slugMaintaining Data Security In Privacy Preserving Association Rule Mining

Abstract

This paper is based on the various data mining techniques which are used to detect some unwanted transaction in data base. Our approach concentrates on mining data dependencies among data items in the database. A data dependency collier is designed for mining data correlations from the database. The transactions not amenable to the data dependencies mined are identified as mischievous transactions. The practical state that the proposed method works effectively for detecting malicious transactions provided certain data dependencies exist in the database. In particular, recent advances in the data mining field have lead to increased agitation about privacy. While the subject of privacy has been uniquely studied with respect of cryptography recent work in data mining field has lead to renewed interest in the field. In this paper, we will introduce the topic of privacy-preserving data mining and provide an overview of the different topics covered in this paper. .

Authors and Affiliations

Adesh chaudhary, Krishna Pratap Rao, Prashant Johri

Keywords

Related Articles

Path Based Test Suite Augmentation using Artificial Bee Colony Algorithm

Regression testing is the activity of retesting a program that ensures that no new bugs are generated into the previously tested code. This activity involves selecting a few test cases from the test suite that exercise...

An Algorithm for Creating Malicious Free Absolute Trust Peers in P2P Networks

Peer-to-peer (P2P) computing or networking is a distributed application architecture that partitions tasks or workloads between peers. The peers evaluate other peers based on their past interactions and then aggregate t...

Heart Disease Prediction Using Data Mining Classification

In this paper we present an analysis of the Heart disease for male patients using data mining techniques. The preprocessed data set consists of 210 records, which have all the available 8 fields from the database. We ha...

slugMobile Technology: The Strategic Impact Of Mobile Communications Within An Organization

Mobile Technology is a growing field converging mobile computing with telecommunications in a wireless environment that has become more robust in its own right. This convergence of mobile comm...

Biometric Recognition System Based On Mergence of Three Human Traits

This paper designs a Hybrid Biometric System which integrates together three human modalities: fingerprint, iris and face to outperform single modality based system. Light is thrown on all the algorithms used for pre-pr...

Download PDF file
  • EP ID EP18348
  • DOI -
  • Views 259
  • Downloads 11

How To Cite

Adesh chaudhary, Krishna Pratap Rao, Prashant Johri (2014). slugMaintaining Data Security In Privacy Preserving Association Rule Mining. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 2(6), -. https://europub.co.uk/articles/-A-18348