Securing Informative Fuzzy Association Rules using Bayesian Network
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2019, Vol 10, Issue 10
Abstract
In business association rules being considered as important assets, play a vital role in its productivity and growth. Different business partnership share association rules in order to explore the capabilities to make effective decision for enhance-ment of business and core capabilities. The fuzzy association rule mining approach emerged out of the necessity to mine quantitative data regularly present in database. An association rule is sensitive when it violates few rules and regulation for sharing particular nature of information to third world. Like classical association rules, there is a need for some privacy measures to be taken for retaining the standards and importance of fuzzy association rules. Privacy preservation is used for valu-able information extraction and minimizing the risk of sensitive information disclosure. Our proposed model mainly focuses to secure the sensitive information revealing association rules. In our model, sensitive fuzzy association rules are secured by identifying sensitive fuzzy item to perturb fuzzified dataset. The resulting transformed FARs are analyzed to conclude/calculate the accuracy level of our model in context of newly generated fuzzy association rules, hidden rules and lost rules. Extensive experiments are carried out in order to demonstrate the results of our proposed model. Privacy preservation of maximum number of sensitive FARs by keeping minimum perturbation highlights the significance of our model.
Authors and Affiliations
Muhammad Fahad, Khalid Iqbal, Somaiya Khatoon, Khalid Mahmood Awan
SVM Classification of Urban High-Resolution Imagery Using Composite Kernels and Contour Information
The classification of remote sensing images has done great forward taking into account the image’s availability with different resolutions, as well as an abundance of very efficient classification algorithms. A number of...
Improving Web Movie Recommender System Based on Emotions
Recommender Systems (RSs) are garnering a significant importance with the advent of e-commerce and e-business on the web. This paper focused on the Movie Recommender System (MRS) based on human emotions. The problem is t...
An Automated approach for Preventing ARP Spoofing Attack using Static ARP Entries
ARP spoofing is the most dangerous attack that threats LANs, this attack comes from the way the ARP protocol works, since it is a stateless protocol. The ARP spoofing attack may be used to launch either denial of service...
A New Algorithm for Data Compression Optimization
People tend to store a lot of files inside theirs storage. When the storage nears it limit, they then try to reduce those files size to minimum by using data compression software. In this paper we propose a new algorithm...
Face Recognition using SIFT Key with Optimal Features Selection Model
Facial expression is complex in nature due to legion of variations present. These variations are identified and recorded using feature extraction mechanisms. The researchers have worked towards it and created classifiers...