Study of Hiding Sensitive Data in Data Mining Using Association Rules
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 3
Abstract
Abstract: This paper describes Apriori algorithm for association rules for hiding sensitive data in data mining if Large data contain sensitive information that data must be protected from the unauthorized users. Here, we are going to hide this sensitive information in data mining using association rules, when we are going to apply rules for data that time it will falsely hidden information and fake rules falsely generated. So here, we examine confidentiality issues of a broad category of rules, which are called association rules. If the disclosure risk of some of these rules are above a certain privacy threshold, those rules must be characterized as sensitiveinformation in some cases sensitive rules should not be disclose to the public since, other things, they may be used for inference of sensitive data, or they may provided these sensitive data to business competitors with an advantages
Authors and Affiliations
Amol L. Deokate, Amruta D. Pawar, Harshal S. Sangle
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
Dynamic Source Routing (DSR) algorithm is simple and best suited for high mobility nodes in wireless ad hoc networks. Due to high mobility in ad-hoc network, route may not exit for long time. Hence, DSR alg...
Descriptive and multivariable analysis of the water parameters quality of Sfax sewage treatment plant after rehabilitation
This study detailed the effect of simultaneous multiple intrinsic and extrinsic factors on the characteristics of Sfax activated sludge wastewater treatment plant (WWTP), located in Southern East Tunisia. The pl...
MCDR: Mitigating Congestion using Distance based Routing in Wireless Sensor Networks
The network performance in WSNs is mainly affected by the congestion due to bursty traffic. Congestion can cause large packet drops, increased energy consumption and latency. Different traffic rate control mecha...
An Overview of Localization for Wireless Sensor Networks
Abstract: Localization is an important issue for location-dependent applications of wireless sensor networks. In Sensor networks, data collected by sensor nodes need to be tagged with time and location information. Local...
Implementation and Result Analysis of Polyalphabetic Approach to Caesar Cipher
Abstract: In the modern world as there is drastic hike in use of internet for our daily work there is need to keep our information safe and secure so that an intruder can’t misuse it. Cryptography was established t...