SlideShare a Scribd company logo
1 of 6
Download to read offline
Tania Banerjee et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 3( Version 5), March 2014, pp.52-57
www.ijera.com 52 | P a g e
Modified Approach for Hiding Sensitive Association Rules for
Preserving Privacy in Database
Tania Banerjee, Esha Panse, Vinay Singh, Prasanna Kharche
Department of Computer Engineering Dr. D.Y Patil College of Engineering, Ambi, Pune, India.
Abstract
Data mining is the process of analyzing large database to find useful patterns. The term pattern refers to the
items which are frequently occurring in set of transaction. The frequent patterns are used to find association
between sets of item. The efficiency of mining association rules and confidentiality of association rule is
becoming one of important area of knowledge discovery in database. This paper is organized into two sections.
In the system Apriori algorithm is being presented that efficiently generates association rules. These reduces
unnecessary database scan at time of forming frequent large item sets .We have tried to give contribution to
improved Apriori algorithm by hiding sensitive association rules which are generated by applying improved
Apriori algorithm on supermarket database. In this paper we have used novel approach that strategically
modifies few transactions in transaction database to decrease support and confidence of sensitive rule without
producing any side effects. Thus in the paper we have efficiently generated frequent item set sets by applying
Improved Apriori algorithm and generated association rules by applying minimum support and minimum
confidence and then we went one step further to identify sensitive rules and tried to hide them without any side
effects to maintain integrity of data without generating spurious rules.
KEYWORDS: Association rule, confidence, Data mining methods and Algorithm, Minimum Support
Threshold (MST), Minimum Confidence Threshold, (MCT), Rule hiding, Sensitive pattern, Sensitivity.
I. INTRODUCTION
Data mining is the process of analyzing
large database to find useful patterns. The term
pattern refers to the items which are frequently
occurring in set of transaction. The frequent patterns
are used to find association between sets of item.
Association rule mining technique is widely used in
data mining to find relationship between item sets.
The efficiency of mining association rules and
confidentiality of association rule is becoming one of
important area of knowledge discovery in data base.
However ,it breaks out many privacy issues. From a
general point of view, we may classify privacy issues
into two broad categories. The first is related to the
data perse and is known as data hiding, while the
second concerns the information ,or else the
knowledge, that a data mining method may discover
after having analyzed the data , and is known as
knowledge .Data hiding tries to remove confidential
or private information from the data before its
disclosure . It is an important aspect in improving
mining algorithm that deals with how to decrease
item sets candidate in order to generate frequent item
sets efficiently.
A. PROBLEM STATEMENT
The problem definition of our paper is
1. To hide sensitive rules without generating false
rule and display only non-sensitive rules
2. To maintain privacy in database
3. To use ISR and DSL together so as to reduce the
damage in database due to repeated sanitization.
Our paper also focuses towards making the
code more optimized and for mining association rule
we would use improved Apriori Algorithm given in
[2].
The structure of this paper is as follows:
Section II describes the literature survey and
theoretical data Section III includes MDSRRC
algorithm with some more Efficient modification in
detail with some Examples in detail Section IV
includes the comparison DSRRC over MDSRRC
Section V is conclusion
II. LITERATURE SURVEY AND
THEORETICAL DATA
Abbreviation
D Original database
D‟ Sanitized database
R Association rules generated from original
database
SR Sensitive association rules SR U R
MST Minimum support threshold
RESEARCH ARTICLE OPEN ACCESS
Tania Banerjee et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 3( Version 5), March 2014, pp.52-57
www.ijera.com 53 | P a g e
MCT Minimum confidence threshold
L.H.S Antecedent of an association rule
In [1], author proposed heuristic approach to
prevent disclosure of sensitive patterns. They have
mainly used two techniques : data distortion and data
blocking.[1] Data distortion is the process in
which it changes the value of an item by a new value
i.e decrease the confidence by altering „0‟ to „1‟ or
„1‟ to „0‟. [1]DATA Blocking instead of inserting or
deleting item from database it replaces „1‟ or „0‟ with
„?‟ in transaction.
Hiding sensitive rule is a subfield of privacy
preserving data mining. It is divided into two
categories- One is the preserving of data privacy, its
goal is to blur the sensitive data without changing
summary information .The other is the preserving of
information privacy, its goal is to hide the sensitive
information. A sampling approach makes a sample
database such that the sensitive rules cannot be
uncovered, while a modifying approach alters a few
parts of the database to decrease the supports or
confidences of the sensitive rules. Here, we adopt the
modifying approach since it can retain the original
data as much as possible. In the following, we focus
the discussions on hiding sensitive rule. Researcher
Atallah et al. refer to sensitive rule hiding as data
sanitization, which aims at hiding a set of sensitive
item sets, and prove that optimal sanitization is NP-
Hard. Moreover, a heuristic approach is proposed
using an item set graph to hide sensitive item sets in a
one-by-one fashion. Author Oliveira and Zaı¨ne
further address the efficiency and effectiveness
issues. They plug a transaction retrieval engine to the
hiding process and achieve a linear scalability in
terms of database size. On effectiveness, they
introduce three measures for hiding failures (sensitive
patterns that are not hidden), missing costs (non-
sensitive patterns falsely hidden), and artifactual
patterns (spurious patterns falsely generated). Since
these approaches only consider the decrease of
supports, they may fail to hide a rule if the rule can
be hidden only by decreasing the confidence.
Researcher Saygin et al. argue that both the insertion
and deletion of items will introduce false information
and make it hard to determine whether the rules
derived from the modified database can be trusted.
Therefore, they propose a modification scheme to
replace entries with unknowns. With this scheme, the
item set support is represented as a range from the
minimum support to the maximum support.
Similarly, the confidence of a rule, say X -> Y , is
also represented as a range from the minimum
confidence (the minimum support of X -> Y divided
by the maximum support of X) to the maximum
confidence (the maximum support of X -> Y divided
by the minimum support of X). By definition, a rule
X ->Y is hidden if its minimum confidence is below
MCT or the minimum support of X -> Y is below
MST. From our view, the uncertainty due to the
ranges on supports and confidences makes it hard to
determine whether the derived rules can be trusted.
Moreover, the side effects will be out of control since
they do not consider the correlation among rules in
their modification scheme. The work proposed by
author Verykios et al. in should be the most relevant
to our work. In that work, the authors propose five
algorithms for rule hiding, which are also based on
the decrease of supports and confidences. With their
assumption, their algorithms can hide one rule at a
time and decrease supports or confidences one unit at
a time. Moreover, since the authors aim at hiding all
sensitive rules instead of avoiding side effects, they
do not consider the correlation among rules in their
algorithms. Finally, to hide a rule, there can be a
large number of “candidate” entries to modify. The
“minimum impact” criterion used in the five
algorithms only focuses on minimizing the number of
modified entries. By contrast, in this system, we drop
the assumption and decide the modification schemes
and the entries to modify based on the correlation
among three kinds of rules. Thus we are using
APRIORI, MDSRRC, and ISR ,DSL n both by using
both the algorithm of isl and dsr we can save the data
base from get damage by constant sanitization.
Mining an association rule with support and
confidence is defined as follow: let I= {i1....iN } be
distinct literals called items. Given a database D=
{T1,...Tm} is a set of transaction where each
transaction T is a set of items as Ti C I (1≤i≤m). The
association rule is define as X→Y, where YCI, XCI
and Y∩X=Ø. X is called rule‟s antecedent (L.H.S)
and Y is called rule‟s consequent (R.H.S). The
support of rule X→Y is calculated using the
following formula: Support(X→Y) =|XUY|/|D|,
where |D| define the total number of the transactions
in the database D and |XUY| is the number of
transactions which support item set XY. The
confidence of rule is calculated using following
formula: Confidence (X→Y) = |XUY| / |X|, where |X|
is number of transactions which support item set X.
A rule X→Y is mined from database if support
(X→Y) ≥ MST (minimum support threshold) and
confidence (X→Y) ≥ MCT (minimum confidence
threshold).
Tania Banerjee et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 3( Version 5), March 2014, pp.52-57
www.ijera.com 54 | P a g e
Figure 1: flow diagram.
In the ISL, the short item set is chosen as
sacrifice item, because it has least item, negative
impact cause by modify it may be the smallest. Our
method first step is the same with ISL or DSR, then
check the mining result, in this step, using privacy
quantify to measure the result, if it's dissatisfied,
return to change the choose policy. check the whole
database, classify the items with their support, the
items with support more close to Min_sup as
"unsettled item sets" the other is "settled item sets",
when choose the sacrifice item, the item in "settled
item sets" will be chosen first.
III. THE MODIFIED ALGORITHM
The modified algorithm starts with mining
the association rule from the original database D
using association rule mining algorithm e.g. Apriori
algorithm [5]. Then user specifies some rules as
sensitive rules (SR) from the rules generated by the
association rule mining algorithm. Then algorithm
counts occurrences of each item in R.H.S of sensitive
rules. Now algorithm finds IS= {is0, is1… isk } k≤n,
by arranging those items in decreasing order of their
counts. After that sensitivity of each item is
calculated then sensitivity of each transaction is
calculated. Then transactions which support is0 are
sorted in descending order of their sensitivities. Now
rule hiding process starts by selecting first transaction
from the sorted transactions with higher sensitivity,
delete item is0 from that transaction. Then update
support and confidence of all sensitive rules and if
any rules have support and confidence below MST
and MCT respectively then delete it from SR. Then
update sensitivity of each item, transaction and IS.
Again select transaction with higher sensitivity and
delete is0 from it. This process continues until all
sensitive rules are hidden. As a result, modified
transactions are updated in the original database and
new database is generated which is called sanitized
database D‟, which preserves the privacy of sensitive
information and maintains database quality.
Proposed algorithm MDSRRC is shown
below, which is used to hide the sensitive rules from
database. Given a database D, MCT (minimum
confidence threshold) and MST (minimum support
threshold) algorithm generates sanitized database D‟.
Sanitized database hides all sensitive rules and
maintains data quality.
MDSRRC Algorithm
INPUT:
MCT (Minimum Confidence Threshold), Original
database D, MST (Minimum support threshold).
OUTPUT:
Database D‟ with all sensitive rules is
hidden.
1. Apply Apriori algorithm [3]
on given database D.
2. Generate all possible
association rules R
3. Select set of rules SR‫ؿ‬ R as
sensitive rules.
4. Calculate sensitivity of each
item j ‫א‬ D.
Calculate sensitivity of each
Transaction.
5. Count occurrences of each
item in R.H.S of sensitive
rules, find IS={is0, is1...isk}
k≤n, by arranging those items
in descending order of their
count. If two items have same
count then sort those in
descending order of their
actual support count
6. Select the transactions which
supports is0, then sort them in
descending order of their
sensitivity. If two transactions
have same sensitivity then sort
those in increasing order of
their length.
7. While(SR is not empty)
8. {
9. Start with first transaction
from sorted transactions,
10. Delete item is0 from that
transaction. 11. For each rule r
‫א‬ SR
11. {
13. Update support and
confidence of the rule r.
End
Tania Banerjee et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 3( Version 5), March 2014, pp.52-57
www.ijera.com 55 | P a g e
14. If(support of r < MST or
confidence of r < MCT)
15. {
16. Delete Rule r from SR.
17. Update sensitivity of
each item.
18. Update IS (This may
change is0).
19. Update the sensitivity of
each transaction
20. Select the transactions
which are supports is0,
21. Sort those in descending
order of their sensitivity.
22. }
23. Else
24. {
25. Take next transaction
from sorted transactions, go to step
10.
26. }
27. }
28. }
29. End
MDSRRC select best items so that
deleting those items hide maximum
rules from database to maintain
data quality.
Figure 2: MDSRRC algorithm in flow diagram.
Algorithm
ISL Input:
(1) a source database D,
(2) a min_support,
(3) a min_confidence,
(4) a set of predicting items X Output: a transformed
database D', where rules containing X on LHS will be
hidden
1. Find large I-item sets from D;
2. For each predicting item x Є X
3. If x is not a large I-item set, then X = X-{x};
4. If X is empty then EXIT; II no rule contains X in
LHS
5. Find large 2-item sets from D;
6. For each x Є X {
7. For each large 2-itemset containing x {
8. Compute confidence of rule U, where U is a rule
like x-y;
9. If conf{U} < min_con , then
10. Go to next large 2-itemset;
11. Else {Increase Support of LHS
12. Find T L = {t in Dlt does not support U};
13. Sort TL in ascending order by the number of
items;
14. While {conf(U ) '?:. min _ conf and TL is not
empty }{
15. Choose the first transaction t from TL;
16. Modify t to support x, the LHS(U );
17. Compute support and confidence of U;
18. Remove and save the first transaction t from TL;
19. }; II end While
20. }; II end if conf(U) < min_cmif
21. If TL is empty, then {
22. Cannot hide x-y;
23. Restore D;
24. Go to next large-2 itemset;
25. } II end if TL is empty
26. } II end of for each large 2-itemset
27. Remove x from X;
28. } II end of for each xE X
29. Output updated D, as the transformed D'
A. EXAMPLES
Example 1: Let a bag store that purchase luggage
bag from two companies, XYZ and PQR, and both
can access customers‟ database of the store. Now
XYZ applies data mining techniques and mines
association rules related to PQR‟s products. XYZ had
found that most of the customer who buy luggage bag
of the PQR also buy college bag. Now XYZ offers
some discount on college bag if customer purchases
XYZ‟s luggage bag. As result the business of PQR
goes down. So releasing the database with sensitive
information can cause the problem. This scenario
gives the direction to research on sensitive rules (or
knowledge) hiding in database.
Example 2:
Tania Banerjee et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 3( Version 5), March 2014, pp.52-57
www.ijera.com 56 | P a g e
The support of an association pattern is the
percentage of task-relevant data transactions for
which the pattern
is true.
Support(A => B) = # tuples containing both A and B
total # of tuples
Confidence is defined as the measure of
certainty or trustworthiness associated with each
discovered
pattern.
confidence (A=> B)= # tuples containing both A and B
# tuples containing A
Item
ID
Item Suport
I1 Tea 4/8
I2 Sugar 3/8
I3 Toothbrush 2/8
I4 Toothpaste 2/8
I5 Pen 1/8
I6 Refill 1/8
I7 Maggie 1/8
I8 Coffee 2/8
Id Item Support
I1 Tea 4/8
I2 Sugar 3/8
Min_sup = 37.5%(3/8)
IV. COMPARISON OF MDSRRC AND
DSRRC
Modified Decrease Support of R.H.S Item of
Rule Clusters (MDSRRC) is an improved version of
Decrease Support of R.H.S Item of Rule Clusters.
This algorithm selects the items and transactions
based on certain criteria which modify transactions to
hide the sensitive information. DSRRC could not
hide association rules with multiple items in
antecedent (L.H.S) and consequent (R.H.S). To
overcome this limitation, we have proposed an
algorithm MSDRRC which uses count of items in
consequent of the sensitive rules. MDSRRC modifies
the minimum number of transaction to hide
maximum sensitive rules and maintain data quality.
In the modified algorithm, we used heuristic
approaches for hiding the sensitive rules these
approaches are data distortion and data blocking. In
data distortion we changed the item value with a new
value, means it alter '0' to '1' or '1' to '0' for selected
items to decrease the confidence. In data blocking
instead of inserting or deleting items from the data
base it simply replaces '1' and '0' with '?' in selected
transactions.
After applying both Algorithms on sample
database we have done evaluation by considering the
performance parameters which are given in [13] viz.
(a) HF (hiding failure): It is the percentage of the
sensitive data that remain exposed in the sanitized
dataset. (b) MC (misses cost): It is the percentage of
the non-sensitive data that are hidden as a side- effect
of the sanitization process. (c) AP (artificial patterns):
It is the percentage of the discovered patterns that are
artifacts. (d) DISS (dissimilarity): It is the difference
between the original and the sanitized datasets. (e)
SEF (side effect factor): It is the amount of non-
sensitive association rules that are removed as an
effect of the sanitization process. Experimental
results show that MDSRRC increase efficiency and
reduce modification of transactions in database.
Performance comparison of MDSRRC with
algorithm DSRRC is given in Table VI.
Table VI. Performance result
Fig. 2. Performance Comparison between DSRRC,
MDSRRC
TID List of Items
1 Tea(I1),Sugar(I2),Toothbrush(I3),Toothpaste(I
4),Pen(I5),Refill(I6)
2 Toothbrush(I3),Toothpaste(I4)
3 Tea(I1),Sugar(I2),Maggie(I7)
4 Sugar(I2), Tea(I1),Coffee(I8)
5 Tea(I1), Coffee(I8)
Tania Banerjee et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 3( Version 5), March 2014, pp.52-57
www.ijera.com 57 | P a g e
V. CONCLUSION
We proposed an algorithm named MDSRRC
which hides sensitive association rules on data base
to maintain data quality. The algorithm MDSRRC is
an improved version of DSRRC .MDSRRC modifies
minimum no transaction to hide maximum sensitive
rules and improved data quality. We have used an
improved Apriori algorithm which is used in data
mining to extract data. The improved Apriori takes
less time for generating frequent item sets. In future
MDSRRC can be used further to increase the
efficiency and reduce the side effects by minimizing
modification on data base. In future the improved
Apriori algorithm will be more efficient to generate
strong rules while hiding the sensitive rules.
REFERENCES
[1] Nikunj H. Domadiya and Udai Pratap Rao,
“Hiding Sensitive Association Rules to
Maintain Privacy and Data Quality in
Database”3rd IEEE International Advance
Computing Conference (IACC) 2013.
[2] V. S. Verykios, A. K. Elmagarmid, E.
Bertino, Y. Saygin, and E. Dasseni,
“Association rule hiding,” IEEE
Transactions on Knowledge and Data
Engineering, vol. 16, pp. 434–447, 2004.
[3] C. N. Modi, U. P. Rao, and D. R. Patel,
“Maintaining privacy and data quality in
privacy preserving association rule mining,”
2010 Second International conference on
Computing, Communication and
Networking Technologies, pp. 1–6, Jul.
2010.
[4] J. Han, Data Mining: Concepts and
Techniques. San Francisco, CA, USA:
Morgan Kaufmann Publishers Inc., 2005
[5] Y.-H. Wu, C.-M. Chiang, and A. L. Chen,
“Hiding sensitive association rules with
limited side effects,” IEEE Transactions on
Knowledge and Data Engineering, vol. 19,
pp. 29–42, 2007.
[6] S.-L. Wang, B. Parikh, and A. Jafari,
“Hiding informative association rule sets,”
Expert Systems with Applications, vol. 33,
no. 2, pp. 316 – 323, 2007.
[7] S.-L.Wang, D. Patel, A. Jafari, and T.-P.
Hong, “Hiding collaborative
recommendation association rules,” Applied
Intelligence, vol. 27, pp. 67–77, 2007.
[8] D.F. Gleich and L.-H. Lim. Rank
aggregation via nuclear norm minimization.
In KDD, 2011.
[9] Y. Saygin, V. S. Verykios, and A. K.
Elmagarmid, “Privacy preserving
association rule mining.” in RIDE. IEEE
Computer Society, 2002, pp 151–158.
[10] C. N. Modi, U. P. Rao, and D. R. Patel, “An
Efficient Solution for Privacy Preserving
Association Rule Mining,” (IJCNS)
International Journal of Computer and
Network Security, vol. 2, no. 5, pp. 79–85,
2010.
[11] Wu and H. Wang, “Research on the privacy
preserving algorithm of association rule
mining in centralized database,” in
Proceedings of the 2008 International
Symposiums on Information Processing, ser.
ISIP‟08. Washington, DC, USA: IEEE
Computer Society, 2008, pp. 131–134
[12] V. Verykios and A. Gkoulalas-Divanis, A
Survey of Association Rule Hiding Methods
for Privacy, ser. Advances in Database
Systems, C. [13] M. Atallah, A.
Elmagarmid, M. Ibrahim, E. Bertino, and V.
Verykios, “Disclosure limitation of sensitive
rules,” in Proceedings of the 1999
Workshop on Knowledge and Data
Engineering Exchange, ser. KDEX ‟99.
Washington, DC, USA: IEEE Computer
Society, 1999, pp.

More Related Content

What's hot

A Survey on Features and Techniques Description for Privacy of Sensitive Info...
A Survey on Features and Techniques Description for Privacy of Sensitive Info...A Survey on Features and Techniques Description for Privacy of Sensitive Info...
A Survey on Features and Techniques Description for Privacy of Sensitive Info...IRJET Journal
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Performance Analysis of Hybrid Approach for Privacy Preserving in Data Mining
Performance Analysis of Hybrid Approach for Privacy Preserving in Data MiningPerformance Analysis of Hybrid Approach for Privacy Preserving in Data Mining
Performance Analysis of Hybrid Approach for Privacy Preserving in Data Miningidescitation
 
Using Randomized Response Techniques for Privacy-Preserving Data Mining
Using Randomized Response Techniques for Privacy-Preserving Data MiningUsing Randomized Response Techniques for Privacy-Preserving Data Mining
Using Randomized Response Techniques for Privacy-Preserving Data Mining14894
 
Analysis of Pattern Transformation Algorithms for Sensitive Knowledge Protect...
Analysis of Pattern Transformation Algorithms for Sensitive Knowledge Protect...Analysis of Pattern Transformation Algorithms for Sensitive Knowledge Protect...
Analysis of Pattern Transformation Algorithms for Sensitive Knowledge Protect...IOSR Journals
 
Classification on multi label dataset using rule mining technique
Classification on multi label dataset using rule mining techniqueClassification on multi label dataset using rule mining technique
Classification on multi label dataset using rule mining techniqueeSAT Publishing House
 
Top Down Approach to find Maximal Frequent Item Sets using Subset Creation
Top Down Approach to find Maximal Frequent Item Sets using Subset CreationTop Down Approach to find Maximal Frequent Item Sets using Subset Creation
Top Down Approach to find Maximal Frequent Item Sets using Subset Creationcscpconf
 
The Architecture of Cloud Storage Model Based On Confusion Theory
The Architecture of Cloud Storage Model Based On Confusion TheoryThe Architecture of Cloud Storage Model Based On Confusion Theory
The Architecture of Cloud Storage Model Based On Confusion Theoryinventionjournals
 
Enabling Use of Dynamic Anonymization for Enhanced Security in Cloud
Enabling Use of Dynamic Anonymization for Enhanced Security in CloudEnabling Use of Dynamic Anonymization for Enhanced Security in Cloud
Enabling Use of Dynamic Anonymization for Enhanced Security in CloudIOSR Journals
 
Postdiffset Algorithm in Rare Pattern: An Implementation via Benchmark Case S...
Postdiffset Algorithm in Rare Pattern: An Implementation via Benchmark Case S...Postdiffset Algorithm in Rare Pattern: An Implementation via Benchmark Case S...
Postdiffset Algorithm in Rare Pattern: An Implementation via Benchmark Case S...IJECEIAES
 
Privacy preservation techniques in data mining
Privacy preservation techniques in data miningPrivacy preservation techniques in data mining
Privacy preservation techniques in data miningeSAT Publishing House
 
CONFIGURING ASSOCIATIONS TO INCREASE TRUST IN PRODUCT PURCHASE
CONFIGURING ASSOCIATIONS TO INCREASE TRUST IN PRODUCT PURCHASECONFIGURING ASSOCIATIONS TO INCREASE TRUST IN PRODUCT PURCHASE
CONFIGURING ASSOCIATIONS TO INCREASE TRUST IN PRODUCT PURCHASEIJwest
 
Multiple Minimum Support Implementations with Dynamic Matrix Apriori Algorith...
Multiple Minimum Support Implementations with Dynamic Matrix Apriori Algorith...Multiple Minimum Support Implementations with Dynamic Matrix Apriori Algorith...
Multiple Minimum Support Implementations with Dynamic Matrix Apriori Algorith...ijsrd.com
 
IRJET- Improving the Performance of Smart Heterogeneous Big Data
IRJET- Improving the Performance of Smart Heterogeneous Big DataIRJET- Improving the Performance of Smart Heterogeneous Big Data
IRJET- Improving the Performance of Smart Heterogeneous Big DataIRJET Journal
 
A Novel Filtering based Scheme for Privacy Preserving Data Mining
A Novel Filtering based Scheme for Privacy Preserving Data MiningA Novel Filtering based Scheme for Privacy Preserving Data Mining
A Novel Filtering based Scheme for Privacy Preserving Data MiningIRJET Journal
 
Privacy Preservation and Restoration of Data Using Unrealized Data Sets
Privacy Preservation and Restoration of Data Using Unrealized Data SetsPrivacy Preservation and Restoration of Data Using Unrealized Data Sets
Privacy Preservation and Restoration of Data Using Unrealized Data SetsIJERA Editor
 

What's hot (17)

A Survey on Features and Techniques Description for Privacy of Sensitive Info...
A Survey on Features and Techniques Description for Privacy of Sensitive Info...A Survey on Features and Techniques Description for Privacy of Sensitive Info...
A Survey on Features and Techniques Description for Privacy of Sensitive Info...
 
Hu3414421448
Hu3414421448Hu3414421448
Hu3414421448
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Performance Analysis of Hybrid Approach for Privacy Preserving in Data Mining
Performance Analysis of Hybrid Approach for Privacy Preserving in Data MiningPerformance Analysis of Hybrid Approach for Privacy Preserving in Data Mining
Performance Analysis of Hybrid Approach for Privacy Preserving in Data Mining
 
Using Randomized Response Techniques for Privacy-Preserving Data Mining
Using Randomized Response Techniques for Privacy-Preserving Data MiningUsing Randomized Response Techniques for Privacy-Preserving Data Mining
Using Randomized Response Techniques for Privacy-Preserving Data Mining
 
Analysis of Pattern Transformation Algorithms for Sensitive Knowledge Protect...
Analysis of Pattern Transformation Algorithms for Sensitive Knowledge Protect...Analysis of Pattern Transformation Algorithms for Sensitive Knowledge Protect...
Analysis of Pattern Transformation Algorithms for Sensitive Knowledge Protect...
 
Classification on multi label dataset using rule mining technique
Classification on multi label dataset using rule mining techniqueClassification on multi label dataset using rule mining technique
Classification on multi label dataset using rule mining technique
 
Top Down Approach to find Maximal Frequent Item Sets using Subset Creation
Top Down Approach to find Maximal Frequent Item Sets using Subset CreationTop Down Approach to find Maximal Frequent Item Sets using Subset Creation
Top Down Approach to find Maximal Frequent Item Sets using Subset Creation
 
The Architecture of Cloud Storage Model Based On Confusion Theory
The Architecture of Cloud Storage Model Based On Confusion TheoryThe Architecture of Cloud Storage Model Based On Confusion Theory
The Architecture of Cloud Storage Model Based On Confusion Theory
 
Enabling Use of Dynamic Anonymization for Enhanced Security in Cloud
Enabling Use of Dynamic Anonymization for Enhanced Security in CloudEnabling Use of Dynamic Anonymization for Enhanced Security in Cloud
Enabling Use of Dynamic Anonymization for Enhanced Security in Cloud
 
Postdiffset Algorithm in Rare Pattern: An Implementation via Benchmark Case S...
Postdiffset Algorithm in Rare Pattern: An Implementation via Benchmark Case S...Postdiffset Algorithm in Rare Pattern: An Implementation via Benchmark Case S...
Postdiffset Algorithm in Rare Pattern: An Implementation via Benchmark Case S...
 
Privacy preservation techniques in data mining
Privacy preservation techniques in data miningPrivacy preservation techniques in data mining
Privacy preservation techniques in data mining
 
CONFIGURING ASSOCIATIONS TO INCREASE TRUST IN PRODUCT PURCHASE
CONFIGURING ASSOCIATIONS TO INCREASE TRUST IN PRODUCT PURCHASECONFIGURING ASSOCIATIONS TO INCREASE TRUST IN PRODUCT PURCHASE
CONFIGURING ASSOCIATIONS TO INCREASE TRUST IN PRODUCT PURCHASE
 
Multiple Minimum Support Implementations with Dynamic Matrix Apriori Algorith...
Multiple Minimum Support Implementations with Dynamic Matrix Apriori Algorith...Multiple Minimum Support Implementations with Dynamic Matrix Apriori Algorith...
Multiple Minimum Support Implementations with Dynamic Matrix Apriori Algorith...
 
IRJET- Improving the Performance of Smart Heterogeneous Big Data
IRJET- Improving the Performance of Smart Heterogeneous Big DataIRJET- Improving the Performance of Smart Heterogeneous Big Data
IRJET- Improving the Performance of Smart Heterogeneous Big Data
 
A Novel Filtering based Scheme for Privacy Preserving Data Mining
A Novel Filtering based Scheme for Privacy Preserving Data MiningA Novel Filtering based Scheme for Privacy Preserving Data Mining
A Novel Filtering based Scheme for Privacy Preserving Data Mining
 
Privacy Preservation and Restoration of Data Using Unrealized Data Sets
Privacy Preservation and Restoration of Data Using Unrealized Data SetsPrivacy Preservation and Restoration of Data Using Unrealized Data Sets
Privacy Preservation and Restoration of Data Using Unrealized Data Sets
 

Viewers also liked (20)

D43062127
D43062127D43062127
D43062127
 
Cm4301507513
Cm4301507513Cm4301507513
Cm4301507513
 
D43042025
D43042025D43042025
D43042025
 
Eo4301852855
Eo4301852855Eo4301852855
Eo4301852855
 
F43053237
F43053237F43053237
F43053237
 
El4301832837
El4301832837El4301832837
El4301832837
 
Ey4301913917
Ey4301913917Ey4301913917
Ey4301913917
 
Dg4301625635
Dg4301625635Dg4301625635
Dg4301625635
 
Cf4301466469
Cf4301466469Cf4301466469
Cf4301466469
 
Ew4301904907
Ew4301904907Ew4301904907
Ew4301904907
 
Cc4301455457
Cc4301455457Cc4301455457
Cc4301455457
 
Cj4301492497
Cj4301492497Cj4301492497
Cj4301492497
 
Fa4301925930
Fa4301925930Fa4301925930
Fa4301925930
 
D43021519
D43021519D43021519
D43021519
 
By4301435440
By4301435440By4301435440
By4301435440
 
F43022431
F43022431F43022431
F43022431
 
C43021014
C43021014C43021014
C43021014
 
J43025258
J43025258J43025258
J43025258
 
Lk3619561964
Lk3619561964Lk3619561964
Lk3619561964
 
Poliedros y cuerpos redondos
Poliedros y cuerpos redondosPoliedros y cuerpos redondos
Poliedros y cuerpos redondos
 

Similar to I43055257

Analysis and Implementation of Efficient Association Rules using K-mean and N...
Analysis and Implementation of Efficient Association Rules using K-mean and N...Analysis and Implementation of Efficient Association Rules using K-mean and N...
Analysis and Implementation of Efficient Association Rules using K-mean and N...IOSR Journals
 
Privacy Preserving Approaches for High Dimensional Data
Privacy Preserving Approaches for High Dimensional DataPrivacy Preserving Approaches for High Dimensional Data
Privacy Preserving Approaches for High Dimensional Dataijtsrd
 
A literature review of modern association rule mining techniques
A literature review of modern association rule mining techniquesA literature review of modern association rule mining techniques
A literature review of modern association rule mining techniquesijctet
 
SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...
SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...
SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...Editor IJMTER
 
Output Privacy Protection With Pattern-Based Heuristic Algorithm
Output Privacy Protection With Pattern-Based Heuristic AlgorithmOutput Privacy Protection With Pattern-Based Heuristic Algorithm
Output Privacy Protection With Pattern-Based Heuristic Algorithmijcsit
 
A SURVEY ON PRIVACY PRESERVING ASSOCIATION RULE MINING
A SURVEY ON PRIVACY PRESERVING ASSOCIATION RULE MININGA SURVEY ON PRIVACY PRESERVING ASSOCIATION RULE MINING
A SURVEY ON PRIVACY PRESERVING ASSOCIATION RULE MININGijdkp
 
Privacy Preserving Distributed Association Rule Mining Algorithm for Vertical...
Privacy Preserving Distributed Association Rule Mining Algorithm for Vertical...Privacy Preserving Distributed Association Rule Mining Algorithm for Vertical...
Privacy Preserving Distributed Association Rule Mining Algorithm for Vertical...IJCSIS Research Publications
 
Introduction To Multilevel Association Rule And Its Methods
Introduction To Multilevel Association Rule And Its MethodsIntroduction To Multilevel Association Rule And Its Methods
Introduction To Multilevel Association Rule And Its MethodsIJSRD
 
Paper id 212014126
Paper id 212014126Paper id 212014126
Paper id 212014126IJRAT
 
To allot secrecy-safe association rules mining schema using FP tree
To allot secrecy-safe association rules mining schema using FP treeTo allot secrecy-safe association rules mining schema using FP tree
To allot secrecy-safe association rules mining schema using FP treeUvaraj Shan
 
Hiding sensitive association_rule.pdf.
Hiding sensitive association_rule.pdf.Hiding sensitive association_rule.pdf.
Hiding sensitive association_rule.pdf.Dhyanendra Jain
 
Cluster Based Access Privilege Management Scheme for Databases
Cluster Based Access Privilege Management Scheme for DatabasesCluster Based Access Privilege Management Scheme for Databases
Cluster Based Access Privilege Management Scheme for DatabasesEditor IJMTER
 
Classification based on Positive and Negative Association Rules
Classification based on Positive and Negative Association RulesClassification based on Positive and Negative Association Rules
Classification based on Positive and Negative Association RulesWaqas Tariq
 
A Performance Based Transposition algorithm for Frequent Itemsets Generation
A Performance Based Transposition algorithm for Frequent Itemsets GenerationA Performance Based Transposition algorithm for Frequent Itemsets Generation
A Performance Based Transposition algorithm for Frequent Itemsets GenerationWaqas Tariq
 
Association Rule Hiding using Hash Tree
Association Rule Hiding using Hash TreeAssociation Rule Hiding using Hash Tree
Association Rule Hiding using Hash Treeijtsrd
 

Similar to I43055257 (20)

F04713641
F04713641F04713641
F04713641
 
Dy33753757
Dy33753757Dy33753757
Dy33753757
 
Analysis and Implementation of Efficient Association Rules using K-mean and N...
Analysis and Implementation of Efficient Association Rules using K-mean and N...Analysis and Implementation of Efficient Association Rules using K-mean and N...
Analysis and Implementation of Efficient Association Rules using K-mean and N...
 
Privacy Preserving Approaches for High Dimensional Data
Privacy Preserving Approaches for High Dimensional DataPrivacy Preserving Approaches for High Dimensional Data
Privacy Preserving Approaches for High Dimensional Data
 
A literature review of modern association rule mining techniques
A literature review of modern association rule mining techniquesA literature review of modern association rule mining techniques
A literature review of modern association rule mining techniques
 
SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...
SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...
SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...
 
Output Privacy Protection With Pattern-Based Heuristic Algorithm
Output Privacy Protection With Pattern-Based Heuristic AlgorithmOutput Privacy Protection With Pattern-Based Heuristic Algorithm
Output Privacy Protection With Pattern-Based Heuristic Algorithm
 
A SURVEY ON PRIVACY PRESERVING ASSOCIATION RULE MINING
A SURVEY ON PRIVACY PRESERVING ASSOCIATION RULE MININGA SURVEY ON PRIVACY PRESERVING ASSOCIATION RULE MINING
A SURVEY ON PRIVACY PRESERVING ASSOCIATION RULE MINING
 
K017167076
K017167076K017167076
K017167076
 
Privacy Preserving Distributed Association Rule Mining Algorithm for Vertical...
Privacy Preserving Distributed Association Rule Mining Algorithm for Vertical...Privacy Preserving Distributed Association Rule Mining Algorithm for Vertical...
Privacy Preserving Distributed Association Rule Mining Algorithm for Vertical...
 
Introduction To Multilevel Association Rule And Its Methods
Introduction To Multilevel Association Rule And Its MethodsIntroduction To Multilevel Association Rule And Its Methods
Introduction To Multilevel Association Rule And Its Methods
 
Paper id 212014126
Paper id 212014126Paper id 212014126
Paper id 212014126
 
To allot secrecy-safe association rules mining schema using FP tree
To allot secrecy-safe association rules mining schema using FP treeTo allot secrecy-safe association rules mining schema using FP tree
To allot secrecy-safe association rules mining schema using FP tree
 
Hiding sensitive association_rule.pdf.
Hiding sensitive association_rule.pdf.Hiding sensitive association_rule.pdf.
Hiding sensitive association_rule.pdf.
 
Cluster Based Access Privilege Management Scheme for Databases
Cluster Based Access Privilege Management Scheme for DatabasesCluster Based Access Privilege Management Scheme for Databases
Cluster Based Access Privilege Management Scheme for Databases
 
Hl2513421351
Hl2513421351Hl2513421351
Hl2513421351
 
Hl2513421351
Hl2513421351Hl2513421351
Hl2513421351
 
Classification based on Positive and Negative Association Rules
Classification based on Positive and Negative Association RulesClassification based on Positive and Negative Association Rules
Classification based on Positive and Negative Association Rules
 
A Performance Based Transposition algorithm for Frequent Itemsets Generation
A Performance Based Transposition algorithm for Frequent Itemsets GenerationA Performance Based Transposition algorithm for Frequent Itemsets Generation
A Performance Based Transposition algorithm for Frequent Itemsets Generation
 
Association Rule Hiding using Hash Tree
Association Rule Hiding using Hash TreeAssociation Rule Hiding using Hash Tree
Association Rule Hiding using Hash Tree
 

Recently uploaded

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 

Recently uploaded (20)

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 

I43055257

  • 1. Tania Banerjee et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 3( Version 5), March 2014, pp.52-57 www.ijera.com 52 | P a g e Modified Approach for Hiding Sensitive Association Rules for Preserving Privacy in Database Tania Banerjee, Esha Panse, Vinay Singh, Prasanna Kharche Department of Computer Engineering Dr. D.Y Patil College of Engineering, Ambi, Pune, India. Abstract Data mining is the process of analyzing large database to find useful patterns. The term pattern refers to the items which are frequently occurring in set of transaction. The frequent patterns are used to find association between sets of item. The efficiency of mining association rules and confidentiality of association rule is becoming one of important area of knowledge discovery in database. This paper is organized into two sections. In the system Apriori algorithm is being presented that efficiently generates association rules. These reduces unnecessary database scan at time of forming frequent large item sets .We have tried to give contribution to improved Apriori algorithm by hiding sensitive association rules which are generated by applying improved Apriori algorithm on supermarket database. In this paper we have used novel approach that strategically modifies few transactions in transaction database to decrease support and confidence of sensitive rule without producing any side effects. Thus in the paper we have efficiently generated frequent item set sets by applying Improved Apriori algorithm and generated association rules by applying minimum support and minimum confidence and then we went one step further to identify sensitive rules and tried to hide them without any side effects to maintain integrity of data without generating spurious rules. KEYWORDS: Association rule, confidence, Data mining methods and Algorithm, Minimum Support Threshold (MST), Minimum Confidence Threshold, (MCT), Rule hiding, Sensitive pattern, Sensitivity. I. INTRODUCTION Data mining is the process of analyzing large database to find useful patterns. The term pattern refers to the items which are frequently occurring in set of transaction. The frequent patterns are used to find association between sets of item. Association rule mining technique is widely used in data mining to find relationship between item sets. The efficiency of mining association rules and confidentiality of association rule is becoming one of important area of knowledge discovery in data base. However ,it breaks out many privacy issues. From a general point of view, we may classify privacy issues into two broad categories. The first is related to the data perse and is known as data hiding, while the second concerns the information ,or else the knowledge, that a data mining method may discover after having analyzed the data , and is known as knowledge .Data hiding tries to remove confidential or private information from the data before its disclosure . It is an important aspect in improving mining algorithm that deals with how to decrease item sets candidate in order to generate frequent item sets efficiently. A. PROBLEM STATEMENT The problem definition of our paper is 1. To hide sensitive rules without generating false rule and display only non-sensitive rules 2. To maintain privacy in database 3. To use ISR and DSL together so as to reduce the damage in database due to repeated sanitization. Our paper also focuses towards making the code more optimized and for mining association rule we would use improved Apriori Algorithm given in [2]. The structure of this paper is as follows: Section II describes the literature survey and theoretical data Section III includes MDSRRC algorithm with some more Efficient modification in detail with some Examples in detail Section IV includes the comparison DSRRC over MDSRRC Section V is conclusion II. LITERATURE SURVEY AND THEORETICAL DATA Abbreviation D Original database D‟ Sanitized database R Association rules generated from original database SR Sensitive association rules SR U R MST Minimum support threshold RESEARCH ARTICLE OPEN ACCESS
  • 2. Tania Banerjee et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 3( Version 5), March 2014, pp.52-57 www.ijera.com 53 | P a g e MCT Minimum confidence threshold L.H.S Antecedent of an association rule In [1], author proposed heuristic approach to prevent disclosure of sensitive patterns. They have mainly used two techniques : data distortion and data blocking.[1] Data distortion is the process in which it changes the value of an item by a new value i.e decrease the confidence by altering „0‟ to „1‟ or „1‟ to „0‟. [1]DATA Blocking instead of inserting or deleting item from database it replaces „1‟ or „0‟ with „?‟ in transaction. Hiding sensitive rule is a subfield of privacy preserving data mining. It is divided into two categories- One is the preserving of data privacy, its goal is to blur the sensitive data without changing summary information .The other is the preserving of information privacy, its goal is to hide the sensitive information. A sampling approach makes a sample database such that the sensitive rules cannot be uncovered, while a modifying approach alters a few parts of the database to decrease the supports or confidences of the sensitive rules. Here, we adopt the modifying approach since it can retain the original data as much as possible. In the following, we focus the discussions on hiding sensitive rule. Researcher Atallah et al. refer to sensitive rule hiding as data sanitization, which aims at hiding a set of sensitive item sets, and prove that optimal sanitization is NP- Hard. Moreover, a heuristic approach is proposed using an item set graph to hide sensitive item sets in a one-by-one fashion. Author Oliveira and Zaı¨ne further address the efficiency and effectiveness issues. They plug a transaction retrieval engine to the hiding process and achieve a linear scalability in terms of database size. On effectiveness, they introduce three measures for hiding failures (sensitive patterns that are not hidden), missing costs (non- sensitive patterns falsely hidden), and artifactual patterns (spurious patterns falsely generated). Since these approaches only consider the decrease of supports, they may fail to hide a rule if the rule can be hidden only by decreasing the confidence. Researcher Saygin et al. argue that both the insertion and deletion of items will introduce false information and make it hard to determine whether the rules derived from the modified database can be trusted. Therefore, they propose a modification scheme to replace entries with unknowns. With this scheme, the item set support is represented as a range from the minimum support to the maximum support. Similarly, the confidence of a rule, say X -> Y , is also represented as a range from the minimum confidence (the minimum support of X -> Y divided by the maximum support of X) to the maximum confidence (the maximum support of X -> Y divided by the minimum support of X). By definition, a rule X ->Y is hidden if its minimum confidence is below MCT or the minimum support of X -> Y is below MST. From our view, the uncertainty due to the ranges on supports and confidences makes it hard to determine whether the derived rules can be trusted. Moreover, the side effects will be out of control since they do not consider the correlation among rules in their modification scheme. The work proposed by author Verykios et al. in should be the most relevant to our work. In that work, the authors propose five algorithms for rule hiding, which are also based on the decrease of supports and confidences. With their assumption, their algorithms can hide one rule at a time and decrease supports or confidences one unit at a time. Moreover, since the authors aim at hiding all sensitive rules instead of avoiding side effects, they do not consider the correlation among rules in their algorithms. Finally, to hide a rule, there can be a large number of “candidate” entries to modify. The “minimum impact” criterion used in the five algorithms only focuses on minimizing the number of modified entries. By contrast, in this system, we drop the assumption and decide the modification schemes and the entries to modify based on the correlation among three kinds of rules. Thus we are using APRIORI, MDSRRC, and ISR ,DSL n both by using both the algorithm of isl and dsr we can save the data base from get damage by constant sanitization. Mining an association rule with support and confidence is defined as follow: let I= {i1....iN } be distinct literals called items. Given a database D= {T1,...Tm} is a set of transaction where each transaction T is a set of items as Ti C I (1≤i≤m). The association rule is define as X→Y, where YCI, XCI and Y∩X=Ø. X is called rule‟s antecedent (L.H.S) and Y is called rule‟s consequent (R.H.S). The support of rule X→Y is calculated using the following formula: Support(X→Y) =|XUY|/|D|, where |D| define the total number of the transactions in the database D and |XUY| is the number of transactions which support item set XY. The confidence of rule is calculated using following formula: Confidence (X→Y) = |XUY| / |X|, where |X| is number of transactions which support item set X. A rule X→Y is mined from database if support (X→Y) ≥ MST (minimum support threshold) and confidence (X→Y) ≥ MCT (minimum confidence threshold).
  • 3. Tania Banerjee et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 3( Version 5), March 2014, pp.52-57 www.ijera.com 54 | P a g e Figure 1: flow diagram. In the ISL, the short item set is chosen as sacrifice item, because it has least item, negative impact cause by modify it may be the smallest. Our method first step is the same with ISL or DSR, then check the mining result, in this step, using privacy quantify to measure the result, if it's dissatisfied, return to change the choose policy. check the whole database, classify the items with their support, the items with support more close to Min_sup as "unsettled item sets" the other is "settled item sets", when choose the sacrifice item, the item in "settled item sets" will be chosen first. III. THE MODIFIED ALGORITHM The modified algorithm starts with mining the association rule from the original database D using association rule mining algorithm e.g. Apriori algorithm [5]. Then user specifies some rules as sensitive rules (SR) from the rules generated by the association rule mining algorithm. Then algorithm counts occurrences of each item in R.H.S of sensitive rules. Now algorithm finds IS= {is0, is1… isk } k≤n, by arranging those items in decreasing order of their counts. After that sensitivity of each item is calculated then sensitivity of each transaction is calculated. Then transactions which support is0 are sorted in descending order of their sensitivities. Now rule hiding process starts by selecting first transaction from the sorted transactions with higher sensitivity, delete item is0 from that transaction. Then update support and confidence of all sensitive rules and if any rules have support and confidence below MST and MCT respectively then delete it from SR. Then update sensitivity of each item, transaction and IS. Again select transaction with higher sensitivity and delete is0 from it. This process continues until all sensitive rules are hidden. As a result, modified transactions are updated in the original database and new database is generated which is called sanitized database D‟, which preserves the privacy of sensitive information and maintains database quality. Proposed algorithm MDSRRC is shown below, which is used to hide the sensitive rules from database. Given a database D, MCT (minimum confidence threshold) and MST (minimum support threshold) algorithm generates sanitized database D‟. Sanitized database hides all sensitive rules and maintains data quality. MDSRRC Algorithm INPUT: MCT (Minimum Confidence Threshold), Original database D, MST (Minimum support threshold). OUTPUT: Database D‟ with all sensitive rules is hidden. 1. Apply Apriori algorithm [3] on given database D. 2. Generate all possible association rules R 3. Select set of rules SR‫ؿ‬ R as sensitive rules. 4. Calculate sensitivity of each item j ‫א‬ D. Calculate sensitivity of each Transaction. 5. Count occurrences of each item in R.H.S of sensitive rules, find IS={is0, is1...isk} k≤n, by arranging those items in descending order of their count. If two items have same count then sort those in descending order of their actual support count 6. Select the transactions which supports is0, then sort them in descending order of their sensitivity. If two transactions have same sensitivity then sort those in increasing order of their length. 7. While(SR is not empty) 8. { 9. Start with first transaction from sorted transactions, 10. Delete item is0 from that transaction. 11. For each rule r ‫א‬ SR 11. { 13. Update support and confidence of the rule r. End
  • 4. Tania Banerjee et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 3( Version 5), March 2014, pp.52-57 www.ijera.com 55 | P a g e 14. If(support of r < MST or confidence of r < MCT) 15. { 16. Delete Rule r from SR. 17. Update sensitivity of each item. 18. Update IS (This may change is0). 19. Update the sensitivity of each transaction 20. Select the transactions which are supports is0, 21. Sort those in descending order of their sensitivity. 22. } 23. Else 24. { 25. Take next transaction from sorted transactions, go to step 10. 26. } 27. } 28. } 29. End MDSRRC select best items so that deleting those items hide maximum rules from database to maintain data quality. Figure 2: MDSRRC algorithm in flow diagram. Algorithm ISL Input: (1) a source database D, (2) a min_support, (3) a min_confidence, (4) a set of predicting items X Output: a transformed database D', where rules containing X on LHS will be hidden 1. Find large I-item sets from D; 2. For each predicting item x Є X 3. If x is not a large I-item set, then X = X-{x}; 4. If X is empty then EXIT; II no rule contains X in LHS 5. Find large 2-item sets from D; 6. For each x Є X { 7. For each large 2-itemset containing x { 8. Compute confidence of rule U, where U is a rule like x-y; 9. If conf{U} < min_con , then 10. Go to next large 2-itemset; 11. Else {Increase Support of LHS 12. Find T L = {t in Dlt does not support U}; 13. Sort TL in ascending order by the number of items; 14. While {conf(U ) '?:. min _ conf and TL is not empty }{ 15. Choose the first transaction t from TL; 16. Modify t to support x, the LHS(U ); 17. Compute support and confidence of U; 18. Remove and save the first transaction t from TL; 19. }; II end While 20. }; II end if conf(U) < min_cmif 21. If TL is empty, then { 22. Cannot hide x-y; 23. Restore D; 24. Go to next large-2 itemset; 25. } II end if TL is empty 26. } II end of for each large 2-itemset 27. Remove x from X; 28. } II end of for each xE X 29. Output updated D, as the transformed D' A. EXAMPLES Example 1: Let a bag store that purchase luggage bag from two companies, XYZ and PQR, and both can access customers‟ database of the store. Now XYZ applies data mining techniques and mines association rules related to PQR‟s products. XYZ had found that most of the customer who buy luggage bag of the PQR also buy college bag. Now XYZ offers some discount on college bag if customer purchases XYZ‟s luggage bag. As result the business of PQR goes down. So releasing the database with sensitive information can cause the problem. This scenario gives the direction to research on sensitive rules (or knowledge) hiding in database. Example 2:
  • 5. Tania Banerjee et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 3( Version 5), March 2014, pp.52-57 www.ijera.com 56 | P a g e The support of an association pattern is the percentage of task-relevant data transactions for which the pattern is true. Support(A => B) = # tuples containing both A and B total # of tuples Confidence is defined as the measure of certainty or trustworthiness associated with each discovered pattern. confidence (A=> B)= # tuples containing both A and B # tuples containing A Item ID Item Suport I1 Tea 4/8 I2 Sugar 3/8 I3 Toothbrush 2/8 I4 Toothpaste 2/8 I5 Pen 1/8 I6 Refill 1/8 I7 Maggie 1/8 I8 Coffee 2/8 Id Item Support I1 Tea 4/8 I2 Sugar 3/8 Min_sup = 37.5%(3/8) IV. COMPARISON OF MDSRRC AND DSRRC Modified Decrease Support of R.H.S Item of Rule Clusters (MDSRRC) is an improved version of Decrease Support of R.H.S Item of Rule Clusters. This algorithm selects the items and transactions based on certain criteria which modify transactions to hide the sensitive information. DSRRC could not hide association rules with multiple items in antecedent (L.H.S) and consequent (R.H.S). To overcome this limitation, we have proposed an algorithm MSDRRC which uses count of items in consequent of the sensitive rules. MDSRRC modifies the minimum number of transaction to hide maximum sensitive rules and maintain data quality. In the modified algorithm, we used heuristic approaches for hiding the sensitive rules these approaches are data distortion and data blocking. In data distortion we changed the item value with a new value, means it alter '0' to '1' or '1' to '0' for selected items to decrease the confidence. In data blocking instead of inserting or deleting items from the data base it simply replaces '1' and '0' with '?' in selected transactions. After applying both Algorithms on sample database we have done evaluation by considering the performance parameters which are given in [13] viz. (a) HF (hiding failure): It is the percentage of the sensitive data that remain exposed in the sanitized dataset. (b) MC (misses cost): It is the percentage of the non-sensitive data that are hidden as a side- effect of the sanitization process. (c) AP (artificial patterns): It is the percentage of the discovered patterns that are artifacts. (d) DISS (dissimilarity): It is the difference between the original and the sanitized datasets. (e) SEF (side effect factor): It is the amount of non- sensitive association rules that are removed as an effect of the sanitization process. Experimental results show that MDSRRC increase efficiency and reduce modification of transactions in database. Performance comparison of MDSRRC with algorithm DSRRC is given in Table VI. Table VI. Performance result Fig. 2. Performance Comparison between DSRRC, MDSRRC TID List of Items 1 Tea(I1),Sugar(I2),Toothbrush(I3),Toothpaste(I 4),Pen(I5),Refill(I6) 2 Toothbrush(I3),Toothpaste(I4) 3 Tea(I1),Sugar(I2),Maggie(I7) 4 Sugar(I2), Tea(I1),Coffee(I8) 5 Tea(I1), Coffee(I8)
  • 6. Tania Banerjee et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 3( Version 5), March 2014, pp.52-57 www.ijera.com 57 | P a g e V. CONCLUSION We proposed an algorithm named MDSRRC which hides sensitive association rules on data base to maintain data quality. The algorithm MDSRRC is an improved version of DSRRC .MDSRRC modifies minimum no transaction to hide maximum sensitive rules and improved data quality. We have used an improved Apriori algorithm which is used in data mining to extract data. The improved Apriori takes less time for generating frequent item sets. In future MDSRRC can be used further to increase the efficiency and reduce the side effects by minimizing modification on data base. In future the improved Apriori algorithm will be more efficient to generate strong rules while hiding the sensitive rules. REFERENCES [1] Nikunj H. Domadiya and Udai Pratap Rao, “Hiding Sensitive Association Rules to Maintain Privacy and Data Quality in Database”3rd IEEE International Advance Computing Conference (IACC) 2013. [2] V. S. Verykios, A. K. Elmagarmid, E. Bertino, Y. Saygin, and E. Dasseni, “Association rule hiding,” IEEE Transactions on Knowledge and Data Engineering, vol. 16, pp. 434–447, 2004. [3] C. N. Modi, U. P. Rao, and D. R. Patel, “Maintaining privacy and data quality in privacy preserving association rule mining,” 2010 Second International conference on Computing, Communication and Networking Technologies, pp. 1–6, Jul. 2010. [4] J. Han, Data Mining: Concepts and Techniques. San Francisco, CA, USA: Morgan Kaufmann Publishers Inc., 2005 [5] Y.-H. Wu, C.-M. Chiang, and A. L. Chen, “Hiding sensitive association rules with limited side effects,” IEEE Transactions on Knowledge and Data Engineering, vol. 19, pp. 29–42, 2007. [6] S.-L. Wang, B. Parikh, and A. Jafari, “Hiding informative association rule sets,” Expert Systems with Applications, vol. 33, no. 2, pp. 316 – 323, 2007. [7] S.-L.Wang, D. Patel, A. Jafari, and T.-P. Hong, “Hiding collaborative recommendation association rules,” Applied Intelligence, vol. 27, pp. 67–77, 2007. [8] D.F. Gleich and L.-H. Lim. Rank aggregation via nuclear norm minimization. In KDD, 2011. [9] Y. Saygin, V. S. Verykios, and A. K. Elmagarmid, “Privacy preserving association rule mining.” in RIDE. IEEE Computer Society, 2002, pp 151–158. [10] C. N. Modi, U. P. Rao, and D. R. Patel, “An Efficient Solution for Privacy Preserving Association Rule Mining,” (IJCNS) International Journal of Computer and Network Security, vol. 2, no. 5, pp. 79–85, 2010. [11] Wu and H. Wang, “Research on the privacy preserving algorithm of association rule mining in centralized database,” in Proceedings of the 2008 International Symposiums on Information Processing, ser. ISIP‟08. Washington, DC, USA: IEEE Computer Society, 2008, pp. 131–134 [12] V. Verykios and A. Gkoulalas-Divanis, A Survey of Association Rule Hiding Methods for Privacy, ser. Advances in Database Systems, C. [13] M. Atallah, A. Elmagarmid, M. Ibrahim, E. Bertino, and V. Verykios, “Disclosure limitation of sensitive rules,” in Proceedings of the 1999 Workshop on Knowledge and Data Engineering Exchange, ser. KDEX ‟99. Washington, DC, USA: IEEE Computer Society, 1999, pp.