EFFICIENT FILTERING OF DUPLICATE DATA WITH INCREASED PRIVACY AND MINING PRINCIPLES
|
|
- Sibyl Chase
- 5 years ago
- Views:
Transcription
1 Volume 118 No , ISSN: (printed version); ISSN: (on-line version) url: ijpam.eu EFFICIENT FILTERING OF DUPLICATE DATA WITH INCREASED PRIVACY AND MINING PRINCIPLES M.MOHANRAO 1 and DR.S.KARTHIK 2 1 Research Scholar,Department of CSE, Bharathiar University, Coimbatore, India. mohanrao19cse@gmail.com 2 Professor, Department of CSE, SNS College of Technology, Coimbatore, India January 12, 2018 Abstract Data/Information mining process is utilized to discover designs among the many fields in the expansive database. The primary test in information mining is to keep up the privacy protection of secret data. To share information while ensuring privacy protection, information proprietor must accomplish the objective of security conservation. Information irritation has been utilized to secure the privacy protection of delicate data. The proposed approach utilizes tuple estimations of the touchy ascribe to create a standardized esteem which produces bothered information. The subsequent information records appear to be extremely unique from the first records and the dispersion of information esteems is additionally not the same as the first dissemination. The proposed component gives low mistake rate contrasted and existing techniques
2 Key Words : Data Processing, Mining, Data Perturbation, Privacy Preserving. 1 Introduction Data/Information mining innovation has an objective of giving instruments to shrewdly changing a lot of information in learning applicable to clients [1]. The determine Knowledge frequently pass on in type of affiliation rules, choice trees or groups, enables one to discover alluring examples and regularities profoundly covered in the information that are intended to advance basic leadership forms. Such a learning disclosure prepare, be that as it may, can likewise return delicate data about people, bargaining the person s entitlement to protection. Also, information mining systems can uncover basic data about business exchanges, bargaining the free rivalry in a business setting. In this manner, there is a solid need to confine exposure of private individual data as well like of learning which is viewed as delicate in a given setting. Thus, as of late greatly explore exertion were dutiful to tending to the issue of protection saving-in information processing. Various newly planned procedures deal with problems like security protection with annoying information as well as reproducing disseminations of a total level keeping into mind the end goal to execute the mining. The normal added substance recreation strategy is segment based added substance randomization. This kind of strategies rely upon the realities that Data proprietors may not have any desire to consistently ensure all esteems in a record, consequently a segment based esteem twisting can be utilized to remake some touchy segments. The build-up approach [2] is a run of the mill multidimensional recreation system, which expectation at saving the covariance grid for numerous segments. In this manner, some geometric properties, for example, the state of choice limit are very much secured. Unique in relation to the randomization approach, it recovers numerous segments all in all to produce the whole recreated informational index. As the reproduced informational collection holds subjective framework, several active information processing/mining calculations be
3 able to utilized specifically into recreated informational index without requiring any change or new change of calculations. In information swapping, strategy privacy assurance can be accomplished by specifically trading a subset of properties esteems between chose record sets. Information swapping jelly the protection of unique touchy data accessible at the record level. In the event that the information is chosen aimlessly pro all swops next to as irregular swaps. Its troublesome pro infiltrator into perceive exacting individual otherwise element in the database since every one of the records is changed into greatest point. Lucky belongings transaction procedure is basic as-well-as-can utilized just scheduled touchy information lacking irritating nondelicate information. The present technique straightforward Simple- Additive-Noise ( SAN ) strategy [3] be including the commotion stricture that-has signify nil as-well-as-fluctuation extent stricture dictated near client into-the-underlying private property next outcome be a remade estimation of-a-secret characteristic. A hindrance of straightforward added substance commotion technique is that the clamor is free of the size of a classified characteristic. To crush the SIMPLE-ADDITIVE-NOISE strategy disadvantage next cutting edge approach is Multiplicative-Noise ( MN ) [4], in this technique, the classified characteristic is duplicated with the clamor with mean one to get remade estimation of a secret property. These two strategies are causes the inclination in the change of the private characteristic, and in addition in the connections between qualities. Another proposed strategy is Micro-Aggregation ( MA ) [2] [5], it-recreates information by conglomerating private esteems, rather than including commotion. For an informational collection with a solitary classified property, Univariate - Micro - Aggregation (UMA) includes arranging records by the private characteristic, gathering neighbouring documents/data in-to gatherings to little dimensions as-well-as supplanting entity secret esteems within every gathering by gathering normal. Identified with SIMPLE-ADDITIVE-NOISE and Multiplicative- Noise, Univariate-Micro-Aggregation produces inclination withinthe-difference mentioned-in-private property, and additionally in the connections among qualities. Multivariate-Micro-Aggregation ( MMA ) [5][6] bunches information utilizing a grouping system that depends on a multidimensional separation measure. There
4 fore, the connections inside ascribes should be better secured. Be that as it may, this advantage accompanies superior manipulationof-time-intricacy that might there wasteful pro expansive informational indexes. Consequently with a specific end goal to give protection to the substantial informational collections, in-this-system-an approach is proposed such-as: in view of the remaking trees [9], a kd-tree be an information arrangement pro dividing also putting away information. 2 Problem Statement and Resolution Privacy-Preserving-Data-Mining ( PP-DM ) addresses the issue like-creating exact replicas concerning accumulated information lacking entre to exact data into-singular information testimony. Theformerly considered bother based PP-DM approach acquaints irregular irritation with singular esteems to safeguard security before information is distributed. Accessible past arrangements of proposedapproach-are-restricted within-inferred suspicion by-single level faith on-information excavators. This-approach-proposes, by utilizing arbitrary revolution based information bother, as per our supposition, attempting to extend the extent of irritation based PP-DM to Energetic Multi-Level-Trust (EMLT- PP-DM ). In our work, the less bothered duplicate of the information can just get to the more put stock in an information excavator
5 3 Results and Summary At-this-time various anxious-sets be produced by dissimilar belief level os trust. As-well-as- intruder/interloper can-not completely rebuilds innovative information-replica with meaningful additional nervous replicas. As per clients-lots-of-agitated replicas be-ableto created. At this point data-owner has utmost suppleness consequently the-data-owner canister let-loose-the-needs. Following graph shows how the privacy is preserved in terms of percentage. Table 1. Result Analysis Fig.1. Proposed Output Graph
6 Graph 1 shows the output accuracy of the perturbed data sheet. Result shows conclusion i.e. higher accuracy of the data shows complexity of the data is higher. 4 Literature Survey Information-Mining ( PP-DM ) was at initial planned in [2]and[8] in the meantime. To address this issue, specialists have resulting to propose unmistakable blueprints that fall into two general portrayals in context of the level of security assertion they give. The five star of the Secure-Multiparty-Computation (S-M-C) approach gives the most grounded level of protection; it empowers for the most part uncertain substances to mine their aggregate information without uncovering anything next to what can be actuated from a segment s own specific data and the yield of the mining operation alone [8],[9]. On a basic level, any information using keeping in mind the end goal to mine figuring can be acknowledged nonexclusive estimations of Secure-Multiparty-Computation [10].However, these calculations are exceptionally costly a little while later and unfeasible for confirmed use. To keep up a key partition from the high computational cost, different plans those are more convincing than nonexclusive SMC tallies have been proposed for particular mining assignments. Answers for accumulate choice trees over the on a level plane partitioned were proposed in [8]. For vertically dispensed information, figuring s having been proposed to address the affiliation rule mining [9], k-gathers packaging [11], and steady delineation mining issues [12]. Crafted by [13] uses a guaranteed coprocessor for security saving synergistic information mining and examination. The-second-request of the lacking data stowing without end approach exchanges confirmation with enhanced execution as in toxic information excavators may surmise certain properties of the principle information from the covered information. Diverse plans in this course of action enable an information proprietor to change its information in various approaches to manage cover the certifiable estimations of the chief information while in the mean time still allow steady mining operations over the balanced information. This methodology can be moreover partitioned into three portray
7 als: 1) k-mystery [14], [15], 2) upkeep substitution (which holds a fragment with likelihood p or replaces it with a section investigated a likelihood designation confine on the domain of the parts), and 3) information unsettling influence (which presents unsteadiness about individual qualities previously information are circled) [1], [2], [3], [4], [5], [6], [7].The information bother approach joins two rule classes of frameworks: included substance [1], [2], [4], [5], [7] and structure multiplicative [3], [6] plans. These procedures apply by and large to continuing on information. In this paper, we concentrate freely on the extra substance aggravation approach where whine is added to information regards little trusted contraptions were utilized for secure utmost evaluation as a bit of [16]. 5 Conclusion and Future Scope Perturbation mechanism gives the protection safeguarding on touchy information with low mistake rate contrasted and existing strategies. To assess the instrument, few experiments can be performed on genuine information for giving the assurance and security on secret information as well as the ordinary test of mining the private information from Dataset-s issue fathomed by perturbation tree. Future work along this course is to consider how to apply two ways irritation strategy, so client can ready to recover unique esteems from bothered esteems. Likewise, annoyance strategy can apply on character credit esteems to ensure delicate property estimations. References [1] Kun Liu, Hillol Kargupta, IEEE, Random Projection Based Multiplicative Data Reconstruction for Privacy Preserving Distributed Data Mining, IEEE Trans Knowl. Data Eng, VOL. 18, NO. 1, JANUARY [2] C.C. Aggarwal and P.S. Yu, A Condensation Approach to Privacy Preserving Data Mining, Proc. Ninth Intl Conf. Extending Database Technology, pp ,
8 [3] N.R. Adam and J.C. Wortmann, Security-Control Methods for Statistical Databases: A Comparative Study, ACM Computing Surveys, vol. 21, no. 4, pp , [4] R. Agrawal and R. Srikant, Privacy-Preserving Data Mining, Proc ACM SIGMOD Intl Conf. Management of Data, pp , 2000 [5] J. Domingo-Ferrer and J.M. Mateo-Sanz, Practical Data- Oriented Micro aggregation for Statistical Disclosure Control, IEEE Trans. Knowledge and Data Eng., vol. 14, no. 1, pp , [6] J. Domingo-Ferrer and V. Torra, Ordinal, Continuous and Heterogeneous k-anonymity through Micro aggregation, Data Mining and Knowledge Discovery, vol. 11, no. 2, pp , [7] Agrawal R., Srikant R, Privacy-Preserving Data Mining, ACM SIGMOD Con- ference, 2009 [8] Y. Lindell and B. Pinkas, Privacy Preserving Data Mining, Proc. Intl Cryptology Conf. (CRYPTO), [9] J. Vaidya and C.W. Clifton, Privacy Preserving Association Rule Mining in Vertically Partitioned Data, Proc. ACM SIGKDD Intl Conf. Knowledge Discovery and Data Mining, [10] O. Goldreichi, Secure Multi-Party Computation, Final (incomplete) draft, version 1.4, [11] J. Vaidya and C. Clifton, Privacy-Preserving K-Means Clustering over Vertically Partitioned Data, Proc. ACM SIGKDD Intl Conf. Knowledge Discovery and Data Mining, [12] A.W.-C. Fu, R.C.-W. Wong, and K. Wang, Privacy-Preserving Frequent Pattern Mining across Private Databases, Proc. IEEE Fifth Intl Conf. Data Mining, [13] B.A. Huberman, M. Franklin, and T. Hogg, Enhancing Privacy and Trust in Electronic Communities, Proc. First ACM Conf.Electronic Commerce, pp , Nov
9 [14] M. Freedman, K. Nissim, and B. Pinkas, Efficient Private Matching and Set Intersection, Advances in CryptologyEU- ROCRYPT, vol. 3027, pp. 1-19, [15] L. Kissner and D. Song, Privacy-Preserving Set Operations, Proc. Intl Cryptology Conf. (CRYPTO), [16] P. Valake Tejashri and S. Patil Sachin A Enabling Multilevel Trust Privacy Preserving Data Mining using Random Rotation Based Data Perturbation Elsevier Publications ERCICA [17] Enabling Multilevel Trust in Privacy Preserving Data Mining IEEE transactions on knowledge and data engineering, VOL. 24, NO. 9, SEPTEMBER
10 3020
Privacy Preserving through Data Perturbation using Random Rotation Based Technique in Data Mining
Privacy Preserving through Data Perturbation using Random Rotation Based Technique in Data Mining Mr. Swapnil Kadam, Prof. Navnath Pokale Abstract Data perturbation technique is, a widely employed and
More informationADDITIVE GAUSSIAN NOISE BASED DATA PERTURBATION IN MULTI-LEVEL TRUST PRIVACY PRESERVING DATA MINING
ADDITIVE GAUSSIAN NOISE BASED DATA PERTURBATION IN MULTI-LEVEL TRUST PRIVACY PRESERVING DATA MINING R.Kalaivani #1,S.Chidambaram #2 # Department of Information Techology, National Engineering College,
More informationPreserving Data Mining through Data Perturbation
Preserving Data Mining through Data Perturbation Mr. Swapnil Kadam, Prof. Navnath Pokale Abstract Data perturbation, a widely employed and accepted Privacy Preserving Data Mining (PPDM) approach, tacitly
More informationAccumulative Privacy Preserving Data Mining Using Gaussian Noise Data Perturbation at Multi Level Trust
Accumulative Privacy Preserving Data Mining Using Gaussian Noise Data Perturbation at Multi Level Trust G.Mareeswari 1, V.Anusuya 2 ME, Department of CSE, PSR Engineering College, Sivakasi, Tamilnadu,
More informationFREQUENT ITEMSET MINING USING PFP-GROWTH VIA SMART SPLITTING
FREQUENT ITEMSET MINING USING PFP-GROWTH VIA SMART SPLITTING Neha V. Sonparote, Professor Vijay B. More. Neha V. Sonparote, Dept. of computer Engineering, MET s Institute of Engineering Nashik, Maharashtra,
More informationIMPLEMENTATION OF UNIFY ALGORITHM FOR MINING OF ASSOCIATION RULES IN PARTITIONED DATABASES
IMPLEMENTATION OF UNIFY ALGORITHM FOR MINING OF ASSOCIATION RULES IN PARTITIONED DATABASES KATARU MANI 1, N. JAYA KRISHNA 2 1 Mtech Student, Department of CSE. EMAIL: manicsit@gmail.com 2 Assistant Professor,
More informationImproving Privacy And Data Utility For High- Dimensional Data By Using Anonymization Technique
Improving Privacy And Data Utility For High- Dimensional Data By Using Anonymization Technique P.Nithya 1, V.Karpagam 2 PG Scholar, Department of Software Engineering, Sri Ramakrishna Engineering College,
More informationPERTURBATION BASED RELIABILITY AND MAINTAINING AUTHENTICATION IN DATA MINING
PERTURBATION BASED RELIABILITY AND MAINTAINING AUTHENTICATION IN DATA MINING Patil Dnyanesh, W Shaikh Zainoddin M Akhtar, Loknath S, Rashmi.T.N Abstract This paper explores the possibility of using multiplicative
More informationPartition Based Perturbation for Privacy Preserving Distributed Data Mining
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 17, No 2 Sofia 2017 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.1515/cait-2017-0015 Partition Based Perturbation
More informationISSN : November2017
ISSN :23195991 Vol.6,No.4 November2017 Int. J. Engg. Res. & Sci. & Tech. 2017 Priya Rajput and Amit Thakur, 2017 Research Paper ISSN 2319-5991 www.ijerst.com Vol. 6, No. 4, November 2017 2017 IJERST. All
More information. (1) N. supp T (A) = If supp T (A) S min, then A is a frequent itemset in T, where S min is a user-defined parameter called minimum support [3].
An Improved Approach to High Level Privacy Preserving Itemset Mining Rajesh Kumar Boora Ruchi Shukla $ A. K. Misra Computer Science and Engineering Department Motilal Nehru National Institute of Technology,
More informationSTUDY ON FREQUENT PATTEREN GROWTH ALGORITHM WITHOUT CANDIDATE KEY GENERATION IN DATABASES
STUDY ON FREQUENT PATTEREN GROWTH ALGORITHM WITHOUT CANDIDATE KEY GENERATION IN DATABASES Prof. Ambarish S. Durani 1 and Mrs. Rashmi B. Sune 2 1 Assistant Professor, Datta Meghe Institute of Engineering,
More informationInternational Journal of Advance Engineering and Research Development
Scientific Journal of Impact Factor (SJIF): 4.14 International Journal of Advance Engineering and Research Development Volume 3, Issue 3, March -2016 e-issn (O): 2348-4470 p-issn (P): 2348-6406 Identify
More informationMultilevel Data Aggregated Using Privacy Preserving Data mining
Multilevel Data Aggregated Using Privacy Preserving Data mining V.Nirupa Department of Computer Science and Engineering Madanapalle, Andhra Pradesh, India M.V.Jaganadha Reddy Department of Computer Science
More informationInternational Journal of Modern Trends in Engineering and Research e-issn No.: , Date: 2-4 July, 2015
International Journal of Modern Trends in Engineering and Research www.ijmter.com e-issn No.:2349-9745, Date: 2-4 July, 2015 Privacy Preservation Data Mining Using GSlicing Approach Mr. Ghanshyam P. Dhomse
More informationA Survey on: Privacy Preserving Mining Implementation Techniques
A Survey on: Privacy Preserving Mining Implementation Techniques Mukesh Kumar Dangi P.G. Scholar Computer Science & Engineering, Millennium Institute of Technology Bhopal E-mail-mukeshlncit1987@gmail.com
More informationInternational Journal of Modern Engineering and Research Technology
Volume 2, Issue 4, October 2015 ISSN: 2348-8565 (Online) International Journal of Modern Engineering and Research Technology Website: http://www.ijmert.org Privacy Preservation in Data Mining Using Mixed
More informationPrivacy Preserving Classification of heterogeneous Partition Data through ID3 Technique
Privacy Preserving Classification of heterogeneous Partition Data through ID3 Technique Saurabh Karsoliya 1 B.Tech. (CSE) MANIT, Bhopal, M.P., INDIA Abstract: The goal of data mining is to extract or mine
More informationImplementation of Privacy Mechanism using Curve Fitting Method for Data Publishing in Health Care Domain
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 5, May 2014, pg.1105
More informationSurvey Result on Privacy Preserving Techniques in Data Publishing
Survey Result on Privacy Preserving Techniques in Data Publishing S.Deebika PG Student, Computer Science and Engineering, Vivekananda College of Engineering for Women, Namakkal India A.Sathyapriya Assistant
More informationImplementation of Data Clustering With Meta Information Using Improved K-Means Algorithm Based On COATES Approach
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 3 March 2015, Page No. 10647-10651 Implementation of Clustering With Meta Information Using Improved
More informationPrivacy Preserving On Continuous and Discrete Data Sets- A Novel Approach
Privacy Preserving On Continuous and Discrete Data Sets- A Novel Approach Sathya Rangasamy, 1 P.Suvithavani 2 1 M.E Computer Science and Engineering, Sri Shakthi Institute of Engineering and Technology,
More informationPPKM: Preserving Privacy in Knowledge Management
PPKM: Preserving Privacy in Knowledge Management N. Maheswari (Corresponding Author) P.G. Department of Computer Science Kongu Arts and Science College, Erode-638-107, Tamil Nadu, India E-mail: mahii_14@yahoo.com
More informationPRIVACY PRESERVING IN DISTRIBUTED DATABASE USING DATA ENCRYPTION STANDARD (DES)
PRIVACY PRESERVING IN DISTRIBUTED DATABASE USING DATA ENCRYPTION STANDARD (DES) Jyotirmayee Rautaray 1, Raghvendra Kumar 2 School of Computer Engineering, KIIT University, Odisha, India 1 School of Computer
More informationAn Approach for Privacy Preserving in Association Rule Mining Using Data Restriction
International Journal of Engineering Science Invention Volume 2 Issue 1 January. 2013 An Approach for Privacy Preserving in Association Rule Mining Using Data Restriction Janakiramaiah Bonam 1, Dr.RamaMohan
More informationImproved K-Means Algorithm Based on COATES Approach. Yeola, Maharashtra, India. Yeola, Maharashtra, India.
Improved K-Means Algorithm Based on COATES Approach Mr.Nikhil Patankar 1, Prof.Prakash Rokade 2 1 Department of Computer Engineering, SND College of Engineering & Research Center, Yeola, Maharashtra, India
More informationQuery Result Extraction Using Dynamic Query Forms
Query Result Extraction Using Dynamic Query Forms #1 Mrs. I. Anitha Rani, #2 Y.Vijay, #3 Abdul Moseen #1 Assistant Professor, Department of Computer Science Engineering,Andhra Loyola Institute Of Engineering
More informationPrivacy Preserving Naïve Bayes Classifier for Horizontally Distribution Scenario Using Un-trusted Third Party
IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661, ISBN: 2278-8727, Volume 7, Issue 6 (Nov. - Dec. 2012), PP 04-12 Privacy Preserving Naïve Bayes Classifier for Horizontally Distribution Scenario
More informationReview on Techniques of Collaborative Tagging
Review on Techniques of Collaborative Tagging Ms. Benazeer S. Inamdar 1, Mrs. Gyankamal J. Chhajed 2 1 Student, M. E. Computer Engineering, VPCOE Baramati, Savitribai Phule Pune University, India benazeer.inamdar@gmail.com
More informationMINING ASSOCIATION RULE FOR HORIZONTALLY PARTITIONED DATABASES USING CK SECURE SUM TECHNIQUE
MINING ASSOCIATION RULE FOR HORIZONTALLY PARTITIONED DATABASES USING CK SECURE SUM TECHNIQUE Jayanti Danasana 1, Raghvendra Kumar 1 and Debadutta Dey 1 1 School of Computer Engineering, KIIT University,
More informationImproving effectiveness in Large Scale Data by concentrating Deduplication
Improving effectiveness in Large Scale Data by concentrating Deduplication 1 R. Umadevi, 2 K.Kokila, 1 Assistant Professor, Department of CS, Srimad Andavan Arts & Science College (Autonomous) Trichy-620005.
More informationKeywords Data alignment, Data annotation, Web database, Search Result Record
Volume 5, Issue 8, August 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Annotating Web
More informationThe Applicability of the Perturbation Model-based Privacy Preserving Data Mining for Real-world Data
The Applicability of the Perturbation Model-based Privacy Preserving Data Mining for Real-world Data Li Liu, Murat Kantarcioglu and Bhavani Thuraisingham Computer Science Department University of Texas
More informationPrivacy and Security Ensured Rule Mining under Partitioned Databases
www.ijiarec.com ISSN:2348-2079 Volume-5 Issue-1 International Journal of Intellectual Advancements and Research in Engineering Computations Privacy and Security Ensured Rule Mining under Partitioned Databases
More informationResearch Trends in Privacy Preserving in Association Rule Mining (PPARM) On Horizontally Partitioned Database
204 IJEDR Volume 2, Issue ISSN: 232-9939 Research Trends in Privacy Preserving in Association Rule Mining (PPARM) On Horizontally Partitioned Database Rachit Adhvaryu, 2 Nikunj Domadiya PG Student, 2 Professor
More informationInfrequent Weighted Itemset Mining Using SVM Classifier in Transaction Dataset
Infrequent Weighted Itemset Mining Using SVM Classifier in Transaction Dataset M.Hamsathvani 1, D.Rajeswari 2 M.E, R.Kalaiselvi 3 1 PG Scholar(M.E), Angel College of Engineering and Technology, Tiruppur,
More informationA Cryptographic Privacy Preserving Approach over Classification
A Cryptographic Privacy Preserving Approach over Classification Sivasankar Vakkalagadda *, Satyanarayana Mummana # Final M.Tech Student, Assistant Professor Department of CSE, Avanthi Institute of Engineering
More informationPRIVACY PRESERVING CONTENT BASED SEARCH OVER OUTSOURCED IMAGE DATA
PRIVACY PRESERVING CONTENT BASED SEARCH OVER OUTSOURCED IMAGE DATA Supriya Pentewad 1, Siddhivinayak Kulkarni 2 1 Department of Computer Engineering. MIT College of Engineering, Pune, India 2 Department
More informationDENSITY BASED AND PARTITION BASED CLUSTERING OF UNCERTAIN DATA BASED ON KL-DIVERGENCE SIMILARITY MEASURE
DENSITY BASED AND PARTITION BASED CLUSTERING OF UNCERTAIN DATA BASED ON KL-DIVERGENCE SIMILARITY MEASURE Sinu T S 1, Mr.Joseph George 1,2 Computer Science and Engineering, Adi Shankara Institute of Engineering
More informationA FUZZY BASED APPROACH FOR PRIVACY PRESERVING CLUSTERING
A FUZZY BASED APPROACH FOR PRIVACY PRESERVING CLUSTERING 1 B.KARTHIKEYAN, 2 G.MANIKANDAN, 3 V.VAITHIYANATHAN 1 Assistant Professor, School of Computing, SASTRA University, TamilNadu, India. 2 Assistant
More informationRaunak Rathi 1, Prof. A.V.Deorankar 2 1,2 Department of Computer Science and Engineering, Government College of Engineering Amravati
Analytical Representation on Secure Mining in Horizontally Distributed Database Raunak Rathi 1, Prof. A.V.Deorankar 2 1,2 Department of Computer Science and Engineering, Government College of Engineering
More informationAnomaly Detection on Data Streams with High Dimensional Data Environment
Anomaly Detection on Data Streams with High Dimensional Data Environment Mr. D. Gokul Prasath 1, Dr. R. Sivaraj, M.E, Ph.D., 2 Department of CSE, Velalar College of Engineering & Technology, Erode 1 Assistant
More informationApproaches to distributed privacy protecting data mining
Approaches to distributed privacy protecting data mining Bartosz Przydatek CMU Approaches to distributed privacy protecting data mining p.1/11 Introduction Data Mining and Privacy Protection conflicting
More informationSupporting Fuzzy Keyword Search in Databases
I J C T A, 9(24), 2016, pp. 385-391 International Science Press Supporting Fuzzy Keyword Search in Databases Jayavarthini C.* and Priya S. ABSTRACT An efficient keyword search system computes answers as
More informationAutomated Information Retrieval System Using Correlation Based Multi- Document Summarization Method
Automated Information Retrieval System Using Correlation Based Multi- Document Summarization Method Dr.K.P.Kaliyamurthie HOD, Department of CSE, Bharath University, Tamilnadu, India ABSTRACT: Automated
More informationDynamic Optimization of Generalized SQL Queries with Horizontal Aggregations Using K-Means Clustering
Dynamic Optimization of Generalized SQL Queries with Horizontal Aggregations Using K-Means Clustering Abstract Mrs. C. Poongodi 1, Ms. R. Kalaivani 2 1 PG Student, 2 Assistant Professor, Department of
More informationOutlier Detection Using Unsupervised and Semi-Supervised Technique on High Dimensional Data
Outlier Detection Using Unsupervised and Semi-Supervised Technique on High Dimensional Data Ms. Gayatri Attarde 1, Prof. Aarti Deshpande 2 M. E Student, Department of Computer Engineering, GHRCCEM, University
More informationAgglomerative clustering on vertically partitioned data
Agglomerative clustering on vertically partitioned data R.Senkamalavalli Research Scholar, Department of Computer Science and Engg., SCSVMV University, Enathur, Kanchipuram 631 561 sengu_cool@yahoo.com
More informationClassification of Page to the aspect of Crawl Web Forum and URL Navigation
Classification of Page to the aspect of Crawl Web Forum and URL Navigation Yerragunta Kartheek*1, T.Sunitha Rani*2 M.Tech Scholar, Dept of CSE, QISCET, ONGOLE, Dist: Prakasam, AP, India. Associate Professor,
More informationPrivacy Preserving Mining Techniques and Precaution for Data Perturbation
Privacy Preserving Mining Techniques and Precaution for Data Perturbation J.P. Maurya 1, Sandeep Kumar 2, Sushanki Nikhade 3 1 Asst.Prof. C.S Dept., IES BHOPAL 2 Mtech Scholar, IES BHOPAL 1 jpeemaurya@gmail.com,
More informationAn Adaptive and Optimal Distributed Clustering for Wireless Sensor
An Adaptive and Optimal Distributed Clustering for Wireless Sensor M. Senthil Kumaran, R. Haripriya 2, R.Nithya 3, Vijitha ananthi 4 Asst. Professor, Faculty of CSE, SCSVMV University, Kanchipuram. 2,
More informationFuzzy Cognitive Maps application for Webmining
Fuzzy Cognitive Maps application for Webmining Andreas Kakolyris Dept. Computer Science, University of Ioannina Greece, csst9942@otenet.gr George Stylios Dept. of Communications, Informatics and Management,
More informationA Survey on: Techniques of Privacy Preserving Mining Implementation
www.ijarcet.org 50 A Survey on: Techniques of Privacy Preserving Mining Implementation Priya Gupta, Sini Shibu Abstract With the increase in the data mining algorithm knowledge extraction from the large
More informationComparison of Online Record Linkage Techniques
International Research Journal of Engineering and Technology (IRJET) e-issn: 2395-0056 Volume: 02 Issue: 09 Dec-2015 p-issn: 2395-0072 www.irjet.net Comparison of Online Record Linkage Techniques Ms. SRUTHI.
More informationEmerging Measures in Preserving Privacy for Publishing The Data
Emerging Measures in Preserving Privacy for Publishing The Data K.SIVARAMAN 1 Assistant Professor, Dept. of Computer Science, BIST, Bharath University, Chennai -600073 1 ABSTRACT: The information in the
More informationA Survey on A Privacy Preserving Technique using K-means Clustering Algorithm
A Survey on A Privacy Preserving Technique using K-means Clustering Algorithm Falguni A.Patel 1, Chetna G.Chand 2 1 Student(Master of Engineering), Computer Engineering Department, Government Engineering
More informationPreserving Privacy Using Gradient Descent Methods Applied for Neural Network with Distributed Datasets
www.ijcsi.org 728 Preserving Privacy Using Gradient Descent Methods Applied for Neural Network with Distributed Datasets Mr.Sachin P.Yadav, Mr.Amit B.Chougule 1 D.Y.Patil College of Engineering Kolhapur,Maharashtra,India
More informationUNCOVERING OF ANONYMOUS ATTACKS BY DISCOVERING VALID PATTERNS OF NETWORK
UNCOVERING OF ANONYMOUS ATTACKS BY DISCOVERING VALID PATTERNS OF NETWORK Dr G.Charles Babu Professor MRE College Secunderabad, India. charlesbabu26@gmail.com N.Chennakesavulu Assoc.Professor Wesley PG
More informationVerifying Result Correctness of Outsourced Frequent Item set Mining using Rob Frugal Algorithm
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 5.258 IJCSMC,
More informationReconstruction-based Classification Rule Hiding through Controlled Data Modification
Reconstruction-based Classification Rule Hiding through Controlled Data Modification Aliki Katsarou, Aris Gkoulalas-Divanis, and Vassilios S. Verykios Abstract In this paper, we propose a reconstruction
More informationAn Architecture for Privacy-preserving Mining of Client Information
An Architecture for Privacy-preserving Mining of Client Information Murat Kantarcioglu Jaideep Vaidya Department of Computer Sciences Purdue University 1398 Computer Sciences Building West Lafayette, IN
More informationEnhancing Availability Using Identity Privacy Preserving Mechanism in Cloud Data Storage
Enhancing Availability Using Identity Privacy Preserving Mechanism in Cloud Data Storage V.Anjani Kranthi *1, Smt.D.Hemalatha *2 M.Tech Student, Dept of CSE, S.R.K.R engineering college, Bhimavaram, AP,
More informationA Top Catching Scheme Consistency Controlling in Hybrid P2P Network
A Top Catching Scheme Consistency Controlling in Hybrid P2P Network V. Asha*1, P Ramesh Babu*2 M.Tech (CSE) Student Department of CSE, Priyadarshini Institute of Technology & Science, Chintalapudi, Guntur(Dist),
More informationExperimental Analysis of a Privacy-Preserving Scalar Product Protocol
Experimental Analysis of a Privacy-Preserving Scalar Product Protocol Zhiqiang Yang Rebecca N. Wright Hiranmayee Subramaniam Computer Science Department Stevens Institute of Technology graduate Stevens
More informationAuto Secured Text Monitor in Natural Scene Images
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 18, Issue 4, Ver. V (Jul.-Aug. 2016), PP 148-152 www.iosrjournals.org Auto Secured Text Monitor in Natural Scene
More informationAn Efficient Technique for Tag Extraction and Content Retrieval from Web Pages
An Efficient Technique for Tag Extraction and Content Retrieval from Web Pages S.Sathya M.Sc 1, Dr. B.Srinivasan M.C.A., M.Phil, M.B.A., Ph.D., 2 1 Mphil Scholar, Department of Computer Science, Gobi Arts
More informationINFREQUENT WEIGHTED ITEM SET MINING USING NODE SET BASED ALGORITHM
INFREQUENT WEIGHTED ITEM SET MINING USING NODE SET BASED ALGORITHM G.Amlu #1 S.Chandralekha #2 and PraveenKumar *1 # B.Tech, Information Technology, Anand Institute of Higher Technology, Chennai, India
More informationPrivacy Preserving Two-Layer Decision Tree Classifier for Multiparty Databases
Privacy Preserving Two-Layer Decision Tree Classifier for Multiparty Databases Alka Gangrade T.I.T.-M.C.A. Technocrats Institute of Technology Bhopal, India alkagangrade@yahoo.co.in Ravindra Patel Dept.
More informationDistributed Bottom up Approach for Data Anonymization using MapReduce framework on Cloud
Distributed Bottom up Approach for Data Anonymization using MapReduce framework on Cloud R. H. Jadhav 1 P.E.S college of Engineering, Aurangabad, Maharashtra, India 1 rjadhav377@gmail.com ABSTRACT: Many
More informationEFFICIENT AND PRIVACY-AWARE DATA AGGREGATION IN MOBILE SENSING
EFFICIENT AND PRIVACY-AWARE DATA AGGREGATION IN MOBILE SENSING E. PRAGANAVI 1,A. GAYATHRI 2 12 Assistant Professor, 12 Department of Computer Science, UCE OU, Hyderabad, Telangana, India. Abstract: - Mobile
More informationSurvey Paper on Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,
More informationSurvey: Efficent tree based structure for mining frequent pattern from transactional databases
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 9, Issue 5 (Mar. - Apr. 2013), PP 75-81 Survey: Efficent tree based structure for mining frequent pattern from
More informationClassifying Twitter Data in Multiple Classes Based On Sentiment Class Labels
Classifying Twitter Data in Multiple Classes Based On Sentiment Class Labels Richa Jain 1, Namrata Sharma 2 1M.Tech Scholar, Department of CSE, Sushila Devi Bansal College of Engineering, Indore (M.P.),
More informationPrivacy Preserving Data Mining Technique and Their Implementation
International Journal of Research Studies in Computer Science and Engineering (IJRSCSE) Volume 4, Issue 2, 2017, PP 14-19 ISSN 2349-4840 (Print) & ISSN 2349-4859 (Online) DOI: http://dx.doi.org/10.20431/2349-4859.0402003
More informationService-Oriented Architecture for Privacy-Preserving Data Mashup
Service-Oriented Architecture for Privacy-Preserving Data Mashup Thomas Trojer a Benjamin C. M. Fung b Patrick C. K. Hung c a Quality Engineering, Institute of Computer Science, University of Innsbruck,
More informationProwess Improvement of Accuracy for Moving Rating Recommendation System
2017 IJSRST Volume 3 Issue 1 Print ISSN: 2395-6011 Online ISSN: 2395-602X Themed Section: Scienceand Technology Prowess Improvement of Accuracy for Moving Rating Recommendation System P. Damodharan *1,
More informationA Study on Data Perturbation Techniques in Privacy Preserving Data Mining
A Study on Data Perturbation Techniques in Privacy Preserving Data Mining Nimpal Patel, Shreya Patel Student, Dept. Of Computer Engineering, Grow More Faculty of Engineering Himatnagar, Gujarat, India
More informationANONYMIZATION OF DATA USING MAPREDUCE ON CLOUD
ANONYMIZATION OF DATA USING MAPREDUCE ON CLOUD Mallappa Gurav 1, N. V. Karekar 2, Manjunath Suryavanshi 3 1 Dept. Of Computer Science and Engineering, K. L. E College of Engineering & Technology, Chikodi-591
More informationDetection of Anomalies using Online Oversampling PCA
Detection of Anomalies using Online Oversampling PCA Miss Supriya A. Bagane, Prof. Sonali Patil Abstract Anomaly detection is the process of identifying unexpected behavior and it is an important research
More informationAn Efficient Approach for Color Pattern Matching Using Image Mining
An Efficient Approach for Color Pattern Matching Using Image Mining * Manjot Kaur Navjot Kaur Master of Technology in Computer Science & Engineering, Sri Guru Granth Sahib World University, Fatehgarh Sahib,
More informationPerformance Evaluation of A Role Based Access Control Constraints in Role Mining Using Cardinality
Performance Evaluation of A Role Based Access Control Constraints in Role Mining Using Cardinality Yogita R. More 1, Dr. S. V. Gumaste 2 PG Scholar, Dept.Of Computer Engineering, GES's R. H. Sapat COE,
More informationRECORD DEDUPLICATION USING GENETIC PROGRAMMING APPROACH
Int. J. Engg. Res. & Sci. & Tech. 2013 V Karthika et al., 2013 Research Paper ISSN 2319-5991 www.ijerst.com Vol. 2, No. 2, May 2013 2013 IJERST. All Rights Reserved RECORD DEDUPLICATION USING GENETIC PROGRAMMING
More informationA Survey On Privacy Conflict Detection And Resolution In Online Social Networks
A Survey On Privacy Conflict Detection And Resolution In Online Social Networks Miss. Patare Tanuja Vilas 1, Prof.N.G.Pardeshi 2 1 PG Student, SRES COE, Kopargaon, SPPU, Maharashtra, India 2 Assistant
More informationIntegration of information security and network data mining technology in the era of big data
Acta Technica 62 No. 1A/2017, 157 166 c 2017 Institute of Thermomechanics CAS, v.v.i. Integration of information security and network data mining technology in the era of big data Lu Li 1 Abstract. The
More informationAnonymization Algorithms - Microaggregation and Clustering
Anonymization Algorithms - Microaggregation and Clustering Li Xiong CS573 Data Privacy and Anonymity Anonymization using Microaggregation or Clustering Practical Data-Oriented Microaggregation for Statistical
More informationDistance-based Outlier Detection: Consolidation and Renewed Bearing
Distance-based Outlier Detection: Consolidation and Renewed Bearing Gustavo. H. Orair, Carlos H. C. Teixeira, Wagner Meira Jr., Ye Wang, Srinivasan Parthasarathy September 15, 2010 Table of contents Introduction
More informationAdvanced Searchable Encryption Scheme for Secure Data Sharing in Cloud
Advanced Searchable Encryption Scheme for Secure Data Sharing in Cloud Anusha K 1, Babitha M N 2 PG Student, Department of Computer Science & Engineering, SSIT, Tumakuru, Karnataka, India 1 Assistant Professor,
More informationDMSA TECHNIQUE FOR FINDING SIGNIFICANT PATTERNS IN LARGE DATABASE
DMSA TECHNIQUE FOR FINDING SIGNIFICANT PATTERNS IN LARGE DATABASE Saravanan.Suba Assistant Professor of Computer Science Kamarajar Government Art & Science College Surandai, TN, India-627859 Email:saravanansuba@rediffmail.com
More informationEnhancing Reliability and Scalability in Dynamic Group System Using Three Level Security Mechanisms
Enhancing Reliability and Scalability in Dynamic Group System Using Three Level Security Mechanisms A.Sarika*1, Smt.J.Raghaveni*2 M.Tech Student, Dept of CSE, S.R.K.R Engineering college, Bhimavaram, AP,
More informationCorrelation Based Feature Selection with Irrelevant Feature Removal
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,
More informationMining of Web Server Logs using Extended Apriori Algorithm
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Journal of Emerging Technologies in Computational
More informationGRID SIMULATION FOR DYNAMIC LOAD BALANCING
GRID SIMULATION FOR DYNAMIC LOAD BALANCING Kapil B. Morey 1, Prof. A. S. Kapse 2, Prof. Y. B. Jadhao 3 1 Research Scholar, Computer Engineering Dept., Padm. Dr. V. B. Kolte College of Engineering, Malkapur,
More informationStatistical Databases: Query Restriction
Statistical Databases: Query Restriction Nina Mishra January 21, 2004 Introduction A statistical database typically contains information about n individuals where n is very large. A statistical database
More informationLetter Pair Similarity Classification and URL Ranking Based on Feedback Approach
Letter Pair Similarity Classification and URL Ranking Based on Feedback Approach P.T.Shijili 1 P.G Student, Department of CSE, Dr.Nallini Institute of Engineering & Technology, Dharapuram, Tamilnadu, India
More informationAutomated Path Ascend Forum Crawling
Automated Path Ascend Forum Crawling Ms. Joycy Joy, PG Scholar Department of CSE, Saveetha Engineering College,Thandalam, Chennai-602105 Ms. Manju. A, Assistant Professor, Department of CSE, Saveetha Engineering
More informationPrivacy and Accuracy Monitoring Of Spatial Queries Using Voronoi Neighbors Using Data Mining
Privacy and Accuracy Monitoring Of Spatial Queries Using Voronoi Neighbors Using Data Mining Athira.S.Kumar 1, Dr. S.V.M.G.Bavithiraja 2 PG Scholar, Department of CSE, Hindusthan Institute of Technology,
More informationSECURING DISTRIBUTED ACCOUNTABILITY FOR DATA SHARING IN CLOUD COMPUTING
SECURING DISTRIBUTED ACCOUNTABILITY FOR DATA SHARING IN CLOUD COMPUTING N. RAMESH 1, D. ANIL M.E 2, M. KIRAN 3 1, M.TECH Scholar, VEC, Kavali 2, Assistant Professor, VEC, Kavali 3, Assistant Professor,
More informationPRIVACY PROTECTION OF FREQUENTLY USED DATA SENSITIVE IN CLOUD SEVER
PRIVACY PROTECTION OF FREQUENTLY USED DATA SENSITIVE IN CLOUD SEVER T.Pavithra M.E Computer Science And Engineering S.A.Engineering College, Chennai-600077, Tamil Nadu. Mrs.G.Umarani Ph.D Professor & Head
More informationImplementation of Aggregate Function in Multi Dimension Privacy Preservation Algorithms for OLAP
324 Implementation of Aggregate Function in Multi Dimension Privacy Preservation Algorithms for OLAP Shivaji Yadav(131322) Assistant Professor, CSE Dept. CSE, IIMT College of Engineering, Greater Noida,
More informationHiding Sensitive Predictive Frequent Itemsets
Hiding Sensitive Predictive Frequent Itemsets Barış Yıldız and Belgin Ergenç Abstract In this work, we propose an itemset hiding algorithm with four versions that use different heuristics in selecting
More information