Privacy-Preserving Mining of Association Rules in Cloud
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Downloads: 106 | Weekly Hits: ⮙1 | Monthly Hits: ⮙10

Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 11, November 2014

Privacy-Preserving Mining of Association Rules in Cloud

Vishal Ravindra Redekar, Dr. K.N.Honwadkar

With the appearance of cloud computing and its domains for IT services based on the internet and big data centers, the outsourcing of data and computing services is acquiring a huge relevance. The interest in the area of data mining, as a service, has been the main stay; because of the encouraged development in the various fields, such as Cloud Computing. A third party service provider, the server, comes in the frame, when a company, the data owner, who lacks in expertise or the resources, outsources its mining needs. However the data owner thinks both the items and the association rules of the outsourced Database as a confidential property. The server stores the data and ships transformed by the data owner. Then the data owner sends mining queries to the server, and the server returns the extracted patterns. From these patterns, the owner recovers the true patterns. Within corporate privacy-preserving frameworks, the problem of outsourcing the association rule mining responsibilities in the cloud environment is studied in this paper. An innovative approach ensures that every transformed item from data owner to server is interchangeable with compared to the background knowledge of attackers is proposed in the paper. Our methods are scalable, effectual and protect privacy on an extremely huge and real transaction database representative our complete algorithm. This approach also proposes to provide the privacy-preserving mining over cloud. We can assume that a conventional model where the adversary knows the area of items and their exact occurrence and can employ this information to identify cipher items and cipher item sets.

Keywords: Association rule mining, Privacy-preserving mining, Database outsourcing, Cloud environment, Extracted patterns

Edition: Volume 3 Issue 11, November 2014

Pages: 2214 - 2216

Share this Article

How to Cite this Article?

Vishal Ravindra Redekar, Dr. K.N.Honwadkar, "Privacy-Preserving Mining of Association Rules in Cloud", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=OCT141528, Volume 3 Issue 11, November 2014, 2214 - 2216

Enter Your Email Address




Similar Articles with Keyword 'Association rule mining'

Downloads: 104

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 2334 - 2339

A Novel Way for Mining Frequent and Interesting Patterns using Genetic Algorithm

Reshu Tyagi, Muskaan Batra

Share this Article

Downloads: 105

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1227 - 1231

An Efficient Clustering Based High Utility Infrequent Weighted Item Set Mining Approach

Dr. N. Umadevi, A. Gokila Devi

Share this Article

Downloads: 106 | Weekly Hits: ⮙1 | Monthly Hits: ⮙10

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2214 - 2216

Privacy-Preserving Mining of Association Rules in Cloud

Vishal Ravindra Redekar, Dr. K.N.Honwadkar

Share this Article

Downloads: 108 | Weekly Hits: ⮙3 | Monthly Hits: ⮙8

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1395 - 1399

Improvement in Apriori Algorithm with New Parameters

Reeti Trikha, Jasmeet Singh

Share this Article

Downloads: 109

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1498 - 1500

Building Fuzzy Associative Classifier Using Fuzzy Values

P. Kayal, S. Kannan

Share this Article

Similar Articles with Keyword 'Privacy-preserving mining'

Downloads: 106 | Weekly Hits: ⮙1 | Monthly Hits: ⮙10

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2214 - 2216

Privacy-Preserving Mining of Association Rules in Cloud

Vishal Ravindra Redekar, Dr. K.N.Honwadkar

Share this Article

Downloads: 114

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2234 - 2236

A Survey on Privacy-Preserving Mining of Association Rule on Databases

Asavari G.Smart, P. M. Mane

Share this Article

Similar Articles with Keyword 'Cloud environment'

Downloads: 97

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 1690 - 1694

Analytics of Application Resource Utilization within the Virtual Machine

Priyanka H

Share this Article

Downloads: 100

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1709 - 1712

A Business Framework for Securing Data Storage over Cloud Environment using ECC Crypto System

Nara Venkata Surendra Reddy, DLS Reddy

Share this Article

Downloads: 101

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2067 - 2070

A Survey on QOS Guaranteed Bandwidth Shifting and Redistribution in Mobile Cloud Environment

Swati Nagpure

Share this Article

Downloads: 103 | Weekly Hits: ⮙3

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1355 - 1359

A Survey on Resource Scheduling and Allocation Policy in a Cloud Environment

V. Manimaran, S. Prabhu

Share this Article

Downloads: 103

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3087 - 3089

Confidential and Efficient Hosting Query Services in Public Clouds with RASP Data Disruption

Vanajakshi Devi.K, Praveen Kumar.N

Share this Article



Top