A Well-Organized Method for Protecting Sensitive Information
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 10, October 2014

A Well-Organized Method for Protecting Sensitive Information

Priyanka Choubey, Savita Rathoad

Data mining services need correct input data for their results to be significant, but privacy concerns may power users to offer spurious information. To protect client privacy in the data mining process, a multiplicity of techniques based on random perturbation of data records have been proposed lately. One known fact which is very significant in data mining is discovering the association rules from database of transactions each transaction consists of set of objects. Two important terms support and confidence are linked with each of the association rule. Actually any rule is called as sensitive if its disclosure risk is above a certain privacy threshold. Sometimes we do not want to disclose sensitive rules to the public because of privacy customized definition of support and confidence so that it would hide any desired sensitive association regulation without any side effect. in reality the enhanced technique is by means of the same method (as previously used method) of receiving association rules but modified definitions of support and confidence are used.

Keywords: purposes There are many approaches to hide confident association rules which take the support and confidence as a base for algorithms and many more The proposed work has the basis of reduction of support and confidence of sensitive rules but this work is not restriction or disturbing the given database of transactions directlyThe proposed algorithm uses some Association rules Support, Confidence, Data mining, Data hiding, etc

Edition: Volume 3 Issue 10, October 2014

Pages: 1602 - 1605

Share this Article

How to Cite this Article?

Priyanka Choubey, Savita Rathoad, "A Well-Organized Method for Protecting Sensitive Information", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=2015166, Volume 3 Issue 10, October 2014, 1602 - 1605

112 PDF Views | 100 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Confidence'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1389 - 1391

Generalized Ranking for Product Aspects using Concept Hierarchies

K. Bharathi, T. Venkata Satya Vivek, G. Radha Krishna

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2531 - 2536

The Survey Paper on Evaluating Data Reliability: An Evidential Answer with Application to a Web-Enabled Data Warehouse

Saloni Shah, Vina M. Lomte

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1395 - 1399

Improvement in Apriori Algorithm with New Parameters

Reeti Trikha, Jasmeet Singh

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2336 - 2339

Online Payment System using BPCS Steganography and Visual Cryptography

S. R. Khonde, Dheeraj Agarwal, Shrinivas Deshmukh

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2701 - 2704

Review on Self Organized Trust Model for Distributed Systems

Suyog Ashokrao Nagare

Share this Article

Similar Articles with Keyword 'Data mining'

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 2, February 2021

Pages: 1669 - 1672

Random Forest Based Heart Disease Prediction

Adeen, Preeti Sondhi

Share this Article

Research Paper, Computer Science & Engineering, Kenya, Volume 7 Issue 5, May 2018

Pages: 1409 - 1411

Students Performance Prediction Using FP-Tree Data Mining Techniques

Eliakim Ombati Akama

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1165 - 1168

Privacy Preserving Closed Frequent Pattern Mining

Anju Vijayan

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1227 - 1231

An Efficient Clustering Based High Utility Infrequent Weighted Item Set Mining Approach

Dr. N. Umadevi, A. Gokila Devi

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1757 - 1758

A Review of Privacy Clustered Mining of Association Rules in Distributed Databases

Vanita Babane, Shital K.Somawar

Share this Article

Similar Articles with Keyword 'Data hiding'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1579 - 1582

Data Hiding in H.264/AVC Video Encryption with XOR-ed User Information and Data in File Format

Neenu Shereef

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1642 - 1643

A Survey Paper on Various Encryption & Data Hiding Methods for Video Streams

Shrutika S. Giradkar, Antara Bhattacharya

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1130 - 1132

Survey On: Reversible Data Hiding in Encrypted JPEG Images

N. B. Pokale, Sanjivani S. Koli

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1537 - 1542

A Survey on Steganography Techniques

Amruta B. Bhojane, Priti A. Kodake

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1175 - 1178

Steganographic Method of Data Hiding using JPEG Images

Shabana Vathelil Subair, Fathima A Muhammadali

Share this Article

Similar Articles with Keyword 'etc'

Research Paper, Computer Science & Engineering, Bangladesh, Volume 5 Issue 6, June 2016

Pages: 1523 - 1527

Multifunctional Remote Controlled Robot Using Android Application

T. A. Mithu, T. S. Reddy

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 2, February 2021

Pages: 1673 - 1677

Convolution Neural Network Based Image Recognition

Sofia Hamid, Mrigana Walia

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 2, February 2021

Pages: 1682 - 1686

Support Vector Machine Based MRI Brain Tumor Detection

Nazima Yousuf, Mrigana Walia

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 470 - 478

Ensuring Video Integrity Using Watermark - Chaining by SVD and DWT

Aditya Tiwari, Ayush Pandey

Share this Article
Top