An Algorithm to Mitigate the Attacker by Applying Homomorphic Encryption

Manmeet Kaur, Amrit Kaur


K-Modes is an eminent algorithm for clustering data set with categorical attributes. This algorithm is famous for its simplicity and speed. The KModes is an extension of the K-Means algorithm for categorical data. Since K-Modes is used for categorical data so ‘Simple Matching Dissimilarity’ measure is used instead of Euclidean distance and the ‘Modes’ of clusters are used instead of ‘Means’.The major drawback of k-mode is that the user needs to define the centroid points. To overcome this problem, k-mode with entropy based similarity coefficient was introduced in order to find good initial center points and the accurate result of the clustering is to be obtained. The nature-inspired harmonic algorithm is hybridized to optimize the k-mode algorithm. Harmonic K-Mode Algorithm is proposed in this work that reduces the computation time and improves the accuracy for cluster generation. The performance is evaluated using different output parameters such as execution time, space complexity, accuracy, precision and recall on different datasets such as amazon book review, news aggregator, online retail, seed and wholesale consumer.

Full Text:



Peter Shaojui Wang, Feipei Lai, Hsu-Chun Hsiao, Ja-Ling Wu, “Insider Collusion Attack on Privacy-Preserving Kernel-Based Data Mining Systems”, Special Section on Latest Advances And Emerging Applications of Data Hiding, IEEE Access, ISSN: 2169-3536, vol: 4, 2016, pp: 2244-2255

Nilima V. kayarkar, “A Review on insider Collusion Attack on Text, Video and Image File using Privacy-Preserving Kernel based System”, International Conference on Recent Trends in Engineering Science and Technology, ISSN: 2321-8169, vol: 5, Issue: 1, 2017, pp: 156-158

RupeshSamant, U. V. Wanaskar, “Survey on Privacy Preserving of Kernel-Based Data Mining Systems from Insider Collusion Attack”, International Journal of Innovative Research in Computer and Communication Engineering, ISSN(Online): 2320-9801, ISSN (Print): 2320-9798, vol: 4, Issue: 12, 2016, pp: 21055-21059

Uma Angadi, G.F Ali Ahammed, “Analysis of Secure Data Aggregation Technique for Wireless Sensor Network in the Presence of Adversary Environment based on IF algorithm”, International Journal of Advanced Research in Computer and Communication Engineering, ISSN (Online): 2278-1021, ISSN (Print): 2319 5940 vol. 5, Issue 4, 2016

GulrukhNazneen, JayantAdhikari, “Research Paper on m-Privacy for Collaborative Data Publishing”, Imperial Journal of Interdisciplinary Research, ISSN: 2454-1362, vol: 2, Issue: 7, 2016, pp: 1407-1409

ZulkefliMohdYusop, JemalAbawajy, “Analysis of Insiders Attack Mitigation Strategies”, International Conference on Innovation, Management and Technology Research, vol: 129, 2014, pp: 581-591

Clifton Phua, Vincent Lee, Kate Smith, Ross Gayler, “A Comprehensive Survey of Data Mining-based Fraud Detection Research”, Intelligent Computation Technology and Automation, IEEE, DOI: 10.1109/ICICTA.2010.831, 2010

Pooja Mishra, Gaurav Gupta, “Detection of Node Replication Attacks in MSN Using EDD Algorithms”, International Research Journal of Engineering and Technology, e-ISSN: 2395 -0056, p-ISSN: 2395-0072, vol: 3, Issue: 3, 2016, pp: 655-659

ShikhaAgrawal, JitendraAgrawal, “Survey on Anomaly Detection using Data Mining Techniques”, 19th International Conference on Knowledge Based and Intelligent Information and Engineering Systems, vol: 60, 2015, pp: 708-713



  • There are currently no refbacks.

© International Journals of Advanced Research in Computer Science and Software Engineering (IJARCSSE)| All Rights Reserved | Powered by Advance Academic Publisher.