Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








499 Hits in 4.3 sec

Privacy-Preserving Outsourced Association Rule Mining on Vertically Partitioned Databases

K Geetha, K Gurunadha Guptha, R Prasad
2017 International Journal of Scientific Research in Computer Science, Engineering and Information Technology © 2017 IJSRCSEIT   unpublished
The conventional framework concentrated independently on vertically parceled database and on a level plane apportioned databases on the premise of this presenting a framework which concentrate on both  ...  on a level plane and vertically divided databases cooperatively with protection safeguarding component.  ...  ‖ which focus on privacy-preserving mining on vertically partitioned databases.  ... 
fatcat:a45geevsdvajhirouajr73gdmu

Privacy-Preserving Outsourced Association Rule Mining on Vertically and Horizontally Partitioned Databases Using Twofold Encryption

Abhishek, Kurkut, Sarang Bora
2017 International Engineering Research Journal   unpublished
We also propose a technique for solving a main problem of privacy preserving association rule mining in two party databases.  ...  Privacy concerns may prevent the parties from directly sharing the data and some types of information about the data. This research addresses secure mining of association rules over partitioned data.  ...  Based on this solution, authors built a privacy-preserving outsourced association rule mining solution for vertically partitioned databases. 3) B. Dong, R. Liu and W. H.  ... 
fatcat:oisjakyc25h7pdhd36dfh7kh7i

Data Outsourcing based on Secure Association Rule Mining Processes

V. Sujatha, Debnath Bhattacharyya, P. Silpa Chaitanya, Tai-hoon Kim
2015 International Journal of Security and Its Applications  
This paper addresses a problem by secure association rules over partitioned data in both horizontal and vertical representation.  ...  The result shows that algorithm timing is desirable for big size data for security considerations using association rule mining operations in real time application development.  ...  Privacy preserving distributed data mining first addresses secure association process on secure data outsourcing [11] .  ... 
doi:10.14257/ijsia.2015.9.3.05 fatcat:gx2pvzxulndgtausfuuey27g2m

Secure Outsourced Association Rule Mining using Homomorphic Encryption

Sandeep Varma, LijiP I
2017 International Journal of Engineering Research and Science  
Several techniques are used in data analysis, where frequent itemset mining and association rule mining are very popular among them.  ...  Multiple data owners can also collaboratively mine by combining their databases. In such cases the privacy of outsourced data is a major issue.  ...  Association rules mining in vertically partitioned databases The work done by B. Rozenberg and E. Gudes [7] is the most relevant one among different privacy-preserving mining solutions.  ... 
doi:10.25125/engineering-journal-ijoer-sep-2017-22 fatcat:7bi3qizuhfbunbouqhxrjpsz5a

A comprehensive review on privacy preserving data mining

Yousra Abdul Alsahib S. Aldeen, Mazleena Salleh, Mohammad Abdur Razzaque
2015 SpringerPlus  
The current privacy preserving data mining techniques are classified based on distortion, association rule, hide association rule, taxonomy, clustering, associative classification, outsourced data mining  ...  Truly, the privacy must protect all the three mining aspects including association Abstract Preservation of privacy in data mining has emerged as an absolute prerequisite for exchanging confidential information  ...  Giannotti et al. (2013) explained the issues involving the outsourcing of association rule mining task for a corporate privacy-preserving network.  ... 
doi:10.1186/s40064-015-1481-x pmid:26587362 pmcid:PMC4643068 fatcat:twwirrmehva4pfkieiufldrxve

Data Mining-Based Privacy Preservation Technique for Medical Dataset Over Horizontal Partitioned

Shivlal Mewada
2021 International Journal of E-Health and Medical Communications (IJEHMC)  
The valuable information is extracted through data mining techniques. Recently, privacy preserving data mining techniques are widely adopted for securing and protecting the information and data.  ...  In the second step, noise is incorporated in the database to maintain the privacy and semantic of the data. Moreover, the seed function is used for protecting the original databases.  ...  It is observed that association rule mining scheme is applied to partition the data vertically.  ... 
doi:10.4018/ijehmc.20210901.oa4 fatcat:xnaignxek5h5njnlqzb7ia66bq

Privacy Preservation by Using AMDSRRC for Hiding Highly Sensitive Association Rule

Mr. Pravin R. Ponde, Prof. Chetan V. Andhare, Dr. S. M Jagade
2014 IOSR Journal of Computer Engineering  
In mining it is the main challenging issue. The owner of the data has some private information or property like association rule contained outsources database.  ...  In any case a few associations to help with some external counsellor for the procedure of information mining on the grounds that they don't have their consultant.  ...  Lakshmanan proposed the model for association rule for privacy preserving from the outsourced Database Transaction.  ... 
doi:10.9790/0661-16636065 fatcat:m3ias6f6tfd4tl4j6rrw7dzkdm

Privacy Preserving Association Rule Mining: Taxonomy, Techniques, and Metrics

Lili Zhang, wenjie wang, Yuqing Zhang
2019 IEEE Access  
In this paper, we provide a comprehensive review of studies on a specific PPDM, known as privacy-preserving association rule mining (PPARM).  ...  Therefore, a new research area known as privacy-preserving DM (PPDM) has emerged and attracted the attention of many researchers who are interested in preventing privacy disclosure during DM.  ...  Li and Lu [55] addressed outsourcing of privacy-preserving association rule mining on vertically partitioned databases (PPARM-V for short).  ... 
doi:10.1109/access.2019.2908452 fatcat:xgxwxkusgngv5l6dk2fulxfi4m

Enhancement in privacy preservation in cloud computing using apriori algorithm

Raniah Ali Mustafa, Haitham Salman Chyad, Jinan Redha Mutar
2022 Indonesian Journal of Electrical Engineering and Computer Science  
In regrades to privacy preservation, association rule mining was proposed by previous researches to protect the privacy of users.  ...  This performance analysis with varying number of the data and fake transactions shows that the proposed algorithm doesn't require fake transactions, like data privacy association rule mining.</span>  ...  [13] improved secured association rule mining (ISARM) is proposed for vertical and horizontal database segmentation.  ... 
doi:10.11591/ijeecs.v26.i3.pp1747-1757 fatcat:t2hd2im3srdifesqighdhvcfci

A Comprehensive Study of Privacy Preservation Techniques in a Distributed Association Rule Mining

Nusrat Jabeen.T, M.Chidambaram M.Chidambaram
2014 International Journal of Computer Applications  
In this paper, a comprehensive study of various methods for privacy preservation is presented which evaluates and analyzes various techniques for maintaining privacy during association rule mining process  ...  Association rule mining is a popular technique in data mining process which tries to find interesting associations and correlations among various data items in a transaction.  ...  The association rule mining techniques that uses cryptography for privacy preservation can be classified as: Vertically partitioned: Vertically partitioned data set contains different attributes for each  ... 
doi:10.5120/18884-0163 fatcat:lvo2onh4ljhslp44u64e233rv4

Privacy Preserving by Hiding Association Rule Mining from Transaction Database

Mr. Pravin R. Ponde, Dr. S. M Jagade
2014 IOSR Journal of Computer Engineering  
The proposed scheme for privacy preserving mining on databases to protect association rule means the corporate privacy.  ...  The Security and Privacy of the data are main challenging issues. The owner of the data has some private property like the outsourced database which contains the association rules.  ...  Lakshmanan proposed the model for association rule for privacy preserving from the outsourced Database Transaction.  ... 
doi:10.9790/0661-16522531 fatcat:dqhghr3wb5c3zif2nfgy6i673m

A Robust Privacy Preserving Approach of Outsourced Data by Modified Frequent Web Access Pattern

Tasneem Jahan, Amit Saxena
2018 International Journal of Computer Applications  
It offers an added advantage of reducing the risk and the utility of database is also increased. Our experiment is carried out on a genuine dataset.  ...  Technique called as super class substitution will be used here for perturbation of sensitive set of rules.  ...  Sandhya Rani [9] explored the vertically partitioned databases and had proposed a model to identify association rules.  ... 
doi:10.5120/ijca2018917438 fatcat:i6wjs6i2qrhc7i23jyoppfjnju

A Survey Paper on Frequent Itemset Mining Methods and Techniques

2015 International Journal of Science and Research (IJSR)  
This paper examines literature analysis on several methods for mining frequent itemsets. Further, it also describes in what manner differential privacy is handled in present systems.  ...  Individual privacy may get affected by exposing frequent itemsets.Therefore, differential privacy is now at central alarm.  ...  The key contributions is given by Vaidya & Clifton [7] for the privacy preservation in vertically partitioned databases.  ... 
doi:10.21275/v4i12.nov151884 fatcat:tlup23qc3fdydnycb4mfyco6me

Perspective Challenges & Proposed Solution for Ppdm Using Data Mining Techniques

Charu Sharma
2017 International Journal for Research in Applied Science and Engineering Technology  
The task of mining data by preserving its privacy is called Privacy Preserving Data Mining (PPDM).  ...  This article provides a review of different PPDM schemes and approaches that can be used to hide secret information from an unauthorized user by using association rule mining.  ...  Earlier, some work has done by providing database security on various challenges of association rule mining.  ... 
doi:10.22214/ijraset.2017.8298 fatcat:x6bmks5qxfd4jnbxmmi2hxepbe

Bit Incorporated Codon Positional Encoder (BICPE) Algorithm for Privacy Preservation in Vertically Partitioned Data in Cloud

Yogasini Manithurai, Prathibha Badhravati Nagaraju
2022 Brazilian Archives of Biology and Technology  
with A,C,G,T DNA codons. • Encrypted Association rules are built for frequent items in a transaction.  ...  This work proposed a privacy-preserving technique by applying Deoxyribonucleic Acid (DNA) coding-based novel Bit Incorporated Codon Positional Encoder (BICPE) algorithm for vertically divided cloud information  ...  Domadiya and coauthors [24] have applied collaborative mining to create a privacy-preserving association. Moreover, rule mining is used in vertically partitioned health care information.  ... 
doi:10.1590/1678-4324-2022210339 fatcat:7adyvrmygvd3lmj5myxcia7yn4
« Previous Showing results 1 — 15 out of 499 results