International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Since Year 2012 | Open Access | Double Blind Reviewed

ISSN: 2319-7064




Downloads: 113

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 10, October 2014


A Well-Organized Method for Protecting Sensitive Information

Priyanka Choubey | Savita Rathoad


Abstract: Data mining services need correct input data for their results to be significant, but privacy concerns may power users to offer spurious information. To protect client privacy in the data mining process, a multiplicity of techniques based on random perturbation of data records have been proposed lately. One known fact which is very significant in data mining is discovering the association rules from database of transactions each transaction consists of set of objects. Two important terms support and confidence are linked with each of the association rule. Actually any rule is called as sensitive if its disclosure risk is above a certain privacy threshold. Sometimes we do not want to disclose sensitive rules to the public because of privacy customized definition of support and confidence so that it would hide any desired sensitive association regulation without any side effect. in reality the enhanced technique is by means of the same method (as previously used method) of receiving association rules but modified definitions of support and confidence are used.


Keywords: purposes There are many approaches to hide confident association rules which take the support and confidence as a base for algorithms and many more The proposed work has the basis of reduction of support and confidence of sensitive rules but this work is not restriction or disturbing the given database of transactions directlyThe proposed algorithm uses some Association rules Support, Confidence, Data mining, Data hiding, etc


Edition: Volume 3 Issue 10, October 2014,


Pages: 1602 - 1605


How to Cite this Article?

Priyanka Choubey, Savita Rathoad, "A Well-Organized Method for Protecting Sensitive Information", International Journal of Science and Research (IJSR), Volume 3 Issue 10, October 2014, pp. 1602-1605, https://www.ijsr.net/get_abstract.php?paper_id=2015166

How to Share this Article?






Similar Articles with Keyword 'Confidence'

Downloads: 104

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1389 - 1391

Generalized Ranking for Product Aspects using Concept Hierarchies

K. Bharathi | T. Venkata Satya Vivek | G. Radha Krishna

Share this Article

Downloads: 104

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 2334 - 2339

A Novel Way for Mining Frequent and Interesting Patterns using Genetic Algorithm

Reshu Tyagi | Muskaan Batra

Share this Article


Top