International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 5 Issue 6, June 2016

Privacy Based Association Rules in Secure Horizontal Database

Zameena R, Nitha L Rozario

Privacy in data mining prevents the parties from directly sharing the data, and some types of information about the data. We introduce a protocol for secure mining of association rules in horizontally distributed databases using FDM, which an unsecured distributed version of the Apriori algorithm. We extended our work with Horizontal Aggregation that give rise to multiple row output, which transform rows to column using CASE, SPJ or PIVOT operators depending on the input. In order to prepare real world datasets that are very much suitable for data mining operations, we explored horizontal aggregations by developing constructs in the form of operators such as CASE, SPJ and PIVOT. Instead of single value, the horizontal aggregations return a set of values in the form of a row. The proposed system is user friendly as users are never expected to write queries we introduced security and privacy through cryptography and level based slicing. Level Based Slicing introduces different techniques such as Generalized Data, Bucketized Data, Multiset-based Generalization Data, One-attribute-per-Column Slicing Data, Sliced Data dimensionality of the data and preserves better utility than generalization and bucketization. Slicing protects privacy because it breaks the associations between uncorrelated attributes, which are infrequent and thus identifying. Our result shows that proposed method have higher performance other sequential algorithms. Customers can dynamically send request to the server either to apply privacy and security. In privacy, server can apply five types of slicing methods. In security server can apply FDM, Encryption and decryption, Hash function generate key for encryption and decryption. Experimental Analysis can be comparing with the time taken to evaluate the privacy preserving methods and Enhanced FDM Algorithm

Keywords: privacy preserving data mining, Advanced Encryption Standard, Association Rules, Level Based Slicing, Horizontal Aggregation

Edition: Volume 5 Issue 6, June 2016

Pages: 1539 - 1542


How to Cite this Article?

Zameena R, Nitha L Rozario, "Privacy Based Association Rules in Secure Horizontal Database", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=NOV164638, Volume 5 Issue 6, June 2016, 1539 - 1542

29 PDF Views | 26 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'privacy preserving data mining'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 462 - 464

Enhancing Security of Database Stored in Cloud Environment

Rajeshkannan.R, T. Saranya

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 3127 - 3134

A Survey of Random Decision Tree Framework Privacy Preserving Data Mining

Vina M. Lomte, Hemlata B. Deorukhakar

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1757 - 1758

A Review of Privacy Clustered Mining of Association Rules in Distributed Databases

Vanita Babane, Shital K.Somawar

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2234 - 2236

A Survey on Privacy-Preserving Mining of Association Rule on Databases

Asavari G.Smart, P. M. Mane

Share this article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 2084 - 2088

Implementation of Efficient Privacy Preserving Data Analysis for Secure Data Transmission

Shital Gawahale, Rekha Jadhav

Share this article



Similar Articles with Keyword 'Advanced Encryption Standard'

Informative Article, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 1056 - 1059

Dual Security Using Dual Encryption Schemes and Efficient User Revocation in Cloud

Nikhitha K. Nair, Navin K. S.

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 2784 - 2789

CAMP: Cloud Assisted Mobile Health Care System with Privacy

R. Abirami, Dr. S. T. Deepa

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 402 - 406

Improving Speed Up of Computing Using New AES Algorithm

Shweta Kumari, Abhishek Kumar

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 1539 - 1542

Privacy Based Association Rules in Secure Horizontal Database

Zameena R, Nitha L Rozario

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 6 Issue 6, June 2017

Pages: 1495 - 1500

Verifiable Attribute-Based Through Text and Image Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud

Nirupama Devangaon, Dr Suvarna Nandyal

Share this article



Similar Articles with Keyword 'Association Rules'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2832 - 2834

Hiding Sensitive Association Rules Using EMDSRRC

Marate Shashank S., Manjusha Yeola

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2507 - 2509

A Survey on Extended MI technique for Edit Recommendation using Hybrid History Mining and Relevance Feedback

Shradha P. Patil, B. Padmavathi

Share this article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 1990 - 1992

Techniques of OLAP and Association Rule Mining

Gunwanti R. Bawane, Prarthana Deshkar

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 462 - 464

Enhancing Security of Database Stored in Cloud Environment

Rajeshkannan.R, T. Saranya

Share this article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 2334 - 2339

A Novel Way for Mining Frequent and Interesting Patterns using Genetic Algorithm

Reshu Tyagi, Muskaan Batra

Share this article



Similar Articles with Keyword 'Horizontal Aggregation'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1561 - 1567

Horizontal Aggregation in SQL to Prepare Datasets and Decision Tree

Krupali R. Dhawale, M. S. Gayathri

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 1539 - 1542

Privacy Based Association Rules in Secure Horizontal Database

Zameena R, Nitha L Rozario

Share this article
Top