Privacy Preservation by Using AMDSRRC for Hiding Highly Sensitive Association Rule

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 6

Abstract

 Abstract: Researchers are needed for settling on the choice of information mining. In any case a few associations to help with some external counsellor for the procedure of information mining on the grounds that they don't have their consultant. At the time of getting counsel from the outside counsellor it may have to face risks. The loss of business intelligence and client information security and security related issues are emerging. In mining it is the main challenging issue. The owner of the data has some private information or property like association rule contained outsources database. However the mining results integrity can influence gravely if the administration supplier is not reliable. To overcome this problem we are planning to use AMDSRRC. In this paper, we propose a heuristic based algorithm named AMDSRRC (Advanced Modified Decrease Support of R.H.S. item of Rule Clusters) to conceal the exceedingly association rules with different items in consequent (R.H.S) and antecedent (L.H.S). The sensitive rule is the one having helped more prominent than or equivalent to MST (Minimum Support Threshold) and certainty more noteworthy than or equivalent to MCT (Minimum Confidence Threshold) & close to 100%. The planning is to improve efficiency and adaptability of the proposed algorithm than existing standard algorithm MDSSRC.

Authors and Affiliations

Mr. Pravin R. Pond , Prof. Chetan V. Andhare , Dr. S. M. Jagade (Ph. D)

Keywords

Related Articles

 Security Enforcement with query routing Information Brokering in Distributed Information Sharing

Abstract: Information brokering system (IBS) shares information via on-demand access. IBS connect large-scale loosely federated data sources via a brokering overlay. It is a peer-to-peer overlay network that comprises di...

 Security-Aware Packet Scheduling Scheme with Multi-Level Queuing and RSA

Emerging security-aware packet scheduling algorithms can efficiently improve the security measures while forwarding the packets over wireless links. Existing scheduling algorithms for real-time wireless networks are not...

 Detecting Good Neighbor Nodes and Finding Reliable Routing  Path Based on AODV Protocol

 Wireless operations allow services, such as long-range communications, that are impossible or impractical to implement with the use of wires. It is supported by well-liked technique known as Adhoc Protocol &nbsp...

I++Mapreduce: Incremental Mapreduce for Mining the Big Data

Abstract: Data mining is an interdisciplinary area of computer engineering. Incremental processing is a challenging approach to refreshing mining results and it uses saved states to avoid the cost of re computation from...

Detecting contiguous regions having traffic problems using taxi trajectories

Nowadays, taxi is one of the most popular transportation modes. There is a large amount of passenger using taxi everyday and taxi trajectories represent the mobility of people. In the big cities, taxi is equipped GPS dev...

Download PDF file
  • EP ID EP88993
  • DOI -
  • Views 107
  • Downloads 0

How To Cite

Mr. Pravin R. Pond, Prof. Chetan V. Andhare, Dr. S. M. Jagade (Ph. D) (2014).  Privacy Preservation by Using AMDSRRC for Hiding Highly Sensitive Association Rule. IOSR Journals (IOSR Journal of Computer Engineering), 16(6), 60-65. https://europub.co.uk/articles/-A-88993