Privacy Preserving in Association Rule Mining
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2015, Vol 3, Issue 2
Abstract
Data mining is the computer oriented process to evaluate vast database and extract the meaning of the data. Privacy is interrelated with secrecy and anonymity. Thus privacy preserving in data mining means maintaining secrecy which is concerned with the information that the others can retrieve from us. Then the loss of privacy means leakage of that information. So to mine the information from huge database number of techniques have developed that assures mining with privacy preserving. These technique are used to secure the sensitive items while extracting the appropriate knowledge from database. the methodology used to preserve the privacy in data mining using association rule is used because association rule mining is one of the important aspect in data mining. In this technique, secure multiparty computation is used which assures security using cryptography is also discussed. This technique ensures better privacy preserving with high efficiency.
Authors and Affiliations
Sneha V. Dhande, Priyanka K. Patil
Securing Data in Fiber Optics
Fiber optic has previously displayed unbeaten advantages, and was the most secure communication medium, but now it is very easy to tap fiber optic networks. There are a number of known methods of extracting or injecting...
Implementation of Fractional Order PID Controller for An AVR System Using GA Optimization Technique
In recent years, the research and studies on fractional order (FO) modelling of dynamic systems and controllers are quite advancing. To improve the stability and dynamic response of automatic voltage regulation (AVR) sy...
A Way Early Tag Access with Partial Tag Comparison Technique for Reducing Power Consumption of L1 Data Caches
In this paper, we propose a new cache design technique, referred to as early tag access (ETA) cache, to improve the energy efficiency of data caches in embedded processors. The proposed technique performs ETAs to determ...
A Survey on Video Watermarking Method for Reliability and Security in Video Using Least Significant Bit
Digital watermarking techniques have fastest growing techniques for copyright protection and authentication. Digital watermarking field has so many articles which covers innovative approach. Hence, watermarking is a sol...
Clustering For Research Based Projects Using Ontological Text Mining
This paper describes the software infrastructure (or product) which provides an overall description of research project being selection for government and private research funding agencies is an important task. When a l...