slugMaintaining Data Security In Privacy Preserving Association Rule Mining
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2014, Vol 2, Issue 6
Abstract
This paper is based on the various data mining techniques which are used to detect some unwanted transaction in data base. Our approach concentrates on mining data dependencies among data items in the database. A data dependency collier is designed for mining data correlations from the database. The transactions not amenable to the data dependencies mined are identified as mischievous transactions. The practical state that the proposed method works effectively for detecting malicious transactions provided certain data dependencies exist in the database. In particular, recent advances in the data mining field have lead to increased agitation about privacy. While the subject of privacy has been uniquely studied with respect of cryptography recent work in data mining field has lead to renewed interest in the field. In this paper, we will introduce the topic of privacy-preserving data mining and provide an overview of the different topics covered in this paper. .
Authors and Affiliations
Adesh chaudhary, Krishna Pratap Rao, Prashant Johri
Path Based Test Suite Augmentation using Artificial Bee Colony Algorithm
Regression testing is the activity of retesting a program that ensures that no new bugs are generated into the previously tested code. This activity involves selecting a few test cases from the test suite that exercise...
An Algorithm for Creating Malicious Free Absolute Trust Peers in P2P Networks
Peer-to-peer (P2P) computing or networking is a distributed application architecture that partitions tasks or workloads between peers. The peers evaluate other peers based on their past interactions and then aggregate t...
Heart Disease Prediction Using Data Mining Classification
In this paper we present an analysis of the Heart disease for male patients using data mining techniques. The preprocessed data set consists of 210 records, which have all the available 8 fields from the database. We ha...
slugMobile Technology: The Strategic Impact Of Mobile Communications Within An Organization
Mobile Technology is a growing field converging mobile computing with telecommunications in a wireless environment that has become more robust in its own right. This convergence of mobile comm...
Biometric Recognition System Based On Mergence of Three Human Traits
This paper designs a Hybrid Biometric System which integrates together three human modalities: fingerprint, iris and face to outperform single modality based system. Light is thrown on all the algorithms used for pre-pr...