ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Protected Mining of Association Instructions in Horizontally Scattered Records

Journal: International Journal of Computer Science and Mobile Applications IJCSMA (Vol.2, No. 11)

Publication Date:

Authors : ; ;

Page : 49-54

Keywords : scalability; effectiveness and secrecy defend ion;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Introduction of high end technologies used by most of the leading software companies needs a keen focus to be kept on Daas The data owner renovates data to defend corporate secrecy and ships it to the server, server receives mining queries and true designs are recovered from the extracted designs which are received from the server. A study is done on the problem of farm out the association rule mining task within a corporate secrecy-preserving framework. An Occurrence model based on background knowledge and scheme is devised for secrecy preserving outsourced mining. The scheme introduced ensures that from at least k-1 other transformed items each transformed item are indistinguishable with respect to the Occurrenceer's background knowledge.

Last modified: 2014-11-12 00:26:18