International Journal of Technology Enhancements and Emerging Engineering Research (ISSN 2347-4289)

IJTEEE >> Volume 2 - Issue 4, April 2014 Edition

International Journal of Technology Enhancements and Emerging Engineering Research  
International Journal of Technology Enhancements and Emerging Engineering Research

Website: http://www.ijteee.org

ISSN 2347-4289

An Efficient Method For Discrimination Prevention Using Differentiated Virtual Passwords And Secret Little Functions

[Full Text]






Keywords : Classification, Direct discrimination, indirect discrimination, data transformation, differentiated virtual passwords, Code books, Secret little functions.



ABSTRACT: In classification, discrimination is a type of treatment that includes denying the membership in one group opportunities that are available in another group. Discrimination based on age, religion, gender, caste, disability, employment, language, race and nationality. In this technique, direct and indirect discrimination is prevented using rule protection and rule generalization methods and BIRCH (Balanced Iterative Reducing and Clustering using Hierarchies) is used to perform hierarchical clustering for huge data-sets. To enhance privacy, we propose a virtual password concept to secure user's passwords in banking process. We applied user-determined randomized linear generation functions to secure user's passwords based on the fact that a server has more information than any adversary does. We are evaluating metrics for proposed methods that impact on information loss and data quality in data mining.



[1] T. Dierks and C. Allen. The TLS Protocol— Version 1.0. IETF RFC 2246, January 1999.

[2] R. Agrawal and R. Srikant, “Fast Algorithms for Mining Association Rules in Large Databases”, Proc. 20th Int’l Conf. Very Large Data Bases, pp. 487-499, 1994.

[3] T. Calders and S. Verwer, “Three Naive Bayes Ap-proaches for Discrimination-Free Classification”, Data Mining and Knowledge Discovery, vol. 21, no. 2, pp. 277-292, 2010.

[4] S. Hajian, J. Domingo-Ferrer ,“Rule Protection for Indirect Discrimination Prevention in Data Mining”, Proc. Eighth Int’l Conf. Modeling Decisions for Artificial Intelligence (MDAI ’11), pp. 211-222, 2011.

[5] F. Kamiran and T. Calders, “Classification without Discrimination”, Proc. IEEE Second Int’l Conf. Computer, Control and Comm.(IC4 ’09), 2009.

[6] F. Kamiran and T. Calders, “Classification with no Discrimination by Preferential Sampling”, Proc. 19th Machine Learning Conf. Belgium and The Netherlands, 2010.

[7] F. Kamiran, T. Calders, “Discrimination Aware Deci-sion Tree Learning”, Proc. IEEE Int’l Conf. Data Mining (ICDM ’10), pp. 869-874, 2010.

[8] J. Mason, “Filtering spam with SpamAssassin,” in Proc.HEANetAnnu. Conf., 2002.

[9] M. Sahami, S. Dumais, D. Heckerman, and E. Hor-vitz, “A Bayesian approach to filtering june e-mail. In learning for text categorization,” in Proc. Workshop, May 1998.

[10] T. A. Meyer and B. Whateley,“SpamBayes: Effective open-source, Bayesian based, e-mail classification system, in Proc. CEAS, 2004.

[11] MAPS. (1996). RBL—Realtime Blackhole List [On-line]. Available and Phishing Attacks, Cryptology ePrint Archive, Rep. 2004/155 [On-line].Available:http://eprint.iacr.org/2004/155

[12] The Spamhaus Project. The Spamhaus Block List [Online]. Available http://www.spamhaus.org/sbl

[13] Herzberg and A. Gbara. (2004). Trustbar: Protecting (Even Naive) Web Users From Spoofing.

[14] Net craft. Anti PhishingToolbar,http://www.mail-abuse.com/services/mds−rbl.html

[15] C. Herley and D. Florencio, “How to login from an Internet cafe without worrying about keyloggers,” in Proc. SOUPS, 2006.

[16] S. Wiedenbeck, J. Waters, L. Sobrado, and J. Birget, “Design and evaluation of a shoulder- surfing resistant graphical password scheme,” in Proc. Working Conf. Adv. Vis. Interfaces.

[17] R. Kohavi and B. Becker, “UCI Repository of Machine Learning Data bases”, http://archive.ics.uci.edu/ml/datasets/Adult,1996.

[18] Sara Hajian and Josep Domingo-Ferrer , “A Metho-dology for direct and indirect discrimination in data mining”, Knowledge and Data Engineering, vol. 25, no. 7, pp. 1445-1459, 2013.

[19] Rui Liu, Xiao-long Qian and Shu Mao,” Research on Anti-Money Laundering Based on Core Decision Tree Algorithm”, Control and Decision Conference (CCDC), pp .4322 – 4325, 2011.

[20] A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D. E. Culler, “SPINS: Security protocols for sensor networks,” Wirel. Netw. vol. 8, no. 5, pp. 521–534, 2002.