A REVIEW PAPER ON ASSOCIATION RULES FOR PRIVACY-PRESERVING MINING FROM VARIOUS ENCRYPTION TECHNIQUES

Abstract

 A new consequence has been significant in the Cloud computing in the example of data mining as a service, a company missing in proficiency or computational its mining needs to a third party service provider, the items and the association rules of the database are measured private property of the company. To care for company confidentiality, the data owner transforms its data and ships it to the server, sends mining queries to the server, and recovers the true patterns from the extracted patterns expected from the server. This paper, study the difficulty of the association rule mining task within a corporate privacy preserving framework. An attack model based on backdrop information and devises an idea for confidentiality preserve removal. It ensure that each altered item is the same with respect to the attackers backdrop information, from at smallest amount k1 other altered items. This paper will be efficient and keep confidentiality.

Authors and Affiliations

Mr. Haibat Jadhav

Keywords

Related Articles

  Secret Sharing Using Visual Cryptography Based on Reversed Images

 Visual Cryptography is a new cryptographic technique which allows Visual information (e.g. printed text, picture) to be encrypted in such a way that their decryption can be performed by the human visual system, wi...

 IMPACT OF SAND DREDGING AND SILT EXTRACTION ACTIVITY ON RIVER AND ITS CHARACTERISTICS : A REVIEW

 The present research work highlights the influences of sand dredging and extensive silt quarrying activity on rivers. The sand dredging activity and its impact on the river processes and other river environment ha...

 MECHANICAL PROPERTIES OF ULTRHIGH PERFORMANCE FIBER REINFORCED CONCRETE

 Ultrahigh performance fiber reinforced concrete (UHPFRC), as a new class of concrete, has attracted a lot of attention in recent years. This type of concrete with a compressive strength of more than 150 MPa, h...

 A Comparative Study of Various Brain Tumor Detection Algorithms

 In recent years, medical image researches for brain tumor detection are attaining more curiosity since the augmented need for efficient and objective evaluation of large amounts of data. Medically, tumors are also...

 A Noval Approach on Online Transaction Protocols

 The increase of wireless devices, offering connectivity and convenience, continues to exert marvelous demands on merchants to deploy secure wireless applications including electronic commerce. Secure Socket Layer...

Download PDF file
  • EP ID EP95583
  • DOI -
  • Views 70
  • Downloads 0

How To Cite

Mr. Haibat Jadhav (0).  A REVIEW PAPER ON ASSOCIATION RULES FOR PRIVACY-PRESERVING MINING FROM VARIOUS ENCRYPTION TECHNIQUES. International Journal of Engineering Sciences & Research Technology, 4(10), 596-600. https://www.europub.co.uk/articles/-A-95583