Jove
Visualize
Contact Us
JoVE
x logofacebook logolinkedin logoyoutube logo
ABOUT JoVE
OverviewLeadershipBlogJoVE Help Center
AUTHORS
Publishing ProcessEditorial BoardScope & PoliciesPeer ReviewFAQSubmit
LIBRARIANS
TestimonialsSubscriptionsAccessResourcesLibrary Advisory BoardFAQ
RESEARCH
JoVE JournalMethods CollectionsJoVE Encyclopedia of ExperimentsArchive
EDUCATION
JoVE CoreJoVE BusinessJoVE Science EducationJoVE Lab ManualFaculty Resource CenterFaculty Site
Terms & Conditions of Use
Privacy Policy
Policies

Related Concept Videos

Maximum Size of Aggregate01:12

Maximum Size of Aggregate

59
The maximum size of aggregate is defined as the aperture of the sieve retaining 15 percent or more of the particles present in the aggregate sample. The aggregate's maximum size impacts the concrete's water requirement, workability, and strength. Larger aggregates reduce the surface area needing cement paste coverage, which can lower water needs, thereby allowing a decrease in the water-to-cement ratio when the desired workability and richness of the mix are to be maintained, which can...
59
Woodward–Hoffmann Selection Rules and Microscopic Reversibility01:34

Woodward–Hoffmann Selection Rules and Microscopic Reversibility

2.9K
Electrocyclic reactions, cycloadditions, and sigmatropic rearrangements are concerted pericyclic reactions that proceed via a cyclic transition state. These reactions are stereospecific and regioselective. The stereochemistry of the products depends on the symmetry characteristics of the interacting orbitals and the reaction conditions. Accordingly, pericyclic reactions are classified as either symmetry-allowed or symmetry-forbidden. Woodward and Hoffmann presented the selection criteria for...
2.9K
Hückel's Rule Diagram of π MOs: Frost Circle01:08

Hückel's Rule Diagram of π MOs: Frost Circle

4.2K
The Frost circle or the inscribed polygon method is a graphical method for determining the relative energies of π molecular orbitals (MOs) for planar, fully conjugated, and monocyclic compounds. This method was first described by A. A. Frost and Boris Musulin in 1953.
A Frost circle is constructed by drawing a polygon whose number of edges is equal to the number of carbons of the given cyclic system, with one of the vertices pointing down. Then, a circle is drawn enclosing the polygon so...
4.2K
Law of Independent Assortment02:03

Law of Independent Assortment

51.9K
While Mendel’s Law of Segregation states that the two alleles for one gene are separated into different gametes, a different question of how different genes are inherited remains. For example, is the gene for tall plants inherited with the gene for green peas? Mendel asked this question by experimenting with a dihybrid cross; a cross in which both parents are homozygous for two distinct traits resulting in an F1 generation that are heterozygous for both traits.
51.9K
Distribution Reliability and Automation01:25

Distribution Reliability and Automation

93
Distribution reliability in electrical power systems is critical for ensuring an uninterrupted power supply to consumers at minimal cost. According to IEEE Standard Terms, reliability is the probability that a device will function without failure over a specified time period or amount of usage. For electric power distribution, this translates to maintaining continuous power supply and addressing customer concerns over power outages. Several indices, as defined by IEEE Standard 1366-2012, are...
93
Heuristics01:21

Heuristics

47
Heuristics are problem-solving strategies that use mental shortcuts to simplify decision-making. Unlike algorithms, which must be followed precisely to achieve a correct result, heuristics offer a general problem-solving framework. They save time and energy but can sometimes lead to less rational decisions.
People often rely on heuristics when faced with an overload of information, limited time, low importance of the decision, limited information, or when a heuristic readily comes to mind. For...
47
  1. Home
  2. Research Domains
  3. Information And Computing Sciences
  4. Data Management And Data Science
  5. Query Processing And Optimisation
  6. Mining Privacy-preserving Association Rules Using Transaction Hewer Allocator And Facile Hash Algorithm In Multi-cloud Environments

Mining privacy-preserving association rules using transaction hewer allocator and facile hash algorithm in multi-cloud environments

D Dhinakaran1, S Gopalakrishnan2, D Selvaraj3

  • 1Department of Computer Science and Engineering, Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology, Chennai, India.

Methodsx
|May 7, 2025

Related Experiment Videos

The Collective Trust Game: An Online Group Adaptation of the Trust Game Based on the HoneyComb Paradigm
06:18

The Collective Trust Game: An Online Group Adaptation of the Trust Game Based on the HoneyComb Paradigm

Published on: October 20, 2022

2.0K
Large Scale Energy Efficient Sensor Network Routing Using a Quantum Processor Unit
05:30

Large Scale Energy Efficient Sensor Network Routing Using a Quantum Processor Unit

Published on: September 8, 2023

457
Executing Complexity-Increasing Queries in Relational MySQL and NoSQL MongoDB and EXist Size-Growing ISO/EN 13606 Standardized EHR Databases
07:26

Executing Complexity-Increasing Queries in Relational MySQL and NoSQL MongoDB and EXist Size-Growing ISO/EN 13606 Standardized EHR Databases

Published on: March 19, 2018

9.2K

View abstract on PubMed

Summary
This summary is machine-generated.

This study introduces a multi-cloud privacy framework using the Facile Hash Algorithm (FHA) and Transaction Hewer and Allocator for secure frequent itemset mining. The ATid algorithm enhances scalability and reduces computational time and communication costs.

Area of Science:

  • Computer Science
  • Data Security
  • Cloud Computing

Background:

  • Data-driven decision-making requires secure extraction of knowledge from distributed datasets.
  • Privacy concerns arise when outsourcing data for tasks like frequent itemset mining.
  • Balancing data sensitivity with insight delivery is a key challenge.

Purpose of the Study:

  • To propose a novel multi-cloud privacy framework for secure frequent itemset mining.
  • To enhance the efficiency and scalability of privacy-preserving data mining.
  • To address privacy during data transmission and computation across distributed cloud platforms.

Main Methods:

  • A multi-cloud privacy framework incorporating the Transaction Hewer and Allocator module and the Facile Hash Algorithm (FHA).
  • Introduction of the Apriori with Tid Reduction (ATid) algorithm to improve scalability and computational efficiency.
Keywords:
Association rule miningData encryptionData privacyDistributed data analysis

Related Experiment Videos

The Collective Trust Game: An Online Group Adaptation of the Trust Game Based on the HoneyComb Paradigm
06:18

The Collective Trust Game: An Online Group Adaptation of the Trust Game Based on the HoneyComb Paradigm

Published on: October 20, 2022

2.0K
Large Scale Energy Efficient Sensor Network Routing Using a Quantum Processor Unit
05:30

Large Scale Energy Efficient Sensor Network Routing Using a Quantum Processor Unit

Published on: September 8, 2023

457
Executing Complexity-Increasing Queries in Relational MySQL and NoSQL MongoDB and EXist Size-Growing ISO/EN 13606 Standardized EHR Databases
07:26

Executing Complexity-Increasing Queries in Relational MySQL and NoSQL MongoDB and EXist Size-Growing ISO/EN 13606 Standardized EHR Databases

Published on: March 19, 2018

9.2K
  • Performance evaluation using several datasets to compare with existing methods.
  • Main Results:

    • The proposed framework demonstrates higher performance compared to existing methods.
    • Encryption and decryption processes reduce computational time by up to 25%.
    • Communication costs are reduced by approximately 15%, with improved scalability and reduced communication overhead.

    Conclusions:

    • The multi-cloud privacy framework effectively protects data during transmission and computation.
    • The ATid algorithm significantly enhances scalability and operational efficiency in frequent itemset mining.
    • The proposed approach offers a secure, efficient, and scalable solution for distributed data mining.
    Facile Hash Algorithm, Transaction Hewer and Allocator, and ATid algorithm
    Frequent itemset mining
    Horizontal partitioning