 110 Reds9 GreensProduct 22 Reds2.2.docx
Sheet1Country ACountry BProduct 110 Reds9 GreensProduct 22 Reds2.2.docxSheet1Country ACountry BProduct 110 Reds9 GreensProduct 22 Reds2.2.docx
Sheet1Country ACountry BProduct 110 Reds9 GreensProduct 22 Reds2.2.docx
edgar6wallace88877
 

Similar to THE CRYPTO CLUSTERING FOR ENHANCEMENT OF DATA PRIVACY (20)

IRJET- Big Data Privacy and Security Challenges in Industries
IRJET- Big Data Privacy and Security Challenges in IndustriesIRJET- Big Data Privacy and Security Challenges in Industries
IRJET- Big Data Privacy and Security Challenges in Industries
 
IRJET- A Core Medical Treatment System forEmergency Management using Cloud
IRJET- A Core Medical Treatment System forEmergency Management using CloudIRJET- A Core Medical Treatment System forEmergency Management using Cloud
IRJET- A Core Medical Treatment System forEmergency Management using Cloud
 
Data security and privacy
Data security and privacyData security and privacy
Data security and privacy
 
Anti Collusion Data Sharing Schema for Centralized Group in Cloud
Anti Collusion Data Sharing Schema for Centralized Group in CloudAnti Collusion Data Sharing Schema for Centralized Group in Cloud
Anti Collusion Data Sharing Schema for Centralized Group in Cloud
 
DATA SCIENCE METHODOLOGY FOR CYBERSECURITY PROJECTS
DATA SCIENCE METHODOLOGY FOR CYBERSECURITY PROJECTS DATA SCIENCE METHODOLOGY FOR CYBERSECURITY PROJECTS
DATA SCIENCE METHODOLOGY FOR CYBERSECURITY PROJECTS
 
FEDERAL LEARNING BASED SOLUTIONS FOR PRIVACY AND ANONYMITY IN INTERNET OF MED...
FEDERAL LEARNING BASED SOLUTIONS FOR PRIVACY AND ANONYMITY IN INTERNET OF MED...FEDERAL LEARNING BASED SOLUTIONS FOR PRIVACY AND ANONYMITY IN INTERNET OF MED...
FEDERAL LEARNING BASED SOLUTIONS FOR PRIVACY AND ANONYMITY IN INTERNET OF MED...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Cloud Based Privacy Preserving Data Encryption
Cloud Based Privacy Preserving Data EncryptionCloud Based Privacy Preserving Data Encryption
Cloud Based Privacy Preserving Data Encryption
 
New approaches of Data Mining for the Internet of things with systems: Litera...
New approaches of Data Mining for the Internet of things with systems: Litera...New approaches of Data Mining for the Internet of things with systems: Litera...
New approaches of Data Mining for the Internet of things with systems: Litera...
 
IRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
IRJET- An Efficient Solitude Securing Ranked Keyword Search TechniqueIRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
IRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
 
Cluster Based Access Privilege Management Scheme for Databases
Cluster Based Access Privilege Management Scheme for DatabasesCluster Based Access Privilege Management Scheme for Databases
Cluster Based Access Privilege Management Scheme for Databases
 
A Study on Big Data Privacy Protection Models using Data Masking Methods
A Study on Big Data Privacy Protection Models using Data Masking Methods A Study on Big Data Privacy Protection Models using Data Masking Methods
A Study on Big Data Privacy Protection Models using Data Masking Methods
 
IRJET- A Data Sharing Protocol to Minimize Security and Privacy Risks in Clou...
IRJET- A Data Sharing Protocol to Minimize Security and Privacy Risks in Clou...IRJET- A Data Sharing Protocol to Minimize Security and Privacy Risks in Clou...
IRJET- A Data Sharing Protocol to Minimize Security and Privacy Risks in Clou...
 
Secure Multimedia Content Protection and Sharing
Secure Multimedia Content Protection and SharingSecure Multimedia Content Protection and Sharing
Secure Multimedia Content Protection and Sharing
 
IRJET- An Data Sharing in Group Member with High Security using Symmetric Bal...
IRJET- An Data Sharing in Group Member with High Security using Symmetric Bal...IRJET- An Data Sharing in Group Member with High Security using Symmetric Bal...
IRJET- An Data Sharing in Group Member with High Security using Symmetric Bal...
 
A Novel Healthcare-based Block chain (HBC) System for Security Healthcare Dat...
A Novel Healthcare-based Block chain (HBC) System for Security Healthcare Dat...A Novel Healthcare-based Block chain (HBC) System for Security Healthcare Dat...
A Novel Healthcare-based Block chain (HBC) System for Security Healthcare Dat...
 
EPLQ:Efficient privacy preserving spatial range query for smart phones
EPLQ:Efficient privacy preserving spatial range query for smart phonesEPLQ:Efficient privacy preserving spatial range query for smart phones
EPLQ:Efficient privacy preserving spatial range query for smart phones
 
A systematic mapping study of security, trust and privacy in clouds
A systematic mapping study of security, trust and privacy in cloudsA systematic mapping study of security, trust and privacy in clouds
A systematic mapping study of security, trust and privacy in clouds
 
IRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud DataIRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud Data
 
Sheet1Country ACountry BProduct 110 Reds9 GreensProduct 22 Reds2.2.docx
Sheet1Country ACountry BProduct 110 Reds9 GreensProduct 22 Reds2.2.docxSheet1Country ACountry BProduct 110 Reds9 GreensProduct 22 Reds2.2.docx
Sheet1Country ACountry BProduct 110 Reds9 GreensProduct 22 Reds2.2.docx
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
 
Solving Linear Differential Equations with Constant Coefficients
Solving Linear Differential Equations with Constant CoefficientsSolving Linear Differential Equations with Constant Coefficients
Solving Linear Differential Equations with Constant Coefficients
IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 
Solving Linear Differential Equations with Constant Coefficients
Solving Linear Differential Equations with Constant CoefficientsSolving Linear Differential Equations with Constant Coefficients
Solving Linear Differential Equations with Constant Coefficients
 

Recently uploaded

Sachpazis_Consolidation Settlement Calculation Program-The Python Code and th...
Sachpazis_Consolidation Settlement Calculation Program-The Python Code and th...Sachpazis_Consolidation Settlement Calculation Program-The Python Code and th...
Sachpazis_Consolidation Settlement Calculation Program-The Python Code and th...
Dr.Costas Sachpazis
 
Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation w...
Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation w...Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation w...
Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation w...
IJCNCJournal
 
Hot Call Girls In Bangalore ✔ 9079923931 ✔ Hi I Am Divya Vip Call Girl Servic...
Hot Call Girls In Bangalore ✔ 9079923931 ✔ Hi I Am Divya Vip Call Girl Servic...Hot Call Girls In Bangalore ✔ 9079923931 ✔ Hi I Am Divya Vip Call Girl Servic...
Hot Call Girls In Bangalore ✔ 9079923931 ✔ Hi I Am Divya Vip Call Girl Servic...
Banerescorts
 
High Profile Call Girls Ahmedabad 🔥 7737669865 🔥 Real Fun With Sexual Girl Av...
High Profile Call Girls Ahmedabad 🔥 7737669865 🔥 Real Fun With Sexual Girl Av...High Profile Call Girls Ahmedabad 🔥 7737669865 🔥 Real Fun With Sexual Girl Av...
High Profile Call Girls Ahmedabad 🔥 7737669865 🔥 Real Fun With Sexual Girl Av...
dABGO KI CITy kUSHINAGAR Ak47
 
SELENIUM CONF -PALLAVI SHARMA - 2024.pdf
SELENIUM CONF -PALLAVI SHARMA - 2024.pdfSELENIUM CONF -PALLAVI SHARMA - 2024.pdf
SELENIUM CONF -PALLAVI SHARMA - 2024.pdf
Pallavi Sharma
 
Intuit CRAFT demonstration presentation for sde
Intuit CRAFT demonstration presentation for sdeIntuit CRAFT demonstration presentation for sde
Intuit CRAFT demonstration presentation for sde
ShivangMishra54
 
MODULE 5 BIOLOGY FOR ENGINEERS TRENDS IN BIO ENGINEERING.pptx
MODULE 5 BIOLOGY FOR ENGINEERS TRENDS IN BIO ENGINEERING.pptxMODULE 5 BIOLOGY FOR ENGINEERS TRENDS IN BIO ENGINEERING.pptx
MODULE 5 BIOLOGY FOR ENGINEERS TRENDS IN BIO ENGINEERING.pptx
NaveenNaveen726446
 
一比一原版(UO毕业证)渥太华大学毕业证如何办理
一比一原版(UO毕业证)渥太华大学毕业证如何办理一比一原版(UO毕业证)渥太华大学毕业证如何办理
一比一原版(UO毕业证)渥太华大学毕业证如何办理
gapboxn
 
Sri Guru Hargobind Ji - Bandi Chor Guru.pdf
Sri Guru Hargobind Ji - Bandi Chor Guru.pdfSri Guru Hargobind Ji - Bandi Chor Guru.pdf
Sri Guru Hargobind Ji - Bandi Chor Guru.pdf
Balvir Singh
 
The Differences between Schedule 40 PVC Conduit Pipe and Schedule 80 PVC Conduit
The Differences between Schedule 40 PVC Conduit Pipe and Schedule 80 PVC ConduitThe Differences between Schedule 40 PVC Conduit Pipe and Schedule 80 PVC Conduit
The Differences between Schedule 40 PVC Conduit Pipe and Schedule 80 PVC Conduit
Guangdong Ctube Industry Co., Ltd.
 
Call Girls Madurai 8824825030 Escort In Madurai service 24X7
Call Girls Madurai 8824825030 Escort In Madurai service 24X7Call Girls Madurai 8824825030 Escort In Madurai service 24X7
Call Girls Madurai 8824825030 Escort In Madurai service 24X7
Poonam Singh
 
Kandivali Call Girls ☑ +91-9967584737 ☑ Available Hot Girls Aunty Book Now
Kandivali Call Girls ☑ +91-9967584737 ☑ Available Hot Girls Aunty Book NowKandivali Call Girls ☑ +91-9967584737 ☑ Available Hot Girls Aunty Book Now
Kandivali Call Girls ☑ +91-9967584737 ☑ Available Hot Girls Aunty Book Now
SONALI Batra $A12
 
FUNDAMENTALS OF MECHANICAL ENGINEERING.pdf
FUNDAMENTALS OF MECHANICAL ENGINEERING.pdfFUNDAMENTALS OF MECHANICAL ENGINEERING.pdf
FUNDAMENTALS OF MECHANICAL ENGINEERING.pdf
EMERSON EDUARDO RODRIGUES
 
BBOC407 Module 1.pptx Biology for Engineers
BBOC407  Module 1.pptx Biology for EngineersBBOC407  Module 1.pptx Biology for Engineers
BBOC407 Module 1.pptx Biology for Engineers
sathishkumars808912
 
Better Builder Magazine, Issue 49 / Spring 2024
Better Builder Magazine, Issue 49 / Spring 2024Better Builder Magazine, Issue 49 / Spring 2024
Better Builder Magazine, Issue 49 / Spring 2024
Better Builder Magazine
 
Microsoft Azure AD architecture and features
Microsoft Azure AD architecture and featuresMicrosoft Azure AD architecture and features
Microsoft Azure AD architecture and features
ssuser381403
 
Butterfly Valves Manufacturer (LBF Series).pdf
Butterfly Valves Manufacturer (LBF Series).pdfButterfly Valves Manufacturer (LBF Series).pdf
Butterfly Valves Manufacturer (LBF Series).pdf
Lubi Valves
 
AN INTRODUCTION OF AI & SEARCHING TECHIQUES
AN INTRODUCTION OF AI & SEARCHING TECHIQUESAN INTRODUCTION OF AI & SEARCHING TECHIQUES
AN INTRODUCTION OF AI & SEARCHING TECHIQUES
drshikhapandey2022
 
My Airframe Metallic Design Capability Studies..pdf
My Airframe Metallic Design Capability Studies..pdfMy Airframe Metallic Design Capability Studies..pdf
My Airframe Metallic Design Capability Studies..pdf
Geoffrey Wardle. MSc. MSc. Snr.MAIAA
 
Mahipalpur Call Girls Delhi 🔥 9711199012 ❄- Pick Your Dream Call Girls with 1...
Mahipalpur Call Girls Delhi 🔥 9711199012 ❄- Pick Your Dream Call Girls with 1...Mahipalpur Call Girls Delhi 🔥 9711199012 ❄- Pick Your Dream Call Girls with 1...
Mahipalpur Call Girls Delhi 🔥 9711199012 ❄- Pick Your Dream Call Girls with 1...
simrangupta87541
 

Recently uploaded (20)

Sachpazis_Consolidation Settlement Calculation Program-The Python Code and th...
Sachpazis_Consolidation Settlement Calculation Program-The Python Code and th...Sachpazis_Consolidation Settlement Calculation Program-The Python Code and th...
Sachpazis_Consolidation Settlement Calculation Program-The Python Code and th...
 
Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation w...
Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation w...Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation w...
Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation w...
 
Hot Call Girls In Bangalore ✔ 9079923931 ✔ Hi I Am Divya Vip Call Girl Servic...
Hot Call Girls In Bangalore ✔ 9079923931 ✔ Hi I Am Divya Vip Call Girl Servic...Hot Call Girls In Bangalore ✔ 9079923931 ✔ Hi I Am Divya Vip Call Girl Servic...
Hot Call Girls In Bangalore ✔ 9079923931 ✔ Hi I Am Divya Vip Call Girl Servic...
 
High Profile Call Girls Ahmedabad 🔥 7737669865 🔥 Real Fun With Sexual Girl Av...
High Profile Call Girls Ahmedabad 🔥 7737669865 🔥 Real Fun With Sexual Girl Av...High Profile Call Girls Ahmedabad 🔥 7737669865 🔥 Real Fun With Sexual Girl Av...
High Profile Call Girls Ahmedabad 🔥 7737669865 🔥 Real Fun With Sexual Girl Av...
 
SELENIUM CONF -PALLAVI SHARMA - 2024.pdf
SELENIUM CONF -PALLAVI SHARMA - 2024.pdfSELENIUM CONF -PALLAVI SHARMA - 2024.pdf
SELENIUM CONF -PALLAVI SHARMA - 2024.pdf
 
Intuit CRAFT demonstration presentation for sde
Intuit CRAFT demonstration presentation for sdeIntuit CRAFT demonstration presentation for sde
Intuit CRAFT demonstration presentation for sde
 
MODULE 5 BIOLOGY FOR ENGINEERS TRENDS IN BIO ENGINEERING.pptx
MODULE 5 BIOLOGY FOR ENGINEERS TRENDS IN BIO ENGINEERING.pptxMODULE 5 BIOLOGY FOR ENGINEERS TRENDS IN BIO ENGINEERING.pptx
MODULE 5 BIOLOGY FOR ENGINEERS TRENDS IN BIO ENGINEERING.pptx
 
一比一原版(UO毕业证)渥太华大学毕业证如何办理
一比一原版(UO毕业证)渥太华大学毕业证如何办理一比一原版(UO毕业证)渥太华大学毕业证如何办理
一比一原版(UO毕业证)渥太华大学毕业证如何办理
 
Sri Guru Hargobind Ji - Bandi Chor Guru.pdf
Sri Guru Hargobind Ji - Bandi Chor Guru.pdfSri Guru Hargobind Ji - Bandi Chor Guru.pdf
Sri Guru Hargobind Ji - Bandi Chor Guru.pdf
 
The Differences between Schedule 40 PVC Conduit Pipe and Schedule 80 PVC Conduit
The Differences between Schedule 40 PVC Conduit Pipe and Schedule 80 PVC ConduitThe Differences between Schedule 40 PVC Conduit Pipe and Schedule 80 PVC Conduit
The Differences between Schedule 40 PVC Conduit Pipe and Schedule 80 PVC Conduit
 
Call Girls Madurai 8824825030 Escort In Madurai service 24X7
Call Girls Madurai 8824825030 Escort In Madurai service 24X7Call Girls Madurai 8824825030 Escort In Madurai service 24X7
Call Girls Madurai 8824825030 Escort In Madurai service 24X7
 
Kandivali Call Girls ☑ +91-9967584737 ☑ Available Hot Girls Aunty Book Now
Kandivali Call Girls ☑ +91-9967584737 ☑ Available Hot Girls Aunty Book NowKandivali Call Girls ☑ +91-9967584737 ☑ Available Hot Girls Aunty Book Now
Kandivali Call Girls ☑ +91-9967584737 ☑ Available Hot Girls Aunty Book Now
 
FUNDAMENTALS OF MECHANICAL ENGINEERING.pdf
FUNDAMENTALS OF MECHANICAL ENGINEERING.pdfFUNDAMENTALS OF MECHANICAL ENGINEERING.pdf
FUNDAMENTALS OF MECHANICAL ENGINEERING.pdf
 
BBOC407 Module 1.pptx Biology for Engineers
BBOC407  Module 1.pptx Biology for EngineersBBOC407  Module 1.pptx Biology for Engineers
BBOC407 Module 1.pptx Biology for Engineers
 
Better Builder Magazine, Issue 49 / Spring 2024
Better Builder Magazine, Issue 49 / Spring 2024Better Builder Magazine, Issue 49 / Spring 2024
Better Builder Magazine, Issue 49 / Spring 2024
 
Microsoft Azure AD architecture and features
Microsoft Azure AD architecture and featuresMicrosoft Azure AD architecture and features
Microsoft Azure AD architecture and features
 
Butterfly Valves Manufacturer (LBF Series).pdf
Butterfly Valves Manufacturer (LBF Series).pdfButterfly Valves Manufacturer (LBF Series).pdf
Butterfly Valves Manufacturer (LBF Series).pdf
 
AN INTRODUCTION OF AI & SEARCHING TECHIQUES
AN INTRODUCTION OF AI & SEARCHING TECHIQUESAN INTRODUCTION OF AI & SEARCHING TECHIQUES
AN INTRODUCTION OF AI & SEARCHING TECHIQUES
 
My Airframe Metallic Design Capability Studies..pdf
My Airframe Metallic Design Capability Studies..pdfMy Airframe Metallic Design Capability Studies..pdf
My Airframe Metallic Design Capability Studies..pdf
 
Mahipalpur Call Girls Delhi 🔥 9711199012 ❄- Pick Your Dream Call Girls with 1...
Mahipalpur Call Girls Delhi 🔥 9711199012 ❄- Pick Your Dream Call Girls with 1...Mahipalpur Call Girls Delhi 🔥 9711199012 ❄- Pick Your Dream Call Girls with 1...
Mahipalpur Call Girls Delhi 🔥 9711199012 ❄- Pick Your Dream Call Girls with 1...
 

THE CRYPTO CLUSTERING FOR ENHANCEMENT OF DATA PRIVACY

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 04 | Apr 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2486 THE CRYPTO CLUSTERING FOR ENHANCEMENT OF DATA PRIVACY JUTURU MANSI1, BHAVANA Y N2, ISHWARYA T3, LETHISHAA P4, SOWMYA S R5 1,2,3,4 Dept. of Information Science Engineering, Dayananda Sagar Academy of Technology and Management, Karnataka, India 5 Prof. Sowmya S R, Dept. of Information Science Engineering, Dayananda Sagar Academy of Technology and Management, Karnataka, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Due to the improved technology, large amounts of Heterogeneous Data are collected. Though there are benefits due this technology there are some sensitive and private information that is exposed. Therefore, it is very much important to implement the privacy- preserving methods that helps us to protect the sensitive data. In this paper we perform a systematic analysis on some of the privacy preserving methods and result in securing the Heterogeneous Sensitive Data. Key Words: Data, Privacy, Cluster, Information, Security, Euclidean Distance 1. INTRODUCTION The data that is continuously collected by the new technologies and many source have many advantages and benefits despite these there is large exposure of the private and the sensitive data of the user that is used for malicious uses and illegal businesses. since this issue is very common in today’s world and is more important topic raised about the privacy concerns. To solve this many methods are used, we are trying to automatize the privacy protection by analysing the type of data and to protect the accordingly. In order to reduce the complications and third-party issues. 2. LITERATURE SURVEY In the advancement [8] Health care data has incredible potential for further developing the medical care framework and furthermore giving quick and precise results to patients, foreseeing sickness flare-ups, acquiring significant data for expectation in future. Concluding the authentic use of data while saving the patient's character assurance is a mind-boggling task. Medical care association generally embrace information development to diminish costs and further develop capability and quality in the medical care framework to make it quick. Delicate information, for example, identifiers, names, locations and federal retirement aide number should be altered, changed or shortened from the first data set, with the goal that any other individual who gets the information can't think twice about security of the licenses. Information security components incorporate secrecy, honesty, accessibility and responsibility. Innovations being used are verification, encryption, veiling information, access control, examining and checking, biometrics and cryptographic calculations. A definitive way to deal with dealing with the utilization and divulgence of individual wellbeing data is best for patients, individual analysts, medical services associations and society too. For the individuals who don't follow great security and protection rehearses, the gamble is higher. Ill-advised use or exposure of future regulations and guidelines might increment information misfortune and information break for unsafe purposes. Notwithstanding the rising accentuation on research association ought to apply similar general approaches to help the direct of medical care for research. Their method initially bothers clients' information locally to meet neighborhood differential security. Then, in light of the exceptionally concerned information, it reconsiders the standard K-implies strategy to permit the specialist co-op to deliver great grouping results by helping out purchasers. They show that the plan takes into consideration high utility bunching while at the same time guaranteeing neighborhood differential security for every client. They additionally recommend an upgraded way to deal with work on the security and utility of our essential model. In each round of this method, they upset the two clients' touchy information and the between time consequences of clients' bunches. Besides, they examine a more nonexclusive situation where clients might have fluctuating security needs. Broad tests are completed on two genuine world datasets, with the outcomes exhibiting that our answer may really hold the nature of grouping results. [6] They recommended a neighborhood differential security based arrangement method for server farms. The differential security insurance technique is acquainted with server farm information mining to manage Laplace commotion of delicate data in the example mining process. Through severe numerical confirmation, they conceived a way for measuring the nature of security assurance. Tests have shown that this exploration's differential protection based characterization technique is more proficient, secure, and precise cycle. The calculation gives strong security insurance characteristics and great practicality to guarantee accessibility. [3]
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 04 | Apr 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2487 The idea of prescient security to form a moral guideline safeguarding people and gatherings against differential treatment.it investigations the commonplace information handling pattern of prescient framework to give a bit by bit conversation of moral ramifications, finding event of prescient protection infringement. subjectively is a better approach for prescient investigation challenges moral standards like human pride and the thought of individual security. The moral methodology of this paper tends to the twofold test in regards to security and information assurance because of the chance of prescient delicate data about people from intermediary information through sidelong correlation with be the information to numerous information contributors. Assessment of prescient framework utilizing insignificant model of ordinary information handling cycle which incorporates preparing information procurement, preparing the model, dispersing the model, gathering intermediary information, surmising, forecast, refreshing preparation information and following misprediction. [5] The recommender framework idea has been around for quite a while and is especially famous in electronic commercial centers, which offer a phenomenal scope of items. a. The calculation will be on express and implied collaborations with the information search framework. A few strategies and informational indexes will be applied to catch such collaborations. Content-based sifting and cooperative separating are usually utilized strategies to channel information. After we have procured, separated, and reviewed the information, we use it to make an unaided learning model. Bunching is quite possibly the most well known scientific procedure to bunch comparative articles. The objective is to isolate bunches with comparative things and dole out them into the groups. Euclidean distance and progressive grouping are the procedures that are not difficult to be applied and choice trees will help in choosing the size of bunches. [7] Security worries over their own information, particularly after the rise of new advances for the top to bottom investigation of the client's information, for example, names, locations and recognizable proof card numbers which raises worries about their protection. To tackle this issue, we utilize nearby differential protection (LDP)- This bothers the client's information locally before the information leaves the client's gadget to such an extent that main the proprietor can get to the information. The private information is being grouped and safeguarded utilizing LDP. Utilization of LDP helps in replication and keep up with authenticity of client information. [11] 3. PROPOSED WORK The proposed work targets on the mixed data to be protected based on the prediction of the sensitivity and protection mechanism used. Protection mechanism is the cryptographic implementation based on the sensitive data identified. Initially sensitivity is measured based on the methods such as distance measured comparison etc. suitable for the data type. The proposed work flow is as follows: Fig -1: Proposed work 4. CONCLUSION As the sensitive data is very important and plays vital role in every fields it is important to protect and analyse the data from external factors and predicting the sensitive data from very large enormous heterogeneous data. From the above literature survey we proposed the project work which includes the methods of clustering and some cryptographic techniques which help us to understand and protect the sensitive data and its importance. The security and privacy of sensitive data will help us in making risk lower. Privacy and protection helps in maintain strong security controls.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 04 | Apr 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2488 REFERENCES [1] Xuancheng Guo, Hui Lin, Yulei Wu, Min Peng. "A new data clustering strategy for enhancing mutual privacy in healthcare IoT systems," Future Generation Computer Systems, 2020 [2] Jaap Wieringa, P.K. Kannan, Xiao Ma, Thomas Reutterer, Hans Risselada, Bernd Skiera. "Data analytics in a privacy-concerned world," Journal of Business Research, 2019 [3] Weibei Fan, Jing He, Mengjiao Guo, Peng Li, ZhijieHan, Ruchuan Wang. "Privacypreserving classification on local differential privacy in datacenters," Journal of Parallel and Distributed Computing, 2020 [4] "Advances in Big Data and Cloud Computing," Springer Science and Business Media LLC, 2019 [5] “Predictive privacy: towards an applied ethics of data analytics” Springer Science and Business Media LLC,2021Mühlhoff, Rainer. (2021) [6] Chang Xia,Jingyu Hua,Wei Tong,Sheng Zhong” Distributed K-Means Clustering guaranteeing local differential privacy”, Journal of Computers and security ,2020 [7] Ranjeet Devarakonda, Jitendra Kumar, Giri Prakash.” Clustering based predictive analytics to improve Scientific Data Discovery” [8] Mukesh Soni, Yash Kumar Barot, S. Gomathi,” A review of Privacy-Preserving Data Preprocessing” Journal of Cybersecurity and Information Management [9] Aditya Hegde, Helen Mollering, Thomas Schneider, Hossein Yalame”: Efficient privacy preserving clustering” Proceedings on Privacy Enhancing Technologies, 2021 [10] Jacob N Smith, Lisa Reece, Peter Szaniszlo, Rosemary C Leary, James F Leary” Subtractive clustering analysis” Proceedings of SPIE – The International Society for Optical Engineering, March 2005 [11] Mengmeng Yang, Lingjuan Lyu, Jun Zhao, Tianqing Zhu, Kwok-Yan Lam” Local differential privacy and its applications.” Journal of Latex Class files, August 2015 [12] Wedel, Michel & Kannan, P. K.. (2016). Marketing Analytics for Data-Rich Environments. Journal of Marketing. 80. 10.1509/jm.15.0413. [13] Erevelles, Sunil & Fukawa, Nobuyuki & Swayne, Linda. (2015). Big Data Consumer Analytics and the Transformation of Marketing. Journal of Business Research. 10.1016/j.jbusres.2015.07.001. [14] Sivarajah, Uthayasankar & Kamal, Muhammad & Irani, Zahir & Weerakkody, Vishanth. (2016). Critical analysis of Big Data challenges and analytical methods. Journal of Business Research. 70. 10.1016/j.jbusres.2016.08.001. BIOGRAPHIES Juturu Mansi 1DT18IS040 Dept. of Information Science Engineering Dayananda Sagar Academy of Technology and Management Bhavana Y N 1DT18IS016 Dept. of Information Science Engineering Dayananda Sagar Academy of Technology and Management Ishwarya T 1DT18IS037 Dept. of Information Science Engineering Dayananda Sagar Academy of Technology and Management Lethishaa.P 1DT18IS046 Dept. of Information Science Engineering Dayananda Sagar Academy of Technology and Management Prof. Sowmya S R Dept. of Information Science Engineering Dayananda Sagar Academy of Technology and Management
  翻译: