A REVIEW PAPER ON ASSOCIATION RULES FOR PRIVACY-PRESERVING MINING FROM VARIOUS ENCRYPTION TECHNIQUES

Abstract

 A new consequence has been significant in the Cloud computing in the example of data mining as a service, a company missing in proficiency or computational its mining needs to a third party service provider, the items and the association rules of the database are measured private property of the company. To care for company confidentiality, the data owner transforms its data and ships it to the server, sends mining queries to the server, and recovers the true patterns from the extracted patterns expected from the server. This paper, study the difficulty of the association rule mining task within a corporate privacy preserving framework. An attack model based on backdrop information and devises an idea for confidentiality preserve removal. It ensure that each altered item is the same with respect to the attackers backdrop information, from at smallest amount k1 other altered items. This paper will be efficient and keep confidentiality.

Authors and Affiliations

Mr. Haibat Jadhav

Keywords

Related Articles

OPTIMIZATION OF EDM PARAMETERS USING TAGUCHI METHOD AND GREY RELATIONAL ANALYSIS FOR AISI 01 DIE STEEL

Optimization is the best method used in industrial area for increasing quality of product by lowering the cost of product. In this paper, the experimental investigation of material removal rate, electrode wear rate, s...

 Experimental Study on Cold Formed Steel Composite Metal Deck Slab

 Composite deck slab is the advanced method of casting concrete slab with profile metal decking used in tensile zone. The decking acts composite with the concrete under service loading. The behavior of a composite...

 Developing a GUI based Design Software in VB Environment to Integrate with CREO for Design and Modeling using Case Study of Coupling

 The Research Work is carried out on the approach of a CADD (Computer Aided Design and Drafting) and Concurrent engineering. Because with the use of this developed system all phase of product development Design, m...

A CPW Fed Octagonal Patched Antenna for UWB Applications

In this paper, we present a CPW fed octagonal patch antenna with hexagonal slot for ultra wideband (UWB) application. The proposed antenna is designed on FR4 substrate with dielectric constant 4.4 has dimension 29 X 31...

 LOGO MATCHING AND RECOGNITION IN VIDEO CLIP

 We present a method for detecting the logos from videos. We first include a basic feature-matching algorithm using SIFT, nearest-neighbor matching and RANSAC. Large numbers of features can be extracted from typica...

Download PDF file
  • EP ID EP95583
  • DOI -
  • Views 69
  • Downloads 0

How To Cite

Mr. Haibat Jadhav (0).  A REVIEW PAPER ON ASSOCIATION RULES FOR PRIVACY-PRESERVING MINING FROM VARIOUS ENCRYPTION TECHNIQUES. International Journal of Engineering Sciences & Research Technology, 4(10), 596-600. https://europub.co.uk/articles/-A-95583