ISSN : November2017
|
|
- Shawn Stone
- 5 years ago
- Views:
Transcription
1 ISSN : Vol.6,No.4 November2017
2 Int. J. Engg. Res. & Sci. & Tech Priya Rajput and Amit Thakur, 2017 Research Paper ISSN Vol. 6, No. 4, November IJERST. All Rights Reserved A SURVEY ON PRIVACY OF OUTSOURCED DATASET DIFFERENT TECHNIQUES AND REQUIREMENTS Priya Rajput 1 *, and Amit Thakur 2 *Corresponding Author: Priya Rajput pr77633@gmail.com Received on: 17th August, 2017 Accepted on: 2nd October, 2017 With the increase in the data mining algorithm knowledge extraction from the large data is getting easy. But at the same time this prompt new issue of Privacy of the information from the stored information at different servers. So it is required to give protection of the delicate information from the information mineworkers. This paper concentrate on different methodologies actualize by the mining workers for preserving of data at singular level, class level, and so on. A detail portrayal with restriction of various systems of privacy preserving is clarified. This paper clarify distinctive assessment parameters for the examination of the preserved dataset. Keywords: Privacy Preserving Mining, Association Rule Mining, Data Perturbation, Aggregation, Data Swapping INTRODUCTION Each association assemble actualities about their customers or clients for investigation or whatever other goal. Data being gathered might be sound, recordings, pictures and content and so on. Since security concerns identified with a conceivable abuse of learning found by methods for information mining systems have been raised (Hajian S and Domingo-Ferrer J 2012), many endeavors have been made to give protection safeguarding strategies to information mining (Jerry Chun-Wei Lin et al., 2016; Pedreschi D et al., 2009a; and Hajian S and Domingo-Ferrer J, 2012). In this way, another (sub)domain of information mining, protection safeguarding information mining, rose in the most recent decade. So as to give adequate security insurance in information mining, a few techniques for joining protection have been produced. Protection itself is not a simple term to characterize and can be safeguarded on various levels in various situations (Domingo-Ferrer J, 2012; and Pedreschi et al., 2008). Regardless of gigantic assorted variety in security parts of information mining, three principle methodologies can be recognized: heuristic-based, recreation based and cryptography-based (Pedreschi D et al., 2009). 1 M.Tech. Scholar, Swami Vivekanand College of Science and Technology, Bhopal MP, India. 2 Assistant Professor, Swami Vivekanand College of Science and Technology, Bhopal MP, India. 10
3 In the primary approach, the heuristic calculations are utilized to conceal information an association does not have any desire to uncover, for example, singular values in information are changed by a heuristic calculation to shroud touchy learning, for example, imperative standards on account of affiliation rules mining. The reproduction based approach is utilized to consolidate protection on an individual level by changing unique individual values (for example, clients answers) haphazardly by methods for a randomization-based strategy and uncovering just adjusted values. The distorted information and additional parameters of a randomization-based technique used to misshape them can be distributed or gone to an outsider. Knowing misshaped singular values and parameters of a randomization-based strategy, one can perform information mining assignments. To this end, f irst unique disseminations of estimations of qualities are recreated (evaluated) in light of the misshaped values and the parameters of the twisting strategy, and an information mining model is manufactured in view of the contorted information. The making of a model is completed without the need to get to unique individual information. One more approach, which depends on cryptography, utilizes secure multiparty calculations (SMC) to do information mining assignments in view of appropriated information, that is, information controlled by various associations that would prefer not to unveil their private info. Moreover, encryption procedures which empower one to perform calculations over encoded information without having the capacity to unscramble can be utilized as a part of protection saving. The heuristic approach is intended for concentrated information. The cryptography-based approach is utilized for the conveyed information, while the reproduction based approach can be connected to both dispersed and brought together information. Decisions do not front to discriminatory even if the original training data sets are biased. Three approaches are conceivable: A. Pre-processing B. In-processing C. Post-processing I. PRIVACY PRESERVING TECHNIQUES Data Swapping In this techniques is data maintains as a order basically data e evolve as a textual form, text data perturbation as a textual data form.textual data means addition new values and may not possible in all cases of textual datasets. so swapping technology is better option for the same In which most frequent values are observed and replace with the least or lesser frequent values so that original values or decision cannot be taken from the perturbed copy of the dataset. For some situation if the substitution of the single thing is improved the situation the most regular thing then location of that conceal procedure can be effectively brittle. So it is important to pick the thing from a set haphazardly to replace the incessant one. Suppression In a few informational collection have some data, that data is specifically distinguish by the people individual or individual class then those needs to expel from the informational collection. So sections or things are erase from the first informational collection,the is such sorts of touchy informational collection, Suppression is 11
4 utilized for ensuring for data,as Example: We have informational index contain a driving permit number, the just a single individual can perceptible and we can t include or erase in driving permit. as organization of that driving permit number is characterize. So such information is expelled from the first dataset. Noise Addition In this approach data set change as a change in a numeric value where amount is change is a sequence of random value, that value reflected as a original values but not in original data set order. In [5] noise is generate by a Gaussian function that create number as a sequence form then add there sequence in the original value. so a kind of variation is develop over here for the privacy of the original one. While data can add a single value but it can be detect easily or observed also if intruder will present in data set. There are different numeric category involving as : involving percentiles, sums, conditional means etc. Some noise addition techniques, Random Perturbation Technique, Probabilistic Perturbation Technique, etc. Data Perturbation In data Perturbation on data set is transformed in to perturbation and selecting random position data then add, subtraction the value into the original in order produce new value that is differ from the previous data. One is important information is here whatever you want add or subtraction delete from that value should not cross the limits of the original lets understand an age value is perturbed by adding or subtracting from original data but the resultant value or the perturbed value should not be less then 0 or greater then a normal life of 120. In order to perform perturbation some kinds of random value that by original value change randomly. There are generate two approaches. First is probability distribution approach and Second is Value distortion approach probability distribution approach :-The approach of probability distribution, In this approach data replace with another sample from the same (estimated) distribution or by the distribution itself. Value distortion approach:- The approach of Value distribution, perturbed the value of data and elements or directly by adding or multiplicative some noise before releasing of the data. II. Related Work This paper addresses (Pedreschi D et al., 2008) secure mining of affiliation manages over on a level plane outsourced information. The strategies join cryptographic systems to limit the data shared, while adding minimal overhead to the mining errand. Security concerns may keep the gatherings from straightforwardly sharing the information, and a few sorts of data about the information. That enable gatherings to pick their expected level of security are required, permitting productive arrangements that keep up the expected security. Tzung Pei et al displayed Evolutionary security safeguarding in information mining (Meij J, 2002). Accumulation of information, scattering and mining from huge datasets acquainted dangers with the security of the information. Some touchy or private data about the people and organizations or associations must be veiled before it is revealed to clients of information mining. A developmental security safeguarding information mining technique was proposed to observe about 12
5 what exchanges were to be escaped a database. In view of the reference and affectability of the people information in the database diverse weights were allocated to the characteristics of the people. The idea of pre huge thing sets was utilized to limit the cost of rescanning the whole database and accelerate the assessment procedure of chromosomes. The proposed approach (Meij J, 2002) was utilized to make a decent tradeoff between security protecting and running time of the inf ormation mining calculations. This researcher (Verykios V and Gkoulalas- Divanis A, 2008) presents a review of various affiliation govern digging systems for advertise crate investigation, featuring qualities of various affiliation run mining methods. And in addition testing issues should be tended to by an affiliation administer mining strategy. The consequences of this assessment will help leader for settling on imperative choices for affiliation examination. Y-H Wu et al. (Pedreschi D et al., 2009) proposed system to diminish the responses in sanitized database, which are conveyed by various techniques. They display a novel approach that intentionally modifies a few trades in the trade database to decrease the support or confidences of unstable rules without making the responses. Jerry Chun-Wei Lin et al., 2016 proposed in their paper, a novel efficient anonymization framework called PTA is not just anonymize valuebased information with a little data misfortune yet additionally to decrease the computational manysided quality of the anonymization procedure. The PTA framework comprises of three modules, which are the Pre-handling module, the TSP module, and the Anonymity show, to anonymize value-based information and ensures that at any rate k-secrecy is accomplished: a pre-preparing module, a voyaging sales representative issue module, and an anonymization module. A portrayal of security ensuring systems is shown and critical estimations in each class is considered. The advantages and terrible characteristics of different methodologies were raised (Hajian S et al., 2011a). The computations for disguising sensitive connection rules like assurance safeguarding rule mining using inherited figuring. Chung-Min Chen, present dithered B-tree, a B-tree record structure that can fill in as a building deter for recognizing beneficial system use in the zone of secure and private database outsourcing. The dithered tree insert computation can be moreover moved up to achieve only a solitary traversal from the root to the leaf, as opposed to two. The document structure from adapting paying little mind to whether the request term (i.e., key) is accessible in the database and check the data for secure and private database outsourcing. In Privacy Preserving Data Mining, data aggravation is a data security technique that incorporates clatter to databases to allow solitary record mystery. This strategy empowers customers to decide key once-over information about the data while keeping a security crack. Four inclination sorts have been proposed which assess the sufficiency of such a framework. In any case, these inclinations oversee essential aggregate thoughts (midpoints, et cetera.) found in the database. The researcher propose a fifth sort of slant that may be incorporated by aggravation techniques (Data mining Bias), and observationally test for its existence. In web business applications, affiliations are involved with 13
6 applying data mining approaches to manage databases to discover additional finding out about customers. The researcher thought in this paper is Privacy Preserving mining of ceaseless cases on mixed outsourced Transaction Database (TDB) (Pedreschi D et al., 2008). They proposed an encryption plot and incorporating counterfeit trade in the principal dataset. Their procedure proposed a framework for incremental affixss and dropping of old trade groups and disentangle dataset. They also explore the break probability for trades and illustrations. The Encryption/Decryption (E/D) module encodes the TDB once which is sent to the server. Mining is coordinated on and on at the server side and decoded each time by the E/D (Pedreschi D et al., 2008) module. As needs be, we need to differentiate the unscrambling time and the period of clearly executing from the prior completed the primary database. III. Evaluation Parameters There are two approaches to evaluate the discriminating algorithm developed which can specif y the quality of the work first is Discrimination Removal while second is data quality after the implementation of the algorithm. Normally balancing both is quit difficult as if data quality need to maintain then some of the rules will be unaffected and over all purpose will be not be solve while in case of maintaining discriminating rule less data (Sara Hajian and Josep Domingo-Ferrer, xxxx; and Pedreschi D et al., 2009a), dataset the quality will definite degrade as it need to either change or remove from the dataset. Sensitive Item Prevention Degree (SIPD): This measure quantifies the percentage of sensitive rules that are no longer discriminatory in the transformed dataset. Non Sensitive Item Protection Prevention Degree (NSIPP). This measure quantifies the percentage of the protective rules in the original dataset that remain protective in the transformed dataset. Since the above measures are used to evaluate the success of the proposed methods in direct and indirect discrimination prevention, ideally their value should be 100%. Data-Set Originality: As the privacy for the sensitive item is provide by hiding the sensitive item or replacing by other similar value but this lead to make dataset for perturbation. So work which maintain high data quality after prevention is better. Execution time: Work need time for the effective result but algorithm that generate results in very sort duration of time then much better. So execution time is another evaluation parameter for the same. Misses Cost (MC): This measure evaluates the rate of standards among those extractable from the first dataset that can t be extricated from the changed dataset (symptom of the change procedure). Ghost Cost (GC): This measure evaluates the rate of the principles among those extractable from the changed dataset that were not extractable from the first dataset (symptom of the change procedure). MC and GC ought to in a perfect world be 0%. Be that as it may, MC and GC may not be 0% as a reaction of the change procedure. CONCLUSION Mining data from the information is the essential prerequisite of the information mining out of which security safeguarding mining is opening new rising 14
7 field which provide save learning from the information. Paper focuses on different technique like anonymization, swapping, and so forth for privacy protection, where each has its own significance. Specialists works discover information in dataset by aprior and other mining calculation at that point apply privacy strategy on them. Concealing data at various level is likewise term as multi-level security which give just numeric information stowing away. While in few works both numeric and content information is stow away yet the time and space required for those calculation is similarly high. So a calculation is still need to produce for the decreased time and space multifaceted nature without trading off time and space. REFERENCES 1. Calders T and Verwer S (2010), Three Naive Bayes Approaches for Discriminationfree Classification, Data Mining and Knowledge Discovery, Vol. 21, No. 2, pp Clifton C (2003), Privacy Preserving Data Mining: How do we Mine Data When We Aren t Allowed to See it?, In Proc. of the ACM SIGKDD Int. Conf. on Knowledge Discovery and Data Mining (KDD 2003), Tutorial, Washington, DC (USA). 3. Hajian S and Domingo-Ferrer J (2012), A Methodology f or Direct and Indirect Discrimination Prevention in Data Mining, IEEE Transactions on Knowledge and Data Engineering, Vol. 25, No. 7, pp Hajian S, Domingo-Ferrer J and Martinez- Ballesté A (2011a), Discrimination Prevention in Data Mining for Intrusion and Crime Detection, Proc. of the IEEE Symposium on Computational Intelligence in Cyber Security (CICS 2011), pp , IEEE. 5. Meij J (2002) Dealing with the Data Flood; Mining Data, Text and Multimedia, The Hague: STT Netherlands Study Centre for Technology Trends. 6. Pedreschi D, Ruggieri S and Turini F (2008), Discrimination-aware Data Mining, Proc. of the 14th ACM International Conference on Knowledge Discovery and Data Mining (KDD 2008), pp , ACM. 7. Pedreschi D, Ruggieri S and Turini F (2008), Discrimination-Aware Data Mining, Proc. 14th Conf. KDD, pp , ACM. 8. Pedreschi D, Ruggieri S and Turini F (2009), Measuring Discrimination in Socially- Sensitive Decision Records, SDM 2009, pp , SIAM. 9. Pedreschi D, Ruggieri S and Turini F (2009a), Measuring Discrimination in Socially-Sensitive Decision Records, Proc. of the 9th SIAM Data Mining Conference (SDM 2009), pp , SIAM. 10. Sara Hajian and Josep Domingo-Ferrer A Methodology f or Direct and Indirect Discrimination Prevention in Data Mining, Ieee Transactions on Knowledge and Data Engineering, Vol. 25, No Verykios V and Gkoulalas-Divanis A (2008), A Survey of Association Rule Hiding Methods for Privacy, in C C Aggarwal and P S Yu (Eds.), Privacy- Preserving Data Mining: Models and Algorithms, Springer. 12. Jerry Chun-Wei Lin, Qiankun Liu, Philippe Fournier-Viger and Tzung-Pei Hong (2016), PTA: An Efficient System for Transaction Database Anonymization, IEEE Access, Vol. 4, pp
8
A Survey on: Privacy Preserving Mining Implementation Techniques
A Survey on: Privacy Preserving Mining Implementation Techniques Mukesh Kumar Dangi P.G. Scholar Computer Science & Engineering, Millennium Institute of Technology Bhopal E-mail-mukeshlncit1987@gmail.com
More informationA Survey on: Techniques of Privacy Preserving Mining Implementation
www.ijarcet.org 50 A Survey on: Techniques of Privacy Preserving Mining Implementation Priya Gupta, Sini Shibu Abstract With the increase in the data mining algorithm knowledge extraction from the large
More informationSurvey of Approaches for Discrimination Prevention in Data Mining
Survey of Approaches for Prevention in Data Mining Harshali M. Saindane #1, Mrs. V. L. Kolhe *2 # Department of Computer Engineering, D. Y. Patil College of Engineering, Akurdi, Pune, Savitribai Phule
More informationPRIVACY PRESERVING CONTENT BASED SEARCH OVER OUTSOURCED IMAGE DATA
PRIVACY PRESERVING CONTENT BASED SEARCH OVER OUTSOURCED IMAGE DATA Supriya Pentewad 1, Siddhivinayak Kulkarni 2 1 Department of Computer Engineering. MIT College of Engineering, Pune, India 2 Department
More informationPartition Based Perturbation for Privacy Preserving Distributed Data Mining
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 17, No 2 Sofia 2017 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.1515/cait-2017-0015 Partition Based Perturbation
More informationAccumulative Privacy Preserving Data Mining Using Gaussian Noise Data Perturbation at Multi Level Trust
Accumulative Privacy Preserving Data Mining Using Gaussian Noise Data Perturbation at Multi Level Trust G.Mareeswari 1, V.Anusuya 2 ME, Department of CSE, PSR Engineering College, Sivakasi, Tamilnadu,
More informationFREQUENT ITEMSET MINING USING PFP-GROWTH VIA SMART SPLITTING
FREQUENT ITEMSET MINING USING PFP-GROWTH VIA SMART SPLITTING Neha V. Sonparote, Professor Vijay B. More. Neha V. Sonparote, Dept. of computer Engineering, MET s Institute of Engineering Nashik, Maharashtra,
More informationReview on Techniques of Collaborative Tagging
Review on Techniques of Collaborative Tagging Ms. Benazeer S. Inamdar 1, Mrs. Gyankamal J. Chhajed 2 1 Student, M. E. Computer Engineering, VPCOE Baramati, Savitribai Phule Pune University, India benazeer.inamdar@gmail.com
More informationQuery Result Extraction Using Dynamic Query Forms
Query Result Extraction Using Dynamic Query Forms #1 Mrs. I. Anitha Rani, #2 Y.Vijay, #3 Abdul Moseen #1 Assistant Professor, Department of Computer Science Engineering,Andhra Loyola Institute Of Engineering
More informationAn Enhanced Approach for Privacy Preservation in Anti-Discrimination Techniques of Data Mining
An Enhanced Approach for Privacy Preservation in Anti-Discrimination Techniques of Data Mining Sreejith S., Sujitha S. Abstract Data mining is an important area for extracting useful information from large
More informationAn Approach for Privacy Preserving in Association Rule Mining Using Data Restriction
International Journal of Engineering Science Invention Volume 2 Issue 1 January. 2013 An Approach for Privacy Preserving in Association Rule Mining Using Data Restriction Janakiramaiah Bonam 1, Dr.RamaMohan
More informationSecure Sensitive Data
Secure Sensitive Data Praneet Mohanbala 1, Manisha Parida 2, Dr.Roopa R 3 U.G. Student, Department of Information Science &Engg, BMS College of Engineering, Bangalore, India 1 U.G. Student, Department
More informationA Review on Privacy Preserving Data Mining Approaches
A Review on Privacy Preserving Data Mining Approaches Anu Thomas Asst.Prof. Computer Science & Engineering Department DJMIT,Mogar,Anand Gujarat Technological University Anu.thomas@djmit.ac.in Jimesh Rana
More informationIMPROVED ALGORITHM FOR VISUAL CRYPTOGRAPHY USING REGION INCREMENTATION
Int. J. Engg. Res. & Sci. & Tech. 24 Priyanka Agrawal and Vijay Kumar Sharma, 24 Research Paper ISSN 239-599 www.ijerst.com Vol. 3, No. 4, November 24 24 IJERST. All Rights Reserved IMPROVED ALGORITHM
More informationRaunak Rathi 1, Prof. A.V.Deorankar 2 1,2 Department of Computer Science and Engineering, Government College of Engineering Amravati
Analytical Representation on Secure Mining in Horizontally Distributed Database Raunak Rathi 1, Prof. A.V.Deorankar 2 1,2 Department of Computer Science and Engineering, Government College of Engineering
More informationAn Algorithm for user Identification for Web Usage Mining
An Algorithm for user Identification for Web Usage Mining Jayanti Mehra 1, R S Thakur 2 1,2 Department of Master of Computer Application, Maulana Azad National Institute of Technology, Bhopal, MP, India
More informationA FUZZY BASED APPROACH FOR PRIVACY PRESERVING CLUSTERING
A FUZZY BASED APPROACH FOR PRIVACY PRESERVING CLUSTERING 1 B.KARTHIKEYAN, 2 G.MANIKANDAN, 3 V.VAITHIYANATHAN 1 Assistant Professor, School of Computing, SASTRA University, TamilNadu, India. 2 Assistant
More informationMining User - Aware Rare Sequential Topic Pattern in Document Streams
Mining User - Aware Rare Sequential Topic Pattern in Document Streams A.Mary Assistant Professor, Department of Computer Science And Engineering Alpha College Of Engineering, Thirumazhisai, Tamil Nadu,
More informationSurvey Result on Privacy Preserving Techniques in Data Publishing
Survey Result on Privacy Preserving Techniques in Data Publishing S.Deebika PG Student, Computer Science and Engineering, Vivekananda College of Engineering for Women, Namakkal India A.Sathyapriya Assistant
More information. (1) N. supp T (A) = If supp T (A) S min, then A is a frequent itemset in T, where S min is a user-defined parameter called minimum support [3].
An Improved Approach to High Level Privacy Preserving Itemset Mining Rajesh Kumar Boora Ruchi Shukla $ A. K. Misra Computer Science and Engineering Department Motilal Nehru National Institute of Technology,
More informationEFFICIENT FILTERING OF DUPLICATE DATA WITH INCREASED PRIVACY AND MINING PRINCIPLES
Volume 118 No. 19 2018, 3011-3020 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu EFFICIENT FILTERING OF DUPLICATE DATA WITH INCREASED PRIVACY AND
More informationComparison of Online Record Linkage Techniques
International Research Journal of Engineering and Technology (IRJET) e-issn: 2395-0056 Volume: 02 Issue: 09 Dec-2015 p-issn: 2395-0072 www.irjet.net Comparison of Online Record Linkage Techniques Ms. SRUTHI.
More informationDistributed Data Anonymization with Hiding Sensitive Node Labels
Distributed Data Anonymization with Hiding Sensitive Node Labels C.EMELDA Research Scholar, PG and Research Department of Computer Science, Nehru Memorial College, Putthanampatti, Bharathidasan University,Trichy
More informationReconstruction-based Classification Rule Hiding through Controlled Data Modification
Reconstruction-based Classification Rule Hiding through Controlled Data Modification Aliki Katsarou, Aris Gkoulalas-Divanis, and Vassilios S. Verykios Abstract In this paper, we propose a reconstruction
More informationMethod to Study and Analyze Fraud Ranking In Mobile Apps
Method to Study and Analyze Fraud Ranking In Mobile Apps Ms. Priyanka R. Patil M.Tech student Marri Laxman Reddy Institute of Technology & Management Hyderabad. Abstract: Ranking fraud in the mobile App
More informationUSING FREQUENT PATTERN MINING ALGORITHMS IN TEXT ANALYSIS
INFORMATION SYSTEMS IN MANAGEMENT Information Systems in Management (2017) Vol. 6 (3) 213 222 USING FREQUENT PATTERN MINING ALGORITHMS IN TEXT ANALYSIS PIOTR OŻDŻYŃSKI, DANUTA ZAKRZEWSKA Institute of Information
More informationRotation Perturbation Technique for Privacy Preserving in Data Stream Mining
218 IJSRSET Volume 4 Issue 8 Print ISSN: 2395-199 Online ISSN : 2394-499 Themed Section : Engineering and Technology Rotation Perturbation Technique for Privacy Preserving in Data Stream Mining Kalyani
More informationTemporal Weighted Association Rule Mining for Classification
Temporal Weighted Association Rule Mining for Classification Purushottam Sharma and Kanak Saxena Abstract There are so many important techniques towards finding the association rules. But, when we consider
More informationPrivacy-Preserving. Introduction to. Data Publishing. Concepts and Techniques. Benjamin C. M. Fung, Ke Wang, Chapman & Hall/CRC. S.
Chapman & Hall/CRC Data Mining and Knowledge Discovery Series Introduction to Privacy-Preserving Data Publishing Concepts and Techniques Benjamin C M Fung, Ke Wang, Ada Wai-Chee Fu, and Philip S Yu CRC
More informationInternational Journal of Advance Engineering and Research Development
Scientific Journal of Impact Factor (SJIF): 4.14 International Journal of Advance Engineering and Research Development Volume 3, Issue 3, March -2016 e-issn (O): 2348-4470 p-issn (P): 2348-6406 Identify
More informationA Procedural Based Encryption Technique for Accessing Data on Cloud
A Procedural Based Encryption Technique for Accessing Data on Cloud Avinash N 1, Divya C 2 P.G. Student, Department of Computer Science and Engineering, SVIT, Bangalore, Karnataka, India 1 Assistant Professor,
More informationAn Emphasized Apriori Algorithm for Huge Sequence of Datasets
An Emphasized Apriori Algorithm for Huge Sequence of Datasets Ravi Kumar.V Associate Professor, Department of IT, TKRCET. Abstract: In this paper, an Emphasized Apriori algorithm is proposed based on the
More informationKeyword: Frequent Itemsets, Highly Sensitive Rule, Sensitivity, Association rule, Sanitization, Performance Parameters.
Volume 4, Issue 2, February 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Privacy Preservation
More informationHiding Sensitive Predictive Frequent Itemsets
Hiding Sensitive Predictive Frequent Itemsets Barış Yıldız and Belgin Ergenç Abstract In this work, we propose an itemset hiding algorithm with four versions that use different heuristics in selecting
More informationPrivacy Preserving Mining Techniques and Precaution for Data Perturbation
Privacy Preserving Mining Techniques and Precaution for Data Perturbation J.P. Maurya 1, Sandeep Kumar 2, Sushanki Nikhade 3 1 Asst.Prof. C.S Dept., IES BHOPAL 2 Mtech Scholar, IES BHOPAL 1 jpeemaurya@gmail.com,
More informationIDENTITY DISCLOSURE PROTECTION IN DYNAMIC NETWORKS USING K W STRUCTURAL DIVERSITY ANONYMITY
IDENTITY DISCLOSURE PROTECTION IN DYNAMIC NETWORKS USING K W STRUCTURAL DIVERSITY ANONYMITY Gowthamy.R 1* and Uma.P 2 *1 M.E.Scholar, Department of Computer Science & Engineering Nandha Engineering College,
More informationINFREQUENT WEIGHTED ITEM SET MINING USING FREQUENT PATTERN GROWTH R. Lakshmi Prasanna* 1, Dr. G.V.S.N.R.V. Prasad 2
ISSN 2277-2685 IJESR/Nov. 2015/ Vol-5/Issue-11/1434-1439 R. Lakshmi Prasanna et. al.,/ International Journal of Engineering & Science Research INFREQUENT WEIGHTED ITEM SET MINING USING FREQUENT PATTERN
More informationComparative Study of CPU Scheduling Algorithms based on Markov Chain
Comparative Study of CPU Scheduling Algorithms based on Pradeep K. Jatav, Research Scholar, Faculty of Computer Science, Pacific Academy of Higher Education and Research University, Udaipur, INDIA Rahul
More informationImplementation of Privacy Mechanism using Curve Fitting Method for Data Publishing in Health Care Domain
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 5, May 2014, pg.1105
More informationSecure Frequent Itemset Hiding Techniques in Data Mining
Secure Frequent Itemset Hiding Techniques in Data Mining Arpit Agrawal 1 Asst. Professor Department of Computer Engineering Institute of Engineering & Technology Devi Ahilya University M.P., India Jitendra
More informationKnowledge discovery from XML Database
Knowledge discovery from XML Database Pravin P. Chothe 1 Prof. S. V. Patil 2 Prof.S. H. Dinde 3 PG Scholar, ADCET, Professor, ADCET Ashta, Professor, SGI, Atigre, Maharashtra, India Maharashtra, India
More informationSanitization Techniques against Personal Information Inference Attack on Social Network
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 12, December 2014,
More informationDistributed Bottom up Approach for Data Anonymization using MapReduce framework on Cloud
Distributed Bottom up Approach for Data Anonymization using MapReduce framework on Cloud R. H. Jadhav 1 P.E.S college of Engineering, Aurangabad, Maharashtra, India 1 rjadhav377@gmail.com ABSTRACT: Many
More informationADDITIVE GAUSSIAN NOISE BASED DATA PERTURBATION IN MULTI-LEVEL TRUST PRIVACY PRESERVING DATA MINING
ADDITIVE GAUSSIAN NOISE BASED DATA PERTURBATION IN MULTI-LEVEL TRUST PRIVACY PRESERVING DATA MINING R.Kalaivani #1,S.Chidambaram #2 # Department of Information Techology, National Engineering College,
More informationAgglomerative clustering on vertically partitioned data
Agglomerative clustering on vertically partitioned data R.Senkamalavalli Research Scholar, Department of Computer Science and Engg., SCSVMV University, Enathur, Kanchipuram 631 561 sengu_cool@yahoo.com
More informationTo Enhance Projection Scalability of Item Transactions by Parallel and Partition Projection using Dynamic Data Set
To Enhance Scalability of Item Transactions by Parallel and Partition using Dynamic Data Set Priyanka Soni, Research Scholar (CSE), MTRI, Bhopal, priyanka.soni379@gmail.com Dhirendra Kumar Jha, MTRI, Bhopal,
More informationInternational Journal of Modern Engineering and Research Technology
Volume 2, Issue 4, October 2015 ISSN: 2348-8565 (Online) International Journal of Modern Engineering and Research Technology Website: http://www.ijmert.org Privacy Preservation in Data Mining Using Mixed
More informationPPKM: Preserving Privacy in Knowledge Management
PPKM: Preserving Privacy in Knowledge Management N. Maheswari (Corresponding Author) P.G. Department of Computer Science Kongu Arts and Science College, Erode-638-107, Tamil Nadu, India E-mail: mahii_14@yahoo.com
More informationR. R. Badre Associate Professor Department of Computer Engineering MIT Academy of Engineering, Pune, Maharashtra, India
Volume 7, Issue 4, April 2017 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Web Service Ranking
More informationSCENARIO BASED ADAPTIVE PREPROCESSING FOR STREAM DATA USING SVM CLASSIFIER
SCENARIO BASED ADAPTIVE PREPROCESSING FOR STREAM DATA USING SVM CLASSIFIER P.Radhabai Mrs.M.Priya Packialatha Dr.G.Geetha PG Student Assistant Professor Professor Dept of Computer Science and Engg Dept
More informationINFORMATION SECURITY AND PRIVACY IN CLOUD USING HYBRID CRYPTOGRAPHIC ALGORITHM
INFORMATION SECURITY AND PRIVACY IN CLOUD USING HYBRID CRYPTOGRAPHIC ALGORITHM PRIYA K Assistant Professor, Information Science and Engineering, MVJ College Of Engineering, Bangalore, India Abstract From
More informationDiscovery of Multi-level Association Rules from Primitive Level Frequent Patterns Tree
Discovery of Multi-level Association Rules from Primitive Level Frequent Patterns Tree Virendra Kumar Shrivastava 1, Parveen Kumar 2, K. R. Pardasani 3 1 Department of Computer Science & Engineering, Singhania
More informationMining Frequent Itemsets for data streams over Weighted Sliding Windows
Mining Frequent Itemsets for data streams over Weighted Sliding Windows Pauray S.M. Tsai Yao-Ming Chen Department of Computer Science and Information Engineering Minghsin University of Science and Technology
More informationAdvanced Searchable Encryption Scheme for Secure Data Sharing in Cloud
Advanced Searchable Encryption Scheme for Secure Data Sharing in Cloud Anusha K 1, Babitha M N 2 PG Student, Department of Computer Science & Engineering, SSIT, Tumakuru, Karnataka, India 1 Assistant Professor,
More informationDecentralized Anonymous Authentication of Data Stored in Clouds Praveen.N, Krishna Kumar.P.R, Vinitha V Yadav
Decentralized Anonymous Authentication of Data Stored in Clouds Praveen.N, Krishna Kumar.P.R, Vinitha V Yadav Abstract: Distributed computing is area that permits clients to store the information. Distributed
More informationINFREQUENT WEIGHTED ITEM SET MINING USING NODE SET BASED ALGORITHM
INFREQUENT WEIGHTED ITEM SET MINING USING NODE SET BASED ALGORITHM G.Amlu #1 S.Chandralekha #2 and PraveenKumar *1 # B.Tech, Information Technology, Anand Institute of Higher Technology, Chennai, India
More informationAN IMPROVISED FREQUENT PATTERN TREE BASED ASSOCIATION RULE MINING TECHNIQUE WITH MINING FREQUENT ITEM SETS ALGORITHM AND A MODIFIED HEADER TABLE
AN IMPROVISED FREQUENT PATTERN TREE BASED ASSOCIATION RULE MINING TECHNIQUE WITH MINING FREQUENT ITEM SETS ALGORITHM AND A MODIFIED HEADER TABLE Vandit Agarwal 1, Mandhani Kushal 2 and Preetham Kumar 3
More informationPrivacy Preserving through Data Perturbation using Random Rotation Based Technique in Data Mining
Privacy Preserving through Data Perturbation using Random Rotation Based Technique in Data Mining Mr. Swapnil Kadam, Prof. Navnath Pokale Abstract Data perturbation technique is, a widely employed and
More informationPrivacy and Security Ensured Rule Mining under Partitioned Databases
www.ijiarec.com ISSN:2348-2079 Volume-5 Issue-1 International Journal of Intellectual Advancements and Research in Engineering Computations Privacy and Security Ensured Rule Mining under Partitioned Databases
More informationSEQUENTIAL PATTERN MINING FROM WEB LOG DATA
SEQUENTIAL PATTERN MINING FROM WEB LOG DATA Rajashree Shettar 1 1 Associate Professor, Department of Computer Science, R. V College of Engineering, Karnataka, India, rajashreeshettar@rvce.edu.in Abstract
More informationIEEE 2013 JAVA PROJECTS Contact No: KNOWLEDGE AND DATA ENGINEERING
IEEE 2013 JAVA PROJECTS www.chennaisunday.com Contact No: 9566137117 KNOWLEDGE AND DATA ENGINEERING (DATA MINING) 1. A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data
More informationRECORD DEDUPLICATION USING GENETIC PROGRAMMING APPROACH
Int. J. Engg. Res. & Sci. & Tech. 2013 V Karthika et al., 2013 Research Paper ISSN 2319-5991 www.ijerst.com Vol. 2, No. 2, May 2013 2013 IJERST. All Rights Reserved RECORD DEDUPLICATION USING GENETIC PROGRAMMING
More informationDENSITY BASED AND PARTITION BASED CLUSTERING OF UNCERTAIN DATA BASED ON KL-DIVERGENCE SIMILARITY MEASURE
DENSITY BASED AND PARTITION BASED CLUSTERING OF UNCERTAIN DATA BASED ON KL-DIVERGENCE SIMILARITY MEASURE Sinu T S 1, Mr.Joseph George 1,2 Computer Science and Engineering, Adi Shankara Institute of Engineering
More informationMining of Web Server Logs using Extended Apriori Algorithm
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Journal of Emerging Technologies in Computational
More informationExploration Encryption Mechanism Using Single Key for Public Cloud Storage
International Journal of Emerging Trends in Science and Technology Impact Factor: 2.838 DOI: http://dx.doi.org/10.18535/ijetst/v3i05.07 Exploration Encryption Mechanism Using Single Key for Public Cloud
More informationThe Applicability of the Perturbation Model-based Privacy Preserving Data Mining for Real-world Data
The Applicability of the Perturbation Model-based Privacy Preserving Data Mining for Real-world Data Li Liu, Murat Kantarcioglu and Bhavani Thuraisingham Computer Science Department University of Texas
More informationImplementation of Data Clustering With Meta Information Using Improved K-Means Algorithm Based On COATES Approach
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 3 March 2015, Page No. 10647-10651 Implementation of Clustering With Meta Information Using Improved
More informationUNCOVERING OF ANONYMOUS ATTACKS BY DISCOVERING VALID PATTERNS OF NETWORK
UNCOVERING OF ANONYMOUS ATTACKS BY DISCOVERING VALID PATTERNS OF NETWORK Dr G.Charles Babu Professor MRE College Secunderabad, India. charlesbabu26@gmail.com N.Chennakesavulu Assoc.Professor Wesley PG
More informationDouble Threshold Based Load Balancing Approach by Using VM Migration for the Cloud Computing Environment
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 1 January 2015, Page No. 9966-9970 Double Threshold Based Load Balancing Approach by Using VM Migration
More informationFinding the boundaries of attributes domains of quantitative association rules using abstraction- A Dynamic Approach
7th WSEAS International Conference on APPLIED COMPUTER SCIENCE, Venice, Italy, November 21-23, 2007 52 Finding the boundaries of attributes domains of quantitative association rules using abstraction-
More informationAutomated Information Retrieval System Using Correlation Based Multi- Document Summarization Method
Automated Information Retrieval System Using Correlation Based Multi- Document Summarization Method Dr.K.P.Kaliyamurthie HOD, Department of CSE, Bharath University, Tamilnadu, India ABSTRACT: Automated
More informationText Data Compression and Decompression Using Modified Deflate Algorithm
Text Data Compression and Decompression Using Modified Deflate Algorithm R. Karthik, V. Ramesh, M. Siva B.E. Department of Computer Science and Engineering, SBM COLLEGE OF ENGINEERING AND TECHNOLOGY, Dindigul-624005.
More informationComparison and Analysis of Anonymization Techniques for Preserving Privacy in Big Data
Advances in Computational Sciences and Technology ISSN 0973-6107 Volume 10, Number 2 (2017) pp. 247-253 Research India Publications http://www.ripublication.com Comparison and Analysis of Anonymization
More informationCERIAS Tech Report
CERIAS Tech Report 25-96 A FRAMEWORK FOR EVALUATING PRIVACY PRESERVING DATA MINING ALGORITHMS by ELISA BERTINO, IGOR NAI FOVINO, LOREDANA PARASILITI PROVENZA Center for Education and Research in Information
More informationInternational Journal of Modern Trends in Engineering and Research e-issn No.: , Date: 2-4 July, 2015
International Journal of Modern Trends in Engineering and Research www.ijmter.com e-issn No.:2349-9745, Date: 2-4 July, 2015 Privacy Preservation Data Mining Using GSlicing Approach Mr. Ghanshyam P. Dhomse
More informationAn Architecture for Privacy-preserving Mining of Client Information
An Architecture for Privacy-preserving Mining of Client Information Murat Kantarcioglu Jaideep Vaidya Department of Computer Sciences Purdue University 1398 Computer Sciences Building West Lafayette, IN
More informationEvaluating the Classification Accuracy of Data Mining Algorithms for Anonymized Data
International Journal of Computer Science and Telecommunications [Volume 3, Issue 8, August 2012] 63 ISSN 2047-3338 Evaluating the Classification Accuracy of Data Mining Algorithms for Anonymized Data
More informationVerifying Result Correctness of Outsourced Frequent Item set Mining using Rob Frugal Algorithm
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 5.258 IJCSMC,
More informationAdaption of Fast Modified Frequent Pattern Growth approach for frequent item sets mining in Telecommunication Industry
American Journal of Engineering Research (AJER) e-issn: 2320-0847 p-issn : 2320-0936 Volume-4, Issue-12, pp-126-133 www.ajer.org Research Paper Open Access Adaption of Fast Modified Frequent Pattern Growth
More informationPRIVACY PRESERVING IN DISTRIBUTED DATABASE USING DATA ENCRYPTION STANDARD (DES)
PRIVACY PRESERVING IN DISTRIBUTED DATABASE USING DATA ENCRYPTION STANDARD (DES) Jyotirmayee Rautaray 1, Raghvendra Kumar 2 School of Computer Engineering, KIIT University, Odisha, India 1 School of Computer
More informationEmerging Measures in Preserving Privacy for Publishing The Data
Emerging Measures in Preserving Privacy for Publishing The Data K.SIVARAMAN 1 Assistant Professor, Dept. of Computer Science, BIST, Bharath University, Chennai -600073 1 ABSTRACT: The information in the
More informationDISCLOSURE PROTECTION OF SENSITIVE ATTRIBUTES IN COLLABORATIVE DATA MINING V. Uma Rani *1, Dr. M. Sreenivasa Rao *2, V. Theresa Vinayasheela *3
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 5 May, 2014 Page No. 5594-5599 DISCLOSURE PROTECTION OF SENSITIVE ATTRIBUTES IN COLLABORATIVE DATA MINING
More informationENHANCE THE SENSITIVE HIDING RULES VIA NOVEL APPROACH
ENHANCE THE SENSITIVE HIDING RULES VIA NOVEL APPROACH Mr. A. Karthikeyan Ms. M. S. Vinmathi Mr. M. Mahendran Assistant Professor, Computer Science and Engineering, Panimalar Engineering College, Chennai,
More informationImproved K-Means Algorithm Based on COATES Approach. Yeola, Maharashtra, India. Yeola, Maharashtra, India.
Improved K-Means Algorithm Based on COATES Approach Mr.Nikhil Patankar 1, Prof.Prakash Rokade 2 1 Department of Computer Engineering, SND College of Engineering & Research Center, Yeola, Maharashtra, India
More informationImproved Frequent Pattern Mining Algorithm with Indexing
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 16, Issue 6, Ver. VII (Nov Dec. 2014), PP 73-78 Improved Frequent Pattern Mining Algorithm with Indexing Prof.
More informationPrivacy Preserving On Continuous and Discrete Data Sets- A Novel Approach
Privacy Preserving On Continuous and Discrete Data Sets- A Novel Approach Sathya Rangasamy, 1 P.Suvithavani 2 1 M.E Computer Science and Engineering, Sri Shakthi Institute of Engineering and Technology,
More informationAnalysis of Dendrogram Tree for Identifying and Visualizing Trends in Multi-attribute Transactional Data
Analysis of Dendrogram Tree for Identifying and Visualizing Trends in Multi-attribute Transactional Data D.Radha Rani 1, A.Vini Bharati 2, P.Lakshmi Durga Madhuri 3, M.Phaneendra Babu 4, A.Sravani 5 Department
More informationA Novel Texture Classification Procedure by using Association Rules
ITB J. ICT Vol. 2, No. 2, 2008, 03-4 03 A Novel Texture Classification Procedure by using Association Rules L. Jaba Sheela & V.Shanthi 2 Panimalar Engineering College, Chennai. 2 St.Joseph s Engineering
More informationHierarchical Disk Driven Scheduling for Mixed Workloads
Hierarchical Disk Driven Scheduling for Mixed Workloads Gwendolyn Einfeld gwen@soe.ucsc.edu Computer Science Department University of California, Santa Cruz Santa Cruz, CA 9564 Abstract Disk schedulers
More informationResearch Paper SECURED UTILITY ENHANCEMENT IN MINING USING GENETIC ALGORITHM
Research Paper SECURED UTILITY ENHANCEMENT IN MINING USING GENETIC ALGORITHM 1 Dr.G.Kirubhakar and 2 Dr.C.Venkatesh Address for Correspondence 1 Department of Computer Science and Engineering, Surya Engineering
More informationSecure Multiparty Computation Multi-round protocols
Secure Multiparty Computation Multi-round protocols Li Xiong CS573 Data Privacy and Security Secure multiparty computation General circuit based secure multiparty computation methods Specialized secure
More informationClassifying Twitter Data in Multiple Classes Based On Sentiment Class Labels
Classifying Twitter Data in Multiple Classes Based On Sentiment Class Labels Richa Jain 1, Namrata Sharma 2 1M.Tech Scholar, Department of CSE, Sushila Devi Bansal College of Engineering, Indore (M.P.),
More informationKnow Your Critical Verbs to Achieve Success!
Know Your Critical Verbs to Achieve Success! Puzzle Introduction: (Will connect with last slide) Explain Definition: tell about something so people understand Synonyms: clarify, demonstrate, describe in
More informationFraud Detection of Mobile Apps
Fraud Detection of Mobile Apps Urmila Aware*, Prof. Amruta Deshmuk** *(Student, Dept of Computer Engineering, Flora Institute Of Technology Pune, Maharashtra, India **( Assistant Professor, Dept of Computer
More informationPreprocessing of Stream Data using Attribute Selection based on Survival of the Fittest
Preprocessing of Stream Data using Attribute Selection based on Survival of the Fittest Bhakti V. Gavali 1, Prof. Vivekanand Reddy 2 1 Department of Computer Science and Engineering, Visvesvaraya Technological
More informationA NOVEL SECURED BOOLEAN BASED SECRET IMAGE SHARING SCHEME
VOL 13, NO 13, JULY 2018 ISSN 1819-6608 2006-2018 Asian Research Publishing Network (ARPN) All rights reserved wwwarpnjournalscom A NOVEL SECURED BOOLEAN BASED SECRET IMAGE SHARING SCHEME Javvaji V K Ratnam
More informationPrivacy Preserving Naïve Bayes Classifier for Horizontally Distribution Scenario Using Un-trusted Third Party
IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661, ISBN: 2278-8727, Volume 7, Issue 6 (Nov. - Dec. 2012), PP 04-12 Privacy Preserving Naïve Bayes Classifier for Horizontally Distribution Scenario
More informationTWO PARTY HIERARICHAL CLUSTERING OVER HORIZONTALLY PARTITIONED DATA SET
TWO PARTY HIERARICHAL CLUSTERING OVER HORIZONTALLY PARTITIONED DATA SET Priya Kumari 1 and Seema Maitrey 2 1 M.Tech (CSE) Student KIET Group of Institution, Ghaziabad, U.P, 2 Assistant Professor KIET Group
More informationProtected and Effective Transmission of Data in Peer-To-Peer Network Using SGA
Protected and Effective Transmission of Data in Peer-To-Peer Network Using SGA Sushma T Shanbhogue 1, Poonguzhali E 2 P.G. Student, Department of Computer Engineering, AMC Engineering College, Bangalore,
More informationImproving Privacy And Data Utility For High- Dimensional Data By Using Anonymization Technique
Improving Privacy And Data Utility For High- Dimensional Data By Using Anonymization Technique P.Nithya 1, V.Karpagam 2 PG Scholar, Department of Software Engineering, Sri Ramakrishna Engineering College,
More information