Downloads: 110 | Views: 236
M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 5 Issue 6, June 2016 | Popularity: 6.8 / 10
Privacy Based Association Rules in Secure Horizontal Database
Zameena R, Nitha L Rozario
Abstract: Privacy in data mining prevents the parties from directly sharing the data, and some types of information about the data. We introduce a protocol for secure mining of association rules in horizontally distributed databases using FDM, which an unsecured distributed version of the Apriori algorithm. We extended our work with Horizontal Aggregation that give rise to multiple row output, which transform rows to column using CASE, SPJ or PIVOT operators depending on the input. In order to prepare real world datasets that are very much suitable for data mining operations, we explored horizontal aggregations by developing constructs in the form of operators such as CASE, SPJ and PIVOT. Instead of single value, the horizontal aggregations return a set of values in the form of a row. The proposed system is user friendly as users are never expected to write queries we introduced security and privacy through cryptography and level based slicing. Level Based Slicing introduces different techniques such as Generalized Data, Bucketized Data, Multiset-based Generalization Data, One-attribute-per-Column Slicing Data, Sliced Data dimensionality of the data and preserves better utility than generalization and bucketization. Slicing protects privacy because it breaks the associations between uncorrelated attributes, which are infrequent and thus identifying. Our result shows that proposed method have higher performance other sequential algorithms. Customers can dynamically send request to the server either to apply privacy and security. In privacy, server can apply five types of slicing methods. In security server can apply FDM, Encryption and decryption, Hash function generate key for encryption and decryption. Experimental Analysis can be comparing with the time taken to evaluate the privacy preserving methods and Enhanced FDM Algorithm
Keywords: privacy preserving data mining, Advanced Encryption Standard, Association Rules, Level Based Slicing, Horizontal Aggregation
Edition: Volume 5 Issue 6, June 2016
Pages: 1539 - 1542
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 108
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014
Pages: 1306 - 1308A Survey on Discrimination Prevention in Data Mining
Vrushali Atulrao Mane, Prof. A. R. Deshpande
Downloads: 108
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 1435 - 1439Review on Encryption Techniques in Multimedia Data
Ashwini G. Kamble, Prof. Nikita J. Kulkarni
Downloads: 108
Informative Article, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 1056 - 1059Dual Security Using Dual Encryption Schemes and Efficient User Revocation in Cloud
Nikhitha K. Nair, Navin K. S.
Downloads: 108
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015
Pages: 1758 - 1762Privacy-Preserving Data Mining using RDT Framework and C4.5
Komal N. Chouragade, Trupti H. Gurav
Downloads: 109
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014
Pages: 1757 - 1758A Review of Privacy Clustered Mining of Association Rules in Distributed Databases
Vanita Babane, Shital K.Somawar