Abstract: Privacy Based Association Rules in Secure Horizontal Database
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064

Downloads: 110

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 5 Issue 6, June 2016

Privacy Based Association Rules in Secure Horizontal Database

Zameena R, Nitha L Rozario

Privacy in data mining prevents the parties from directly sharing the data, and some types of information about the data. We introduce a protocol for secure mining of association rules in horizontally distributed databases using FDM, which an unsecured distributed version of the Apriori algorithm. We extended our work with Horizontal Aggregation that give rise to multiple row output, which transform rows to column using CASE, SPJ or PIVOT operators depending on the input. In order to prepare real world datasets that are very much suitable for data mining operations, we explored horizontal aggregations by developing constructs in the form of operators such as CASE, SPJ and PIVOT. Instead of single value, the horizontal aggregations return a set of values in the form of a row. The proposed system is user friendly as users are never expected to write queries we introduced security and privacy through cryptography and level based slicing. Level Based Slicing introduces different techniques such as Generalized Data, Bucketized Data, Multiset-based Generalization Data, One-attribute-per-Column Slicing Data, Sliced Data dimensionality of the data and preserves better utility than generalization and bucketization. Slicing protects privacy because it breaks the associations between uncorrelated attributes, which are infrequent and thus identifying. Our result shows that proposed method have higher performance other sequential algorithms. Customers can dynamically send request to the server either to apply privacy and security. In privacy, server can apply five types of slicing methods. In security server can apply FDM, Encryption and decryption, Hash function generate key for encryption and decryption. Experimental Analysis can be comparing with the time taken to evaluate the privacy preserving methods and Enhanced FDM Algorithm

Keywords: privacy preserving data mining, Advanced Encryption Standard, Association Rules, Level Based Slicing, Horizontal Aggregation

Edition: Volume 5 Issue 6, June 2016

Pages: 1539 - 1542

Share this Article

How to Cite this Article?

Zameena R, Nitha L Rozario, "Privacy Based Association Rules in Secure Horizontal Database", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=NOV164638, Volume 5 Issue 6, June 2016, 1539 - 1542

Enter Your Email Address


Similar Articles with Keyword 'privacy preserving data mining'

Downloads: 108

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1306 - 1308

A Survey on Discrimination Prevention in Data Mining

Vrushali Atulrao Mane, Prof. A. R. Deshpande

Share this Article

Downloads: 108

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1758 - 1762

Privacy-Preserving Data Mining using RDT Framework and C4.5

Komal N. Chouragade, Trupti H. Gurav

Share this Article

Similar Articles with Keyword 'Advanced Encryption Standard'

Downloads: 108

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1435 - 1439

Review on Encryption Techniques in Multimedia Data

Ashwini G. Kamble, Prof. Nikita J. Kulkarni

Share this Article

Downloads: 108

Informative Article, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 1056 - 1059

Dual Security Using Dual Encryption Schemes and Efficient User Revocation in Cloud

Nikhitha K. Nair, Navin K. S.

Share this Article

Similar Articles with Keyword 'Association Rules'

Downloads: 98

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2507 - 2509

A Survey on Extended MI technique for Edit Recommendation using Hybrid History Mining and Relevance Feedback

Shradha P. Patil, B. Padmavathi

Share this Article

Downloads: 104

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 2334 - 2339

A Novel Way for Mining Frequent and Interesting Patterns using Genetic Algorithm

Reshu Tyagi, Muskaan Batra

Share this Article

Similar Articles with Keyword 'privacy'

Downloads: 1

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2267 - 2274

Two Accounts of Solitude in Online Communal Networks

Alla Venu Gopal, G. Srinivasa Reddy

Share this Article

Downloads: 1 | Monthly Hits: ⮙1

Review Papers, Computer Science & Engineering, India, Volume 10 Issue 8, August 2021

Pages: 1126 - 1129

Privacy Preserving Utility Verification of Data Published

Madhushree M

Share this Article

Similar Articles with Keyword 'preserving'

Downloads: 1 | Monthly Hits: ⮙1

Review Papers, Computer Science & Engineering, India, Volume 10 Issue 8, August 2021

Pages: 1126 - 1129

Privacy Preserving Utility Verification of Data Published

Madhushree M

Share this Article

Downloads: 3 | Monthly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 7, July 2021

Pages: 544 - 546

Green Computing: Current Research Trends

Vallabhi Ghansawant

Share this Article

Similar Articles with Keyword 'data'

Downloads: 508 | Weekly Hits: ⮙1 | Monthly Hits: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 7, July 2020

Pages: 1454 - 1458

Heart Disease Prediction with Machine Learning Approaches

Megha Kamboj

Share this Article

Downloads: 85

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 10, October 2020

Pages: 1626 - 1628

Image Noise Reduction with Autoencoder using Tensor Flow

Jai Sehgal, Dr Yojna Arora

Share this Article

Similar Articles with Keyword 'mining'

Downloads: 0

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 8, August 2021

Pages: 1068 - 1070

Predicting the Course Knowledge Level of Students using Data Mining Techniques

Thapaswini P S

Share this Article

Downloads: 1

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2205 - 2207

A Survey of Generating Multi-Document Summarizations

Patil Ajita S., P. M. Mane

Share this Article

Similar Articles with Keyword 'Advanced'

Downloads: 174 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, Bangladesh, Volume 5 Issue 6, June 2016

Pages: 1523 - 1527

Multifunctional Remote Controlled Robot Using Android Application

T. A. Mithu, T. S. Reddy

Share this Article

Downloads: 2

Research Paper, Computer Science & Engineering, China, Volume 10 Issue 5, May 2021

Pages: 1130 - 1137

Artificial Intelligence: The Backbone of Industry Evolution, Impact, and Future

Ralph Tichafa Tawanda Chawatama, Sun Shaowei

Share this Article

Similar Articles with Keyword 'Encryption'

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Downloads: 1 | Monthly Hits: ⮙1

Review Papers, Computer Science & Engineering, India, Volume 10 Issue 8, August 2021

Pages: 1126 - 1129

Privacy Preserving Utility Verification of Data Published

Madhushree M

Share this Article

Similar Articles with Keyword 'Standard'

Downloads: 155 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article

Downloads: 1

Research Paper, Computer Science & Engineering, Russia, Volume 10 Issue 4, April 2021

Pages: 1115 - 1121

Conceptual Modeling of a Tramcar

Iftikhar B. Abbasov, Viacheslav V. Orekhov

Share this Article

Similar Articles with Keyword 'Association'

Downloads: 0

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 8, August 2021

Pages: 1068 - 1070

Predicting the Course Knowledge Level of Students using Data Mining Techniques

Thapaswini P S

Share this Article

Downloads: 98

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2507 - 2509

A Survey on Extended MI technique for Edit Recommendation using Hybrid History Mining and Relevance Feedback

Shradha P. Patil, B. Padmavathi

Share this Article

Similar Articles with Keyword 'Rules'

Downloads: 98

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 528 - 532

Knowledge Fusion Technique Using Classifier Ensemble by Combining the Sets of Classification Rules

Jaydeep B. Patil, Vaishali Nandedkar

Share this Article

Downloads: 98

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2507 - 2509

A Survey on Extended MI technique for Edit Recommendation using Hybrid History Mining and Relevance Feedback

Shradha P. Patil, B. Padmavathi

Share this Article

Similar Articles with Keyword 'Level'

Downloads: 0

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 8, August 2021

Pages: 1068 - 1070

Predicting the Course Knowledge Level of Students using Data Mining Techniques

Thapaswini P S

Share this Article

Downloads: 1

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 886 - 889

Survey on Algorithms Predicting Performance of Keyword Queries

Snehal Borole

Share this Article

Similar Articles with Keyword 'Based'

Downloads: 132 | Weekly Hits: ⮙1 | Monthly Hits: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 457 - 461

Artificial Intelligence for Hiring

Ishan Borker, Ashok Veda

Share this Article

Downloads: 105 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1751 - 1754

Joining Delay; Packet Delivery and Limitations of EGMP

G. Anandhi, Dr. S. K. Srivatsa

Share this Article

Similar Articles with Keyword 'Slicing'

Downloads: 101

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1833 - 1836

A Review of Enhanced Technique for Cloud Data Storage Security Using Data Slicing

Roshan M. Kawale, Bharti L. Dhote

Share this Article

Downloads: 102

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 3174 - 3177

Optimizing Dynamic Dependence Graph

Toshi Sharma, Madhuri Sharma

Share this Article

Similar Articles with Keyword 'Horizontal'

Downloads: 106

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 938 - 943

HCR Using K-Means Clustering Algorithm

Meha Mathur, Anil Saroliya

Share this Article

Downloads: 106

Dissertation Chapters, Computer Science & Engineering, India, Volume 6 Issue 7, July 2017

Pages: 1034 - 1037

An Approach for Horizontal Scaling of Cluster

Manodaya B. Gavali, Navnath Kale

Share this Article

Similar Articles with Keyword 'Aggregation'

Downloads: 100

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1147 - 1150

Enhance QoS of Lossy Wireless Sensor Network by In-Network Data Aggregation

Harshada Kupade, Madhav Ingle

Share this Article

Downloads: 102

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2371 - 2374

Survey on Data Aggregation Technique for Wireless Sensor Networks based on IF algorithm

Anagha Jagtap, M. D. Ingle

Share this Article
Top