Professional Documents
Culture Documents
ABSTRACT
Privacy preserving is one of the most critical research
topics in the data security garden and it has become a
serious burden in the secure transformation of personal
data in later years. Number of algorithmic techniques has
been devise for Privacy Preserving Data Mining
(PPDM). For example, different credit card concourse
may try to build better data sharing portrait for credit
card fraud exposure through PPDA tasks. Although
certain PPDA techniques collateral that nothing other
than the final analysis result is concede, it is impossible
to establish whether or not participating affair are
truthful about their private input data. This increment the
question of how to design impetus compatible privacyconserve data analysis techniques that excite
participating parties to afford truthful input data. A
model has been expected to design the adequate
incentive consistent model for secure private information
transformation and determine the fraud transactions
using genetic design. Every user need to transform the
exclusive data in many applications (E-Shopping) that
must be covered from the hackers. Building this model
confide in on many privacy preserving data mining
facility like Cryptographic techniques, Privacy
preserving association order and Function Evaluation
Theorem. The Incentive model is very efficient for
isolation preserving data mining, because it provides the
protocols contra not only semi-honest competitor model
and also the malignant model and we proposes identifies
the extortion transactions occupying on the users
transactions knowledge.
Key Words: Electronic commerce, fraud, credit card,
ancestral algorithms, detection.
1. INTRODUCTION
Data mining is a measure that uses a diversity of data
analysis tools to deliver the decoration and relationships
in data sets that may be used to make authentic
predictions. The first step in data mining is to construe
the data .It instrument that summarize its statistical
attributes, visually critiqued it using charts and graphs,
and look for meaningful links amid variables .In the
www.ijsret.org
1126
International Journal of Scientific Research Engineering & Technology (IJSRET), ISSN 2278 0882
Volume 4, Issue 11, November 2015
Horizontal partitioning
For the table means to extract the fields that performing
extract the collection of incentive datas according to
particular customer. Perform this task to take the users
private detail as an input to the NCC model. Built the
DNCC model with help of Association rules technique
that provides information of this type in the form of ifthen statements.
Secure code computation process, is providing incentive
compatible secret code question for the NCC Model.
The computation process theorem consists of
following steps:
Step1: Select two fields from customer details from bank
database as input for secure code computation process.
Step2: Here first field is constant and another one field is
other information of customer details. For example (one
field is username that is constant, another one field is
other information like dob, accno, emailid, etc..).
Step3: Apply vertical partition on the first field data and
attaching second field in the middle of partition data
using Secure Sum Process technique.
2. RELATED WORK
In [1] paper, researcher defined to develop a credit card
fraud detection system using genetic algorithm. During
the credit card transaction, the fraud is detected and the
number of false alert is being minimized by using
genetic algorithm. Instead of maximizing the numbers of
correctly classified transactions we defined an objective
function where the misclassification costs are variable
and thus, correct classification of some transactions are
more important than correctly classifying the others. The
high amount of losses due to fraud and the awareness of
the relation between loss and the available limit have to
be reduced. The fraud has to be deducted in real time
and the number of false alert has to be minimized. There
are different devices helpful to do about that transaction.
The possible actions are blocking the card, sending SMS
or calling the card holder.
In [2] paper, researcher defined in financial institutions,
uses the fraud detection which is based on customer
behavior variables. The Sample data set has been
considered for the generating the fraud transactions and
detection of fraud in the electronic payment systems.
The various parameters are involved in the data set.
CCfreq= number of times card used CCloc = location at
which CCs in the hands of fraudsters CCoverdraft = the
rate of overdraft time CCbank balance = the balance
available at bank of CC CCdailyspending =the average
daily spending amount Data set T={t1,t2,t3,.,tn}, U is
one data object, If p parts of data set named S in data set
is far away from object U, S T, U T, then U is
Common object. The proposed system overcomes the
www.ijsret.org
1127
International Journal of Scientific Research Engineering & Technology (IJSRET), ISSN 2278 0882
Volume 4, Issue 11, November 2015
www.ijsret.org
1128
International Journal of Scientific Research Engineering & Technology (IJSRET), ISSN 2278 0882
Volume 4, Issue 11, November 2015
3. PROPOSED SYSTEM
In this paper, A model has been proposed to design the
effective incentive compatible model for secure private
information transformation and identifying the fraud
transactions using Genetic Algorithm. Every user need
to transform the private data in many applications (EShopping) that must be protected from the hackers.
Building this model depends on many privacy
preserving data mining techniques like Cryptographic
techniques, Privacy preserving association rule and
Function Evaluation Theorem. The Incentive model is
very efficient for privacy preserving data mining,
because it provides the protocols against not only semihonest adversary model and also the malicious model
and we proposes identifies the fraud transactions based
on the users transactions knowledge.
Modules:
Non-Cooperative Computation.
Security System.
Privacy-Preserving Data Analysis:
The privacy preserving data analysis protocols
assume that participating parties are truthful about
their private input data. The techniques developed in
assume that each party has an internal device that can
verify whether they are telling the truth or not. In our
work, we do not assume the existence of such a device.
Instead, we try to make sure that providing the true input
is the best choice for a participating party.
Non-Cooperative Computation:
(Get the security Code)
In the NCC model, each party
participates in a protocol to learn the output of some
given function f over the joint inputs of the parties.
First,
all
participating
parties send
their
private inputs securely to a trusted third party (TTP),
and then TTP computes f and sends back the result to
every participating party. The NCC model makes the
following assumptions.
1) Correctness:
The first priority for every participating party is to
learn the correct result;
2) Exclusiveness:
If possible, every participating party prefers to
learn the correct result exclusively.
Analyzing Data Analysis Tasks Ii the NCC Model:
Combining the two concepts DNCC and
SMC, we can analyze privacy preserving data analysis
4. REQUIREMENTS
Hardware: Single PC with (20 Gb Hard disc space 1Gb
RAM).
Software: Windows OS (xp, win 7), Net beans,
jdk1.8.0_60, My SQL, Tomcat.
www.ijsret.org
1129
International Journal of Scientific Research Engineering & Technology (IJSRET), ISSN 2278 0882
Volume 4, Issue 11, November 2015
5. CONCLUSION
In this paper, we present to find the detection of credit
card fraud mechanism and examine the result based on
the principles of this algorithm. In this paper we saw
genetic algorithm that are being used to execute credit
card fraud how credit card fraud impact on financial
institution as well as merchant and customer, fraud
detection technique by genetic algorithm. The Genetic
algorithms are evolutionary algorithms in which the aim
is to obtain the better and optimal solutions. In this study
fraud detected and fraud transactions are generated with
the given sample data set. If this algorithm is applied
into bank credit card fraud detection system, the
probability of fraud transactions can be predicted soon
after credit card transactions by the banks. And a series
of anti-fraud strategies can be adopted to prevent banks
from great losses before and reduce risks.
REFERENCES
[1] S.Benson Edwin Raj, A. Annie Portia, Analysis on
Credit Card Fraud Detection Methods, IEEE
International Conference on Computer, Communication
and Electrical Technology, IEEE March 2011
[2] M.HamdiOzcelik, Mine Isik, Improving a credit
card fraud detection system using Genetic algorithm,
IEEE International Conference on Networking and
Information Technology, IEEE 2010.
[3] Genetic algorithms for credit card fraud detection by
Daniel Garner, IEEE Transactions May 2011.
[4] Research on credit card fraud detection model based
on distance sum IEEE 2009 International Joint
Conference on Artificial Intelligence.
[5] Credit card fraud detection using neural network,
RaghavedraPatidar, Lokesh Sharma, ISSN: 2231-2307,
Volume, IssueNCAI211,JUNE2011.
[6] Panigraili, S., Kundu, A., Sural, S. &Majumdar, A.
(2009). Credit Card Fraud Detection: A Fusion
Approach Using Dempster-Shafer Theory and Bayesian
Learning. Information Fusion , 354-363.
[7] Dr Markus Roggenbach. CS364 Software testing
slides. Swansea University, 2011.
[8]. D.WHITLEY, Genetic Algorithm and Neural
Network, 2003.
[9] Wang Xi. Some Ideas about Credit Card Fraud
Prediction China Trial. Apr. 2008, pp. 74-75.
[10] AmlanKundu, SuvasiniPanigrahi, ShamikSural and
Arun K. Majumdar, BLAST-SSAHA Hybridization
for Credit Card Fraud Detection, IEEE Transactions On
Dependable And Secure Computing, vol. 6, Issue no. 4,
pp.309-315, OctoberDecember 2009.
[11] AmlanKundu, SuvasiniPanigrahi, ShamikSural and
Arun K. Majumdar, Credit card fraud detection A
fusion approach using DempsterShafer theory and
www.ijsret.org
1130