Protected Mining of Association Instructions in Horizontally Scattered Records
Journal: International Journal of Computer Science and Mobile Applications IJCSMA (Vol.2, No. 11)Publication Date: 2014-11-30
Authors : Chittaluri.Veeraiah; G.L.Chandrasekharao;
Page : 49-54
Keywords : scalability; effectiveness and secrecy defend ion;
Abstract
Introduction of high end technologies used by most of the leading software companies needs a keen focus to be kept on Daas The data owner renovates data to defend corporate secrecy and ships it to the server, server receives mining queries and true designs are recovered from the extracted designs which are received from the server. A study is done on the problem of farm out the association rule mining task within a corporate secrecy-preserving framework. An Occurrence model based on background knowledge and scheme is devised for secrecy preserving outsourced mining. The scheme introduced ensures that from at least k-1 other transformed items each transformed item are indistinguishable with respect to the Occurrenceer's background knowledge.
Other Latest Articles
- A HYBRID APPROACH FOR DATA CLUSTERING USING DATA MINING TECHNIQUES?
- Hybrid Automatic Solar Tracking System for Different Types of Solar Cells: A review
- Corrosion Behaviour of Mild Steel in Acidic Medium in Presence of Aqueous Extract of Clitoria Ternatea Stem
- Accident Prevention Alert System for Mobile Devices
- Non - Radiative Energy Transfer of Tb3+ → Eu3+ in sodium Fluoroborate Glass
Last modified: 2014-11-12 00:26:18