A REVIEW PAPER ON ASSOCIATION RULES FOR PRIVACY-PRESERVING MINING FROM VARIOUS ENCRYPTION TECHNIQUES
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 0, Vol 4, Issue 10
Abstract
A new consequence has been significant in the Cloud computing in the example of data mining as a service, a company missing in proficiency or computational its mining needs to a third party service provider, the items and the association rules of the database are measured private property of the company. To care for company confidentiality, the data owner transforms its data and ships it to the server, sends mining queries to the server, and recovers the true patterns from the extracted patterns expected from the server. This paper, study the difficulty of the association rule mining task within a corporate privacy preserving framework. An attack model based on backdrop information and devises an idea for confidentiality preserve removal. It ensure that each altered item is the same with respect to the attackers backdrop information, from at smallest amount k1 other altered items. This paper will be efficient and keep confidentiality.
Authors and Affiliations
Mr. Haibat Jadhav
Secret Sharing Using Visual Cryptography Based on Reversed Images
Visual Cryptography is a new cryptographic technique which allows Visual information (e.g. printed text, picture) to be encrypted in such a way that their decryption can be performed by the human visual system, wi...
IMPACT OF SAND DREDGING AND SILT EXTRACTION ACTIVITY ON RIVER AND ITS CHARACTERISTICS : A REVIEW
The present research work highlights the influences of sand dredging and extensive silt quarrying activity on rivers. The sand dredging activity and its impact on the river processes and other river environment ha...
MECHANICAL PROPERTIES OF ULTRHIGH PERFORMANCE FIBER REINFORCED CONCRETE
Ultrahigh performance fiber reinforced concrete (UHPFRC), as a new class of concrete, has attracted a lot of attention in recent years. This type of concrete with a compressive strength of more than 150 MPa, h...
A Comparative Study of Various Brain Tumor Detection Algorithms
In recent years, medical image researches for brain tumor detection are attaining more curiosity since the augmented need for efficient and objective evaluation of large amounts of data. Medically, tumors are also...
A Noval Approach on Online Transaction Protocols
The increase of wireless devices, offering connectivity and convenience, continues to exert marvelous demands on merchants to deploy secure wireless applications including electronic commerce. Secure Socket Layer...