slugMaintaining Data Security In Privacy Preserving Association Rule Mining

Abstract

This paper is based on the various data mining techniques which are used to detect some unwanted transaction in data base. Our approach concentrates on mining data dependencies among data items in the database. A data dependency collier is designed for mining data correlations from the database. The transactions not amenable to the data dependencies mined are identified as mischievous transactions. The practical state that the proposed method works effectively for detecting malicious transactions provided certain data dependencies exist in the database. In particular, recent advances in the data mining field have lead to increased agitation about privacy. While the subject of privacy has been uniquely studied with respect of cryptography recent work in data mining field has lead to renewed interest in the field. In this paper, we will introduce the topic of privacy-preserving data mining and provide an overview of the different topics covered in this paper. .

Authors and Affiliations

Adesh chaudhary, Krishna Pratap Rao, Prashant Johri

Keywords

Related Articles

A Comparative Study between Orthotropic and Isotropic Material Structures through Topology Optimization

A lot of work has been done on topology optimization of linearly elastic isotropic structures but the field of topology optimization of orthotropic materials is still untouched. Present work gives an insight into the to...

Searching Relevant Documents from Large Volume of Unstructured Database

In large organizations managing of data is very tedious task. these includes unstructured data such as images,videos,MP3 files, emails etc. The central aspect of research is to identify right document from unstructured...

CBR Improvement of Soil by Adding Lime and Fly Ash

The quality and life of pavement is greatly affected by the type of sub grade ,sub base and base course materials. The most important of these are type and quality of sub grade soil. But in India most of flexible paveme...

Simulation Based Performance in Terms of Node Energy for Different Proactive and Reactive Routing Protocols of MANET

Mobile Ad hoc network always has a challenge of curbing nodes energy during transmission and in other modes as nodes in the network runs with limited battery power which ultimately plays a keen role during entire transm...

Optimal Tuning of PID Controller by Firefly Algorithm in AVR System

n this Paper, a novel meta-heuristics algorithm, namely the Firefly Algorithm (FA) is applied to the Proportional Integral Derivative (PID) Controller parameter tuning for Automatic Voltage Regulator System (AVR). The m...

Download PDF file
  • EP ID EP18348
  • DOI -
  • Views 263
  • Downloads 11

How To Cite

Adesh chaudhary, Krishna Pratap Rao, Prashant Johri (2014). slugMaintaining Data Security In Privacy Preserving Association Rule Mining. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 2(6), -. https://europub.co.uk/articles/-A-18348