A Well-Organized Method for Protecting Sensitive Information
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Downloads: 113

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 10, October 2014

A Well-Organized Method for Protecting Sensitive Information

Priyanka Choubey, Savita Rathoad

Data mining services need correct input data for their results to be significant, but privacy concerns may power users to offer spurious information. To protect client privacy in the data mining process, a multiplicity of techniques based on random perturbation of data records have been proposed lately. One known fact which is very significant in data mining is discovering the association rules from database of transactions each transaction consists of set of objects. Two important terms support and confidence are linked with each of the association rule. Actually any rule is called as sensitive if its disclosure risk is above a certain privacy threshold. Sometimes we do not want to disclose sensitive rules to the public because of privacy customized definition of support and confidence so that it would hide any desired sensitive association regulation without any side effect. in reality the enhanced technique is by means of the same method (as previously used method) of receiving association rules but modified definitions of support and confidence are used.

Keywords: purposes There are many approaches to hide confident association rules which take the support and confidence as a base for algorithms and many more The proposed work has the basis of reduction of support and confidence of sensitive rules but this work is not restriction or disturbing the given database of transactions directlyThe proposed algorithm uses some Association rules Support, Confidence, Data mining, Data hiding, etc

Edition: Volume 3 Issue 10, October 2014

Pages: 1602 - 1605

Share this Article

How to Cite this Article?

Priyanka Choubey, Savita Rathoad, "A Well-Organized Method for Protecting Sensitive Information", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=2015166, Volume 3 Issue 10, October 2014, 1602 - 1605

Enter Your Email Address




Similar Articles with Keyword 'Confidence'

Downloads: 104

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1389 - 1391

Generalized Ranking for Product Aspects using Concept Hierarchies

K. Bharathi, T. Venkata Satya Vivek, G. Radha Krishna

Share this Article

Downloads: 104

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 2334 - 2339

A Novel Way for Mining Frequent and Interesting Patterns using Genetic Algorithm

Reshu Tyagi, Muskaan Batra

Share this Article

Downloads: 104 | Weekly Hits: ⮙1 | Monthly Hits: ⮙9

Research Paper, Computer Science & Engineering, India, Volume 8 Issue 6, June 2019

Pages: 1498 - 1501

Mining Weakly Labeled Web Facial Images for Search-Based Face Annotation

Dipak D. Tayade, Nilesh Y Chaudhari

Share this Article

Downloads: 105

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 2004 - 2008

Document Classification Using Part of Speech in Text Mining

Sonam Tripathi, Tripti Sharma

Share this Article

Downloads: 106

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1699 - 1703

Multipath Routing in Delay Tolerant Networks Using Hypercube Based Social Feature

Prajakta B. Bhosale, H. A. Hingoliwala

Share this Article

Similar Articles with Keyword 'Data mining'

Downloads: 64 | Monthly Hits: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 2, February 2021

Pages: 1669 - 1672

Random Forest Based Heart Disease Prediction

Adeen, Preeti Sondhi

Share this Article

Downloads: 96

Research Paper, Computer Science & Engineering, Kenya, Volume 7 Issue 5, May 2018

Pages: 1409 - 1411

Students Performance Prediction Using FP-Tree Data Mining Techniques

Eliakim Ombati Akama

Share this Article

Downloads: 98

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 528 - 532

Knowledge Fusion Technique Using Classifier Ensemble by Combining the Sets of Classification Rules

Jaydeep B. Patil, Vaishali Nandedkar

Share this Article

Downloads: 98 | Weekly Hits: ⮙3

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2507 - 2509

A Survey on Extended MI technique for Edit Recommendation using Hybrid History Mining and Relevance Feedback

Shradha P. Patil, B. Padmavathi

Share this Article

Downloads: 101

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1127 - 1129

Trust Checking in Social Networks Using Data Mining

Archa.S

Share this Article

Similar Articles with Keyword 'Data hiding'

Downloads: 101

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1579 - 1582

Data Hiding in H.264/AVC Video Encryption with XOR-ed User Information and Data in File Format

Neenu Shereef

Share this Article

Downloads: 103

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1175 - 1178

Steganographic Method of Data Hiding using JPEG Images

Shabana Vathelil Subair, Fathima A Muhammadali

Share this Article

Downloads: 104

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1319 - 1323

Advanced Technique for Comprehensive Data Security

Pramendra Kumar, Vijay Kumar Sharma

Share this Article

Downloads: 104

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1642 - 1643

A Survey Paper on Various Encryption & Data Hiding Methods for Video Streams

Shrutika S. Giradkar, Antara Bhattacharya

Share this Article

Downloads: 104

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1130 - 1132

Survey On: Reversible Data Hiding in Encrypted JPEG Images

N. B. Pokale, Sanjivani S. Koli

Share this Article

Similar Articles with Keyword 'etc'

Downloads: 172

Research Paper, Computer Science & Engineering, Bangladesh, Volume 5 Issue 6, June 2016

Pages: 1523 - 1527

Multifunctional Remote Controlled Robot Using Android Application

T. A. Mithu, T. S. Reddy

Share this Article

Downloads: 1

Research Paper, Computer Science & Engineering, Russia, Volume 10 Issue 4, April 2021

Pages: 1115 - 1121

Conceptual Modeling of a Tramcar

Iftikhar B. Abbasov, Viacheslav V. Orekhov

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Proposals or Synopsis, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 705 - 706

An Analysis on Voice Assistant

Shravankumar Jha

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Survey Paper, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 716 - 720

A Comprehensive Study of Elasticsearch

Nikita Kathare, O. Vinati Reddy, Dr. Vishalakshi Prabhu

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 1017 - 1020

Human Computer Interface for Physically Impaired

Aayush Bhansali, Shivani Vhatkar, Shamoil Arsiwala, Aditi Srivastava, M. K. Nivangune

Share this Article



Top