FIM-Anonymizing Using Tree Structured Data
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 5 Issue 6, June 2016

FIM-Anonymizing Using Tree Structured Data

Rabitha T, Farzin Ahammed T

FIM-anonymizing using tree structured data study about the problem of protecting privacy in the publication of set-valued data. Considering a collection of supermarket transactional data that contains detailed information about items bought together by individuals. Even after removing all personal characteristics of the buyer, which can serve as a link to his identity, thus resulting to privacy attacks from adversaries who have partial knowledge about the set. Depending upon the point of view of the adversaries. We define a new version of the k-anonymity guarantee. Our anonymization model relies on generalization instead of suppression. We develop an algorithm which find the frequent item set. The frequent-itemsets problem is that of nding sets of items that appear in (are related to) many of the same dataset..

Keywords: Anonymity, generalization, information loss, synopsis tree, frequent item set mining

Edition: Volume 5 Issue 6, June 2016

Pages: 1600 - 1604

Share this Article

How to Cite this Article?

Rabitha T, Farzin Ahammed T, "FIM-Anonymizing Using Tree Structured Data", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=NOV164590, Volume 5 Issue 6, June 2016, 1600 - 1604

51 PDF Views | 47 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Anonymity'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2435 - 2438

A Scalable Approach for Scheduled Data Anonymization Using MapReduce on Cloud

Surumi K S, Joyal Ulahannan

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1253 - 1257

Implementation Details of Anonymization of Sensitive Labels in Collaborative Data Publishing

Vandhana V

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 1987 - 1989

Secured Routing Using ALERT in MANETs

Aniket K. Khasnikar, Smita Kapse

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 971 - 973

Efficient Approach for Anonymizing Tree Structured Dataset using Improved Greedy Search Algorithm

Ruchira Warekar, Savitri Patil

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 3, March 2014

Pages: 597 - 601

A Novel Anonymous and Certificate Less Public Key Infrastructure for MANETs

G. Anandhi, S. K. Srivatsa

Share this Article

Similar Articles with Keyword 'generalization'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2435 - 2438

A Scalable Approach for Scheduled Data Anonymization Using MapReduce on Cloud

Surumi K S, Joyal Ulahannan

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 658 - 661

A Better Approach for Privacy Preserving Data Publishing by Slicing

Mohd Faquroddin, G. Kiran Kumar

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 679 - 682

Review of Slicing Approach: Data Publishing with Data Privacy and Data Utility

Vina M. Lomte, Hemlata B. Deorukhakar

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 1600 - 1604

FIM-Anonymizing Using Tree Structured Data

Rabitha T, Farzin Ahammed T

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 2068 - 2071

Bottom-Up Generalization: A Data Mining Solution to Privacy Protection

Vishakha B. Dalvi, Ranjit R. Keole

Share this Article

Similar Articles with Keyword 'information loss'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 568 - 571

Efficient Retrieval of Face Image from Large Scale Database Using Sparse Coding and Reranking

P. Greeshma, K. Palguna Rao

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1676 - 1680

A Survey on Big Data Mining Algorithms

S. Sivasankar, T. Prabhakaran

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 1600 - 1604

FIM-Anonymizing Using Tree Structured Data

Rabitha T, Farzin Ahammed T

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 1454 - 1457

A Reliable Method for Accuracy Constrained Privacy Preservation for Relational Data

Waghmare Ashwini R, V. M. Jarali

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 764 - 767

Fuzzy and Rough Set Theory Based Gene Selection Method

C. Kalaiselvi, Dr. G. M. Nasira

Share this Article

Similar Articles with Keyword 'frequent item set mining'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 1546 - 1551

Mining Frequent Item Set Using Cluster Approach from Large Uncertain Database

Naveen Sarawgi, C. Malathy

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 1600 - 1604

FIM-Anonymizing Using Tree Structured Data

Rabitha T, Farzin Ahammed T

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 1, January 2016

Pages: 139 - 144

Analysis of Frequent Item set Mining of Electronic Evidence using ISPO Tree based on Map/Reduce

Pranav Kumar Bhadane, R. V. Patil

Share this Article
Top