A REVIEW PAPER ON ASSOCIATION RULES FOR PRIVACY-PRESERVING MINING FROM VARIOUS ENCRYPTION TECHNIQUES

Abstract

 A new consequence has been significant in the Cloud computing in the example of data mining as a service, a company missing in proficiency or computational its mining needs to a third party service provider, the items and the association rules of the database are measured private property of the company. To care for company confidentiality, the data owner transforms its data and ships it to the server, sends mining queries to the server, and recovers the true patterns from the extracted patterns expected from the server. This paper, study the difficulty of the association rule mining task within a corporate privacy preserving framework. An attack model based on backdrop information and devises an idea for confidentiality preserve removal. It ensure that each altered item is the same with respect to the attackers backdrop information, from at smallest amount k1 other altered items. This paper will be efficient and keep confidentiality.

Authors and Affiliations

Mr. Haibat Jadhav

Keywords

Related Articles

 EVALUATION INDEX SYSTEM FOR PERFORMANCE EVALUATION OF ECOINDUSTRIAL THERMAL POWER PLANTS BY USING FUZZY DELPHI METHOD

 In order to promote the clean and sustainable production of coal resources, more and more eco-industrial thermal power plants (ETPPs) are established in China. Considering it is a burgeoning industry, the perf...

 Vehicle Number Plate Identification System (VNPIS)

 In rapidly developing countries, the number of vehicles has increased in accordance with the technology. The need to recognize the vehicles has increased in parallel th e number of the vehicles. Vehicle surveillan...

 MODIFIED AODV PROTOCOL FOR ENERGY EFFICIENT ROUTING IN MANET

 Mobile ad Hoc network is a collection of wireless mobile nodes that works without any fixed infrastructure. Mobile nodes in MANET are featured with limited battery power & performance of routing protocol degra...

 SUB -TRIDENT FORM THROUGH FUZZY SUB -TRIANGULAR FORM

 This paper deals with the new concept to find Shortest Path and the Optimum Solution with the help of Fuzzy Numbers. Here the Fuzzy Sub-Triangular Form is obtained from the Pascal’s Triangle Graded Mean along with...

Computer Virus : Open Problems

Computer viruses are very typical problem for society and this problem is quite typical to solve . There are various reasons due to which this special problem is not getting solved completely .In this paper we will ope...

Download PDF file
  • EP ID EP95583
  • DOI -
  • Views 66
  • Downloads 0

How To Cite

Mr. Haibat Jadhav (0).  A REVIEW PAPER ON ASSOCIATION RULES FOR PRIVACY-PRESERVING MINING FROM VARIOUS ENCRYPTION TECHNIQUES. International Journal of Engineering Sciences & Research Technology, 4(10), 596-600. https://europub.co.uk./articles/-A-95583