Data Mining Techniques for Cloud Privacy Preservation


  • Ghaith Mousa Hamzah Amlak kufa university ,ph.D in computer science and mathematics college ,iraq
  • Karim Hashim Kraidi Al-Saedi Mustansiriyah University, College of Science, Department of Computer


security, cloud computing, data mining, phishing


A high standard of phishing prevention became essential when it came to Internet phishing. As a result of sophisticated phishing attacks, a new mitigation challenge was created. Internet phishing has recently raised serious security and financial issues for people and businesses around. There has been a significant financial loss associated with internet services that provide a variety of communication channels, including electronic commerce, online banking, research, and online trading, as well as those that exploit both software and human weaknesses. The aim of the study is to identify the extent of works and their limitations for cloud security, to design and develop the solution for cloud security, and to evaluate the model.

We propose this new model mining model, which consists of two main bases: preprocessing and classification. the accuracy obtained in this study for malware analysis is quite high, with the highest accuracy being 95.2%.

The results of the Intrusion features, Features of Models, Malware Detection Graphs for the data, Attacks Identified from different countries for the data, Machine learning Based Model Implementation, and Accuracy of analysis were analyzed and data were obtained. Deploying sensors or agents on cloud-based systems and apps is often the first step in the data collection process for malware investigation in the cloud. Network-based intrusion detection systems (NIDS) or intrusion prevention systems are a popular way to collect data. An important paradigm that delivers the results for the grouping of requests is the application of SVM to the problem of assault detection.


Download data is not yet available.


Aggarwal G, Bawa M, Ganesan P (2005) Two can keep a secret: a distributed architecture for secure database services. CIDR

Agrawal R, Srikant R (2000) Privacy-preserving data mining. In: Proceedings of the 2000 ACM SIGMOD international conference on management of data—SIGMOD ’00, vol 29, no 2. pp 439–450.

Aggarwal CC, Yu PS (2008) A general survey of privacy-preserving data mining models and algorithms. In: Privacy preserving data mining, Chap 2. Springer, New York, pp 11–52.

Arunadevi M, Anuradha R. Privacy preserving outsourcing for frequent itemset mining. Int J Innov Res Comp Commun Eng. 2014;2(1):3867–3873.

Baotou T (2010) Research on privacy preserving classification data mining based on random perturbation Xiaolin Zhang Hongjing Bi. 1–6

Belwal R, Varshney J, Khan S (2013) Hiding sensitive association rules efficiently by introducing new variable hiding counter. In: IEEE international conference on service operations and logistics, and informatics, 2008, IEEE/SOLI 2008, vol 1, pp 130–134. doi:10.1109/SOLI.2008.4686377

Chan J, Keng J (2013) Privacy protection in outsourced association rule mining using distributed servers and its privacy notions, pp 1–5

Ciriani V, Vimercati SDC, Foresti S, Samarati P. Privacy-preserving data mining. New York: Springer; 2008. k-anonymous data mining: a survey; pp. 105–136.

Dehkordi MNM, Badie K, Zadeh AKA. A novel method for privacy preserving in association rule mining based on genetic algorithms. J Softw. 2009;4(6):555–562. doi: 10.4304/jsw.4.6.555-562.

Deivanai P, Nayahi J, Kavitha V (2011) A hybrid data anonymization integrated with suppression for preserving privacy in mining multi party data. In: IEEE international conference on recent trends in information technology (ICRTIT)

Dev H, Sen T, Basak M, Ali ME (2012) An approach to protect the privacy of cloud data from data mining based attacks. In: IEEE 2012 SC companion high performance computing, networking, storage and analysis (SCC)

Ding X, Yu Q, Li J, Liu J, Jin H (2013) Distributed anonymization for multiple data providers in a cloud system. In: Database systems for advanced applications. Springer, Berlin, Heidelberg

Domadiya NH, Rao UP (2013) Hiding sensitive association rules to maintain privacy and data quality in database. In: IEEE 3rd international on advance computing conference (IACC), pp 1306–1310

Dong R, Kresman R (2009) Indirect disclosures in data mining. In: Fourth international conference on frontier of computer science and technology, FCST’09

Friedman A, Wolff R, Schuster A. Providing k-anonymity in data mining. VLDB J. 2008;17(4):789–804. doi: 10.1007/s00778-006-0039-5.

Giannotti F, Lakshmanan LVS, Monreale A, Pedreschi D, Wang H. Privacy-preserving mining of association rules from outsourced transaction databases. IEEE Syst J. 2013;7(3):385–395. doi: 10.1109/JSYST.2012.2221854.

Gkoulalas-Divanis A, Verykios VS. Exact knowledge hiding through database extension. IEEE Trans Knowl Data Eng. 2009;21(5):699–713. doi: 10.1109/TKDE.2008.199.

Harnsamut N, Natwichai J (2008) A novel heuristic algorithm for privacy preserving of associative classification. In: PRICAI 2008: trends in artificial intelligence. Springer, Berlin, Heidelberg, pp 273–283

He Y, Siddharth B, Jeffrey FN (2011) Preventing equivalence attacks in updated, anonymized data. In: IEEE 27th international conference on data engineering (ICDE)

Ibrahim A, Jin H, Yassin AA, Zou D (2012) Towards privacy preserving mining over distributed cloud databases. In: IEEE second international conference on cloud and green computing (CGC)

Inan A, Saygin Y (2010) Privacy preserving spatio-temporal clustering on horizontally partitioned data. In: Lecture Notes in Computer Science (including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 6202 LNAI. pp 187–198.

Islam MZ, Brankovic L. Privacy preserving data mining: a noise addition framework using a novel clustering technique. Knowl Based Syst. 2011;24(8):1214–1223. doi: 10.1016/j.knosys.2011.05.011.

Jain YYK, Yadav VKVVK, Panday GGS. An efficient association rule hiding algorithm for privacy preserving data mining. Int J Comp Sci Eng. 2011;3(7):2792–2798.

Kamakshi P (2012) Automatic detection of sensitive attribute in PPDM. In: IEEE international conference on computational intelligence & computing research (ICCIC)

Kamakshi P, Babu AV (2010) Preserving privacy and sharing the data in distributed environment using cryptographic technique on perturbed data 2(4)

Kantarcıoglu M, Vaidya J (2003) Privacy preserving naive bayes classifier for horizontally partitioned data. In: IEEE ICDM workshop on privacy preserving data mining, pp 3–9.

Karim R, Rashid M, Jeong B, Choi H (2012) In: Transactional Databases. pp 303–319

Chandrakar, I., & Hulipalled, V. R. (2020). Techniques for Preserving Privacy in Data Mining for Cloud Storage: A Survey. Advances in Intelligent Systems and Computing, 452–461.

Phan, Trung & Toan, Truong & Van Tuyen, Dang & Huong, Truong & Thanh, Nguyen. (2016). OpenFlowSIA: An optimized protection scheme for software-defined networks from flooding attacks. 13-18. 10.1109/CCE.2016.7562606.

Kaaniche, N., & Laurent, M. (2017). Data security and privacy preservation in cloud storage environments based on cryptographic mechanisms. Computer Communications, 111, 120-141.

Purohit, R., & Bhargava, D. (2017). An illustration to secured way of data mining using privacy preserving data mining. Journal of Statistics and Management Systems, 20(4), 637-645.

Kreso, I., Kapo, A., & Turulja, L. (2021). Data mining privacy preserving: Research agenda. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, 11(1), e1392.

Binbusayyis, A., & Vaiyapuri, T. (2020). Comprehensive analysis and recommendation of feature evaluation measures for intrusion detection. Heliyon, 6(7).

Elhadi, Ammar & Maarof, Mohd & Barry, Bazara. (2013). Improving the Detection of Malware Behaviour Using Simplified Data Dependent API Call Graph. International Journal of Security and Its Applications. 7. 29-42. 10.14257/ijsia.2013.7.5.03.

Florian, E., Sgarbossa, F., & Zennaro, I. (2021). Machine learning-based predictive maintenance: A cost-oriented model for implementation. International Journal of Production Economics, 236, 108114.

steps followed in this research methodology




How to Cite

G. M. . Hamzah Amlak and K. H. . Kraidi Al-Saedi, “Data Mining Techniques for Cloud Privacy Preservation”, Int J Intell Syst Appl Eng, vol. 11, no. 6s, pp. 246–256, May 2023.



Research Article