slugMaintaining Data Security In Privacy Preserving Association Rule Mining

Abstract

This paper is based on the various data mining techniques which are used to detect some unwanted transaction in data base. Our approach concentrates on mining data dependencies among data items in the database. A data dependency collier is designed for mining data correlations from the database. The transactions not amenable to the data dependencies mined are identified as mischievous transactions. The practical state that the proposed method works effectively for detecting malicious transactions provided certain data dependencies exist in the database. In particular, recent advances in the data mining field have lead to increased agitation about privacy. While the subject of privacy has been uniquely studied with respect of cryptography recent work in data mining field has lead to renewed interest in the field. In this paper, we will introduce the topic of privacy-preserving data mining and provide an overview of the different topics covered in this paper. .

Authors and Affiliations

Adesh chaudhary, Krishna Pratap Rao, Prashant Johri

Keywords

Related Articles

Handoff schemes and its performance analysis of priority within a particular channel in wireless systems

The whole civilization in the world is dependent on wireless technology. The Gradual growth or development of current environment of the people is not possible without communication. As the use of wireless/ mobile devic...

Impact Of VSC-HVDC In Frequency Regulation Of Offshore Wind Farms

The emerging large offshore wind farms represent a promising and efficient power production technology. The generating capacities of offshore plants are much large when compared to onshore plants. This is because of ava...

Experimental Study of Hybrid Concrete

Since ancient time, fiber reinforced concrete has been replaced with plain concrete which is brittle material. Although, the inclusion of single type fiber may improve mechanical properties of concrete, the hybridizatio...

Detection of Spatio-Textual Top-K Queries in Location-Based Services Using Reverse Keyword Search

A spatio-textual query retrieves the best objects with respect to a given location and a keyword set. A common solution is to employ a hybrid index which records the digest of the spatial and textual information. To eff...

Back Pressure Algorithm in Communication Networks Using Shadow Queuing

Back-pressure-based adaptative routing algorithms area unit wherever every packet is routed on a presumably totally different path. Algorithms usually lead to poor delay performance and involve high implementation compl...

Download PDF file
  • EP ID EP18348
  • DOI -
  • Views 253
  • Downloads 11

How To Cite

Adesh chaudhary, Krishna Pratap Rao, Prashant Johri (2014). slugMaintaining Data Security In Privacy Preserving Association Rule Mining. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 2(6), -. https://europub.co.uk/articles/-A-18348