Insider Collusion Attack on Privacy-Preserving Kernel-Based Data Mining Systems - 2016


In this paper, we contemplate a new insider threat for the privacy preserving work of distributed kernel-based mostly information mining (DKBDM), such as distributed support vector machine. Among many known information breaching problems, those related to insider attacks have been rising significantly, creating this one of the fastest growing sorts of security breaches. Once considered a negligible concern, insider attacks have risen to be one amongst the top 3 central information violations. Insider-related analysis involving the distribution of kernel-based knowledge mining is limited, resulting in substantial vulnerabilities in coming up with protection against collaborative organizations. Prior works typically fall short by addressing a multifactorial model that's more restricted in scope and implementation than addressing insiders within a company colluding with outsiders. A faulty system allows collusion to travel unnoticed when an insider shares data with an outsider, who will then recover the original information from message transmissions (intermediary kernel values) among organizations. This attack requires solely accessibility to a few knowledge entries inside the organizations instead of requiring the encrypted administrative privileges typically found within the distribution of Data Mining eventualities. To the best of our data, we are the primary to explore this new insider threat in DKBDM. We have a tendency to conjointly analytically demonstrate the minimum amount of insider information necessary to launch the insider attack. Finally, we have a tendency to follow up by introducing many proposed privacy-preserving schemes to counter the described attack.

Did you like this research project?

To get this research project Guidelines, Training and Code... Click Here

PROJECT TITLE :SimpleMAC: A Simple Wireless MAC-Layer Countermeasure to Intelligent and Insider JammersABSTRACT:In wireless networks, users share a transmission medium. For efficient channel use, wireless systems usually use a
PROJECT TITLE : Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks - 2014 ABSTRACT: Secure data transmission is a critical issue for wireless sensor networks (WSNs). Clustering is an effective
PROJECT TITLE : R3E Reliable Reactive Routing Enhancement for Wireless Sensor Networks - 2014 ABSTRACT: Providing reliable and efficient communication under fading channels is one of the major technical challenges in wireless
PROJECT TITLE : PSR A Lightweight Proactive Source Routing Protocol For Mobile Ad Hoc Networks - 2014 ABSTRACT: Opportunistic data forwarding has drawn much attention in the research community of multihop wireless networking,
PROJECT TITLE : Multi-Core Embedded Wireless Sensor Networks Architecture and Applications - 2014 ABSTRACT: Technological advancements in the silicon industry, as predicted by Moore's law, have enabled integration of billions

Ready to Complete Your Academic MTech Project Work In Affordable Price ?

Project Enquiry