Privacy Preservation by Using AMDSRRC for Hiding Highly Sensitive Association Rule

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 6

Abstract

 Abstract: Researchers are needed for settling on the choice of information mining. In any case a few associations to help with some external counsellor for the procedure of information mining on the grounds that they don't have their consultant. At the time of getting counsel from the outside counsellor it may have to face risks. The loss of business intelligence and client information security and security related issues are emerging. In mining it is the main challenging issue. The owner of the data has some private information or property like association rule contained outsources database. However the mining results integrity can influence gravely if the administration supplier is not reliable. To overcome this problem we are planning to use AMDSRRC. In this paper, we propose a heuristic based algorithm named AMDSRRC (Advanced Modified Decrease Support of R.H.S. item of Rule Clusters) to conceal the exceedingly association rules with different items in consequent (R.H.S) and antecedent (L.H.S). The sensitive rule is the one having helped more prominent than or equivalent to MST (Minimum Support Threshold) and certainty more noteworthy than or equivalent to MCT (Minimum Confidence Threshold) & close to 100%. The planning is to improve efficiency and adaptability of the proposed algorithm than existing standard algorithm MDSSRC.

Authors and Affiliations

Mr. Pravin R. Pond , Prof. Chetan V. Andhare , Dr. S. M. Jagade (Ph. D)

Keywords

Related Articles

 A Flexible Method Using Identity Based Message Key Distribution for Securing Workflow Signatures

 Abstract: The increase in advancement of information technology led the migration of workflows from paper based to electronic workflow systems. Basically a workflow consists of a number of tasks and each of these t...

 Analysis of service-oriented traffic classification with imperfect traffic classification methods

 Typically the traffic through the network is heterogeneous and it flows from multiple utilities and applications Considering todays threats in network there is yet not a single solution to solve all the issues be...

 Performance Evaluation of Ipv4, Ipv6 Migration Techniques

 Abstract: The Internet Protocol Version 6 (IPv6) has gained popularity with companies,organizations andInternet service providers (ISPs) due to its enhancements over IPv4 such as (IPv6 128bit compared to ofipv4(32...

Support Vector Machine Based Sentiment Analysis Process for Twitter Streams

Abstract: Sentiment Research in twitter is quite tough due to its short length. Attendance of emoticons, slang words and misspellings in tweets compelled to have a preprocessing pace beforehand feature extraction. There...

 A Survey on Balancing the Network Load Using GeographicHash Tables

 Abstract: The load Balancing in the network is a severe problem in network. The data created in wirelessnetwork is kept on node. It accessed over geographic hash table. The geographic hash table is used to recoverd...

Download PDF file
  • EP ID EP88993
  • DOI -
  • Views 105
  • Downloads 0

How To Cite

Mr. Pravin R. Pond, Prof. Chetan V. Andhare, Dr. S. M. Jagade (Ph. D) (2014).  Privacy Preservation by Using AMDSRRC for Hiding Highly Sensitive Association Rule. IOSR Journals (IOSR Journal of Computer Engineering), 16(6), 60-65. https://europub.co.uk/articles/-A-88993