A NOVEL METHOD FOR FINDING PRIVACY PRESERVING ASSOCIATION RULE MINING
Journal Title: Indian Journal of Computer Science and Engineering - Year 2012, Vol 3, Issue 1
Abstract
Association rule mining is one of the significant research areas which explore the association between various item sets. The issue of privacy arises when several legitimate people share their data or knowledge for their mutual benefits. In case of centralized database, sensitive item sets are hidden by using association rule hiding approaches. Based on the execution time, the degree of optimality, the level of tolerance of side effects and guaranteed to get solution different association rule hiding approaches are exist. Among the commonly used approaches, heuristic approach is widely used since it guarantees to provide solution but causes some side effects. In this paper a heuristic based methodology is proposed to hide the sensitive item sets efficiently by adopting two criterions. This methodology protects private information by doing sanitization process but before participating in the sanitization process, the method analysis the side effects and select the most promising one to change so that side effects can be fully avoided or accepting few side effects which will not harm the informational accuracy.
Authors and Affiliations
N V Muthu lakshmi , Dr. K Sandhya Rani
AN PROFICIENT LS BASED SWITCHED PREDICTOR FOR LOSSLESS CONFINING OF 4-D MEDICAL
Techniques for medical imaging like fMRI, CT, MRI produces large amount of digital data. This paper proposes a context based LS based predictors for lossless compression of such 4-D images. Redundancy in the form of smoo...
A REVIEW PAPER ON CRYPTOGRAPHIC APPROACH FOR LICENSE MANAGEMENT SYSTEM IN CLOUD COMPUTING
Computational world is become very large and complex. Cloud computing has emerged as a popular computing model to support on demand services. It has inherited the legacy technology and adding new ideas. The goal of cloud...
RANK LEVEL FUSION USING FINGERPRINT AND IRIS BIOMETRICS
Authentication of users is an essential and difficult to achieve in all systems. Shared secrets like Personal Identification Numbers (PIN) or Passwords and key devices such as Smart cards are not presently sufficient in...
3D MODELLING FROM UN CALIBRATED IMAGES – A COMPARATIVE STUDY
3D modeling is a demanding area of research. Creating a 3D world from sequence of images captured using different mobile cameras pose additional challenge in this field. We plan to explore this area of computer vision to...
A study on different approaches towards Aspect Oriented Requirements Engineering
Requirements and their quality are very important for the success and on time delivery of a project. However, Requirement Elicitation is not an easy and small task to begin with. Conflicts arise in various ways such as w...