Research Paper | Computer Science & Engineering | India | Volume 3 Issue 10, October 2014
A Well-Organized Method for Protecting Sensitive Information
Priyanka Choubey, Savita Rathoad
Data mining services need correct input data for their results to be significant, but privacy concerns may power users to offer spurious information. To protect client privacy in the data mining process, a multiplicity of techniques based on random perturbation of data records have been proposed lately. One known fact which is very significant in data mining is discovering the association rules from database of transactions each transaction consists of set of objects. Two important terms support and confidence are linked with each of the association rule. Actually any rule is called as sensitive if its disclosure risk is above a certain privacy threshold. Sometimes we do not want to disclose sensitive rules to the public because of privacy customized definition of support and confidence so that it would hide any desired sensitive association regulation without any side effect. in reality the enhanced technique is by means of the same method (as previously used method) of receiving association rules but modified definitions of support and confidence are used.
Keywords: purposes There are many approaches to hide confident association rules which take the support and confidence as a base for algorithms and many more The proposed work has the basis of reduction of support and confidence of sensitive rules but this work is not restriction or disturbing the given database of transactions directlyThe proposed algorithm uses some Association rules Support, Confidence, Data mining, Data hiding, etc
Edition: Volume 3 Issue 10, October 2014
Pages: 1602 - 1605
How to Cite this Article?
Priyanka Choubey, Savita Rathoad, "A Well-Organized Method for Protecting Sensitive Information", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=2015166, Volume 3 Issue 10, October 2014, 1602 - 1605
112 PDF Views | 100 PDF Downloads
Similar Articles with Keyword 'Confidence'
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1389 - 1391Generalized Ranking for Product Aspects using Concept Hierarchies
K. Bharathi, T. Venkata Satya Vivek, G. Radha Krishna
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2531 - 2536The Survey Paper on Evaluating Data Reliability: An Evidential Answer with Application to a Web-Enabled Data Warehouse
Saloni Shah, Vina M. Lomte
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 1395 - 1399Improvement in Apriori Algorithm with New Parameters
Reeti Trikha, Jasmeet Singh
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2336 - 2339Online Payment System using BPCS Steganography and Visual Cryptography
S. R. Khonde, Dheeraj Agarwal, Shrinivas Deshmukh
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 2701 - 2704Review on Self Organized Trust Model for Distributed Systems
Suyog Ashokrao Nagare
Similar Articles with Keyword 'Data mining'
Research Paper, Computer Science & Engineering, India, Volume 10 Issue 2, February 2021
Pages: 1669 - 1672Random Forest Based Heart Disease Prediction
Adeen, Preeti Sondhi
Research Paper, Computer Science & Engineering, Kenya, Volume 7 Issue 5, May 2018
Pages: 1409 - 1411Students Performance Prediction Using FP-Tree Data Mining Techniques
Eliakim Ombati Akama
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1165 - 1168Privacy Preserving Closed Frequent Pattern Mining
Anju Vijayan
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1227 - 1231An Efficient Clustering Based High Utility Infrequent Weighted Item Set Mining Approach
Dr. N. Umadevi, A. Gokila Devi
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014
Pages: 1757 - 1758A Review of Privacy Clustered Mining of Association Rules in Distributed Databases
Vanita Babane, Shital K.Somawar
Similar Articles with Keyword 'Data hiding'
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1579 - 1582Data Hiding in H.264/AVC Video Encryption with XOR-ed User Information and Data in File Format
Neenu Shereef
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 1642 - 1643A Survey Paper on Various Encryption & Data Hiding Methods for Video Streams
Shrutika S. Giradkar, Antara Bhattacharya
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1130 - 1132Survey On: Reversible Data Hiding in Encrypted JPEG Images
N. B. Pokale, Sanjivani S. Koli
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 1537 - 1542A Survey on Steganography Techniques
Amruta B. Bhojane, Priti A. Kodake
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1175 - 1178Steganographic Method of Data Hiding using JPEG Images
Shabana Vathelil Subair, Fathima A Muhammadali
Similar Articles with Keyword 'etc'
Research Paper, Computer Science & Engineering, Bangladesh, Volume 5 Issue 6, June 2016
Pages: 1523 - 1527Multifunctional Remote Controlled Robot Using Android Application
T. A. Mithu, T. S. Reddy
Research Paper, Computer Science & Engineering, India, Volume 10 Issue 2, February 2021
Pages: 1673 - 1677Convolution Neural Network Based Image Recognition
Sofia Hamid, Mrigana Walia
Research Paper, Computer Science & Engineering, India, Volume 10 Issue 2, February 2021
Pages: 1682 - 1686Support Vector Machine Based MRI Brain Tumor Detection
Nazima Yousuf, Mrigana Walia
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2406 - 2408Optimizing the Ad-Hoc Applications in Vehicular Network: A Study
Sumeet Sekhon, Dinesh Kumar
Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020
Pages: 470 - 478Ensuring Video Integrity Using Watermark - Chaining by SVD and DWT
Aditya Tiwari, Ayush Pandey