Analysis of Pattern Transformation Algorithms for SensitiveKnowledge Protection in Data Mining

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 1

Abstract

 Abstract: Privacy Preserving Data Mining(PPDM) is an emerging research area. Its objective is to extend thetraditional data mining techniques to work with transformed data while protecting confidential information withminimized loss of privacy and information. In other words PPDM techniques aimed at modifying the originaldata while still being able to recover the data mining results from the modified data. This article analyses theexisting PPDM techniques and presents the analysis of the proposed algorithms in the research work.

Authors and Affiliations

Cynthia Selvi. P , Mohamed Shanavas. A. R

Keywords

Related Articles

Qos Parameters of an Energy Efficient Multicast Congestion Control Protocol (Eemccp) Over Fading Channels

In this paper we propose an energy efficient multicasting congestion control protocol for mobile ad hoc networks (MANETs) over fading channels. Our proposed scheme overcomes the disadvantages of existing multicast conges...

 Analyzing and Surveying Trust In Cloud ComputingEnvironment

 Abstract: Cloud computing is the most discussed research area now-a-days which helps to provide elasticityand flexibility in using the computing resources and services to fulfill the requirement of current business...

 IPv6: Threats Posed By Multicast Packets, Extension Headers  and Their Counter Measures

 Security issues concerning the spreading Internet Protocol version 6 (IPv6) is one of the major issues in the world of networking today. Since it is not the default network protocol deployed nowadays (but  s...

A Content-Based Image Retrieval Semantic Modelfor Shaped and Unshaped Objects

Abstract: This paper presents an efficient content based image retrieval scheme for both the shaped and unshaped objects. The local regions of an unshaped image have been classified with respect to the frequency ofoccurr...

 Review and Performance Comparison of Distributed Wireless  Reprogramming Protocols: SDRP and ISDRP

 A Reprogramming service should be efficient, reliable and secured in Wireless sensor network. Wireless reprogramming for wireless sensor network emphasize over the process of changing or improving the  funct...

Download PDF file
  • EP ID EP94878
  • DOI -
  • Views 93
  • Downloads 0

How To Cite

Cynthia Selvi. P, Mohamed Shanavas. A. R (2015).  Analysis of Pattern Transformation Algorithms for SensitiveKnowledge Protection in Data Mining. IOSR Journals (IOSR Journal of Computer Engineering), 17(1), 70-76. https://europub.co.uk/articles/-A-94878