A REVIEW PAPER ON ASSOCIATION RULES FOR PRIVACY-PRESERVING MINING FROM VARIOUS ENCRYPTION TECHNIQUES

Abstract

 A new consequence has been significant in the Cloud computing in the example of data mining as a service, a company missing in proficiency or computational its mining needs to a third party service provider, the items and the association rules of the database are measured private property of the company. To care for company confidentiality, the data owner transforms its data and ships it to the server, sends mining queries to the server, and recovers the true patterns from the extracted patterns expected from the server. This paper, study the difficulty of the association rule mining task within a corporate privacy preserving framework. An attack model based on backdrop information and devises an idea for confidentiality preserve removal. It ensure that each altered item is the same with respect to the attackers backdrop information, from at smallest amount k1 other altered items. This paper will be efficient and keep confidentiality.

Authors and Affiliations

Mr. Haibat Jadhav

Keywords

Related Articles

 DESIGN OF STEPPED IMPEDANCE LOW PASS FILTER AT 2.4GHz

 In this era, life can't be envisioned without wireless communication. The microwave filter is a component which gives frequency selectivity in mobile, radar, satellite communication systems working at microwav...

REVIEW ON DATA MINING TECHNIQUES FOR SUBGROUP DISCOVERY

Subgroup discovery is a data mining technique which focuses fascinating rules regarding a target variable. A paramount feature for this method is the combination of predictive and descriptive induction. This survey g...

 A PAPER ON A COMPARATIVE STUDY BLOCK TRUNCATING CODING, WAVELET, FRACTAL IMAGE COMPRESSION & EMBEDDED ZERO TREE

 Many different image compression techniques currently exist for the compression of different types of images. Image compression is fundamental to the efficient and cost-effective use of digital imaging technology a...

Estimation of Weibull Parameters In Accelerated Life Testing Using Geometric Process With Type-Ii Censored Data

In Accelerated life testing (ALT), generally, the log linear function between life and stress is used to obtain the estimates of original parameters of the life. The log linear is just a simple re-parameterization of th...

 REVIEW ON DESIGN AND ANALYSIS OF HYDRAULIC SYSTEM TO IMPROVE PERFORMANCE OF SMALL POWER PACKS

 Hydraulic systems are widely employed in most of industries like for rollers, cement industries equipments etc used for high force movements to obtain motion in the process. And in the large scale industries all t...

Download PDF file
  • EP ID EP95583
  • DOI -
  • Views 52
  • Downloads 0

How To Cite

Mr. Haibat Jadhav (0).  A REVIEW PAPER ON ASSOCIATION RULES FOR PRIVACY-PRESERVING MINING FROM VARIOUS ENCRYPTION TECHNIQUES. International Journal of Engineering Sciences & Research Technology, 4(10), 596-600. https://europub.co.uk/articles/-A-95583