International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 113

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 10, October 2014


A Well-Organized Method for Protecting Sensitive Information

Priyanka Choubey | Savita Rathoad


Abstract: Data mining services need correct input data for their results to be significant, but privacy concerns may power users to offer spurious information. To protect client privacy in the data mining process, a multiplicity of techniques based on random perturbation of data records have been proposed lately. One known fact which is very significant in data mining is discovering the association rules from database of transactions each transaction consists of set of objects. Two important terms support and confidence are linked with each of the association rule. Actually any rule is called as sensitive if its disclosure risk is above a certain privacy threshold. Sometimes we do not want to disclose sensitive rules to the public because of privacy customized definition of support and confidence so that it would hide any desired sensitive association regulation without any side effect. in reality the enhanced technique is by means of the same method (as previously used method) of receiving association rules but modified definitions of support and confidence are used.


Keywords: purposes There are many approaches to hide confident association rules which take the support and confidence as a base for algorithms and many more The proposed work has the basis of reduction of support and confidence of sensitive rules but this work is not restriction or disturbing the given database of transactions directlyThe proposed algorithm uses some Association rules Support, Confidence, Data mining, Data hiding, etc


Edition: Volume 3 Issue 10, October 2014,


Pages: 1602 - 1605


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Priyanka Choubey, Savita Rathoad, "A Well-Organized Method for Protecting Sensitive Information", International Journal of Science and Research (IJSR), Volume 3 Issue 10, October 2014, pp. 1602-1605, https://www.ijsr.net/get_abstract.php?paper_id=2015166

Similar Articles with Keyword 'Confidence'

Downloads: 3 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Analysis Study Research Paper, Computer Science & Engineering, Canada, Volume 12 Issue 10, October 2023

Pages: 2054 - 2058

An Evaluation of a Haar Cascade Classifiers using Multi-Resolution Images and Multi-Threading Resources on a Raspberry Pi

Qussay Salih

Share this Article

Downloads: 104

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1389 - 1391

Generalized Ranking for Product Aspects using Concept Hierarchies

K. Bharathi | T. Venkata Satya Vivek | G. Radha Krishna

Share this Article
Top