ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

A Well-Organized Method for Protecting Sensitive Information

Journal: International Journal of Science and Research (IJSR) (Vol.3, No. 10)

Publication Date:

Authors : ; ;

Page : 1602-1605

Keywords : purposes There are many approaches to hide confident association rules which take the support and confidence as a base for algorithms and many more The proposed work has the basis of reduction of support and confidence of sensitive rules but this work is;

Source : Downloadexternal Find it from : Google Scholarexternal


Data mining services need correct input data for their results to be significant, but privacy concerns may power users to offer spurious information. To protect client privacy in the data mining process, a multiplicity of techniques based on random perturbation of data records have been proposed lately. One known fact which is very significant in data mining is discovering the association rules from database of transactions each transaction consists of set of objects. Two important terms support and confidence are linked with each of the association rule. Actually any rule is called as sensitive if its disclosure risk is above a certain privacy threshold. Sometimes we do not want to disclose sensitive rules to the public because of privacy customized definition of support and confidence so that it would hide any desired sensitive association regulation without any side effect. in reality the enhanced technique is by means of the same method (as previously used method) of receiving association rules but modified definitions of support and confidence are used.

Last modified: 2021-06-30 21:10:56