A REVIEW PAPER ON ASSOCIATION RULES FOR PRIVACY-PRESERVING MINING FROM VARIOUS ENCRYPTION TECHNIQUES
Journal: International Journal of Engineering Sciences & Research Technology (IJESRT) (Vol.4, No. 10)Publication Date: 2015-10-30
Authors : Haibat Jadhav;
Page : 596-600
Keywords : Privacy preserving data mining; Transaction database; association rule mining.;
Abstract
A new consequence has been significant in the Cloud computing in the example of data mining as a service, a company missing in proficiency or computational its mining needs to a third party service provider, the items and the association rules of the database are measured private property of the company. To care for company confidentiality, the data owner transforms its data and ships it to the server, sends mining queries to the server, and recovers the true patterns from the extracted patterns expected from the server. This paper, study the difficulty of the association rule mining task within a corporate privacy preserving framework. An attack model based on backdrop information and devises an idea for confidentiality preserve removal. It ensure that each altered item is the same with respect to the attackers backdrop information, from at smallest amount k1 other altered items. This paper will be efficient and keep confidentiality.
Other Latest Articles
- A SURVEY ON IMAGE MINING TECHNIQUES FOR BRAIN TUMOR CLASSIFICATION
- AN OVERVIEW OF EXHAUST GAS RECIRCULATION (EGR) EFFECT ON EMISSION CHARACTERISTICS OF DIESEL ENGINE FUELED WITH BIODIESEL
- POWER AND PERFORMANCE EFFICIENT TOPOLOGICALLY COMPRESSED DUAL VDD FLIP FLOP
- SIMPLEST PHASE NOISE MITIGATION TECHNIQUE IN OFDM SYSTEM
- THE EVALUATION OF A PV-BATTERIES AND INVERTER POWER SYSTEM CONNECTED TO A GRID - SOLUTIONS FOR EMERGING SUSTAINABLE ENERGY IN IRAQ
Last modified: 2015-10-28 11:46:11