SlideShare a Scribd company logo
1 of 3
Download to read offline
IJSRD - International Journal for Scientific Research & Development| Vol. 2, Issue 09, 2014 | ISSN (online): 2321-0613
All rights reserved by www.ijsrd.com 356
An Enhanced Approach of Sensitive Information Hiding
Kaushal Bhatt1
Ankit Dongre2
1
P.G. Scholar 2
Assistant Professor
1,2
JIT, Borawan, Khargone (M.P)
Abstract— Organizations involving in similar businesses
often share their databases to find out useful business logics.
The process of finding is called data mining. But serious
concern occur when the database, shared by organization
contain some sensitive information and organization what to
hide this information before sharing the database. Then the
concept of privacy preserving data mining is comes in spot
light where the sensitive information is hide in a such a way
that database does not lost its integrity and business logics
derived from this databases does not contain sensitive
information. In this research we introduce new technique
for privacy preserving data mining, which hides sensitive
information effectively as compared to previous research
work.
Key words: PPDM, Hybrid algorithm, Sensitive
information, Association rules
I. INTRODUCTION
Association rules are in the form of A ‐> B where A,B are
subset of I are the sets of items called Item sets and A ∩B =
Φ. Association rules show attributes value conditions that
appear frequently together in a transaction data base. A
mostly example are used of association rule data mining is
Market Basket Analysis [2]. The set of items is‐ I = {Milk,
Bread, Butter} A rule derived from the shopping market
database could be {Butter, Bread} => {Milk} meaning that
if butter and bread are bought, customers also buy milk.
Association rules [4, 2] provide information on the basis of
“if then” statements. These rules are computed from the data
and, unlike the “if then” rules of logic, the association rules
are probabilistic. If 90% of transactions that purchase bread
and butter, then also purchase milk.
 Antecedent: bread and butter
 Consequent: milk
 Confidence factor: 90%
In addition to the antecedent (the “if” part) and the
consequent (the “then” part), an association rule has two
numbers that express the degree of uncertainty about the
rule. Associations rule analysis the collection of antecedent
and consequent are sets of items (called item sets) that are
also known as disjoint. It means that they do not have any
item in Common. Support for an association rule X‐>Y is
the percentage of transaction in database
That contains X U Y. The second big parameter is
called the Confidence of the rule. Strength for an
association rule X U Y is the ratio of number of transactions
that contains X U Y to number of transaction that contains
X.
Support A=>B Common item in any giving table / Total no
transaction in any table
Confidence A=>B Total Support in Number (A U B) / Total
support in Number (A)
Association Rule Hiding
The problem of association rule hiding was first
probed in 1999.After that, many
Approaches were proposed. They are categorized
as ‐ data sanitization data modification approaches and
knowledge sanitization data reconstruction approaches. The
data modification approaches [7,10] are also the so‐called
data sanitization. They generally hide sensitive association
rules by directly modifying sanitizing the original data D, to
the database D’ directly from D. As the sanitization is
performed on data level, data modification approaches
cannot control the hiding effects intuitively. Moreover, it is
found that the data sanitization can produce a lot of I/O
operations [6,9].
II. RELATED WORK
Many researchers proposed research on association rule
hiding, due to vast concern about privacy of data. In 2008
belwal [1] introduce modified definition of support and
confidence in their research by introducing hiding counter
which is used to reduce the confidence and support of
association rule below minimum threshold. The ISL
(increase support at left hand side) algorithm [] and DSR
(Decrease Support at Right hand side) is achieved through
modify the database table from 1 to 0 or from 0 to 1 in a
selected transaction. The hybrid approach of association rule
hiding suggested by research [ ] in order to hide an
association rule, either decrease its support or its Confidence
to be below than pre-specified minimum support and
minimum confidence threshold . this method utilize the both
ISL and DSR approaches of privacy preserving data mining
This algorithm first tries to hide the rules in which item to
be hidden i.e. A is in right hand side and then tries to hide
the rules in which A is in left hand side. For this algorithm t
is a transaction, T is a set of transactions, AR is used for
rule, RHS(AR) is Right Hand Side of rule AR, LHS(AR) is
the right hand side of the rule AR, Confidence(C) is the
confidence of the rule AR.
III. PROPOSED WORK
A. Algorithm:-
1) Input:
 A source database Do,
 A minimum confidence threshold value
min_confidence,
 A set of hidden items Xh.
B. Procedure:
1) Find all possible rules from given items Xh;
2) Compute confidence of all the rules.
3) For each hidden item H
4) For each rule AR in which H is in RHS
 If confidence (C) < min_confidence, then Go to
next large 2-itemset;
 Else go to step 5
5) Decrease Confidence of RHS i.e. item h.
 Find T = t in D | t ;
 While (T is not empty)
An Enhanced Approach of Sensitive Information Hiding
(IJSRD/Vol. 2/Issue 09/2014/080)
All rights reserved by www.ijsrd.com 357
 Choose the first transaction t from T;
 Modify t by putting 0 instead of 1 for RHS item;
 Remove and save the first transaction t from T;
End While
6) Compute confidence of AR;
7) If T is empty, then H cannot be hidden;
 End For
 End
C. Output:
Updated DO, as the transformed DM
Diagram [3.1] Working Model of Algorithm
IV. IMPLEMENTATION
To hide any sensitive item X algorithm works on the basis
of confidence (X → Y) or support (X → Y). To hide any
sensitive item in rule X → Y, this algorithm first finds the
value of confidence (conf) in the available set of rules if the
confidence value is above the user specific minimum
confidence level , then algorithm modify the database in
such a way that, after calculating the confidence from
modified database rules containing sensitive item either on
left or right side always have confidence value below than
user specific confidence value.
Dataset: Suppose our transactional database is as
follow-
Tid Milk Butter Bread
T1 1 1 1
T2 1 1 1
T3 1 1 1
T4 1 1 0
T5 1 0 0
T6 1 0 1
Table [4.1] Transaction Table
L R C
Milk Butter 67
Butter Bread 75
Bread Butter 75
Milk Bread 100
Bread Milk 67
Butter Milk 100
Table [4.2] Calculated confidence table
A. Suppose Minimum threshold value of confidence is 60%
Suppose we first want to hide item Milk, for this, first take
rules in which Milk is in RHS. These rules are Butter–>Milk
and Bread–>Milk and both have greater confidence. Choose
Butter–>Milk and search all transactions where Milk and
Butter is equal to 1.There are four transactions T1, T2, T3,
T4 with Milk = Butter = 1. Put 0 for item Milk in all the four
transactions. After this modification, we get Table 1 as the
modified table.
Tid Milk Butter Bread
T1 0 1 1
T2 0 1 1
T3 0 1 1
T4 0 1 0
T5 1 0 0
T6 1 0 1
Table [4.3] Modified table1
Now calculate confidence of Butter–>Milk, it is
0% which is less than minimum confidence so now this rule
is hidden. Now take rule Bread–>Milk, search for
transactions in table 1 where Milk and Bread is equal to 1,
only transaction T6 has Milk= Bread = 1, update transaction
by putting 0 instead of 1 in place of Milk. Now calculate
confidence of Bread–>Milk, it is 0% which is less than the
minimum confidence so now this rule is hidden. After this
modification, we again check the table 1 and it clearly
shows that in T6 Milk value is changed to 0.
Tid Milk Butter Bread
T1 0 1 1
T2 0 1 1
T3 0 1 1
T4 0 1 0
T5 1 0 0
T6 0 0 1
Table [4.4] Modified table 1
After that we again calculated confidence from
modified transaction table.
L R C
Milk Butter 0
Butter Bread 75
Bread Butter 75
Milk Bread 0
Bread Milk 0
Butter Milk 0
Table [4.5] Modified confidence table derived from table 4
We clearly see that association rules having
sensitive information either on left hand side or right hand
side having confidence below minimum confidence value
which is 60%.
Result set:- Our proposed technique scan database
less as compared to hybrid algorithm that scan data item
first for right hand side and modify table and again left hand
side for the same. Which we consider unnecessary scan
because after first modification the database having value of
sensitive information is 0 Below we show graphical
comparison between proposed algorithm and hybrid
algorithm.
Chart [4.1] Comparison in terms of database scan and rule
hidden
An Enhanced Approach of Sensitive Information Hiding
(IJSRD/Vol. 2/Issue 09/2014/080)
All rights reserved by www.ijsrd.com 358
Chart [4.2] Number of Rules v/s Time
V. CONCLUSION
In this research, we have proposed an algorithm for hiding
sensitive data in association rules mining which based on
modifying the database transactions so that the confidence
of the association rules can be reduced. The efficiency of the
proposed approach is further compared with Hybrid
approach and shown that this approach prunes more number
of hidden rules with less number of times database scanned.
REFERENCES
[1] Ila Chandrakar, Manasa, Usha Rani, and Renuka.
Hybrid Algorithm for Association Rule mining.
Journal of Computer Science 6(12), pages 1494‐
1498, 2010.
[2] A. K. Pujari. Data Mining Techniques (book),
2001. University Press (India) limited.
[3] Poovammal, E. and M. Ponnavaikko, 2009. Utility
independent privacy preserving data mining on
vertically partitioned data. J. Comput. Sci., 9: 666-
673. DOI: 10.3844/jcssp.2009.666.673
[4] Agrawal, R. and R. Srikant, 1998. Fast Algorithms
for Mining Association Rules. In: Readings in
Database Systems, Stonebraker, M. and J.
Hellerstein (Eds.). Morgan Kaufmann,
Massachusetts, ISBN: 1558605231, pp: 580-592
[5] Belwal, Varsheney, Khan, Sharma, Bhattacharya.
Hiding sensitive association rules efficiently by
introducing new variable hiding counter .IEEE
2008.
[6] Agrawal, R., and Srikant (2007), Privacy
Preserving Data Mining‟, Proceedings of the 19th
ACM International Conference on Knowledge
Discovery and Data Mining, Canada, pp. 439-450.
[7] Bhatt, Kaushal, and Ankit Dongre. "A Survey of
Sensitive Information Hiding Techniques."
IJETAE-volume-4 , issue -1.
[8] R. Agrawal, T. Imielinski, and A. Swami. Mining
association rules between sets of items in large
databases. In Proceedings of the ACM SIGMOD
Conference on Management of Data,pages 207–
216, New York, NY, USA, May 1993. ACM Press.
[9] Aris Gkoulalas–Divanis;Vassilios S. Verykios
―Association Rule Hiding For Data Mining‖
Springer, DOI 10.1007/978-1-4419-6569-1,
Springer Science + Business Media, LLC 2010
[10]E. Dasseni, V. S. Verykios, A. K. Elmagarmid, and
E. Bertino. Hiding association rules by using
confidence and support. In I. S. Moskowitz, editor,
Proceedings of the 4th Information Hiding
Workshop, volume 2137, pages 369–383, 2001.
Springer Veralg Lecture Notes.

More Related Content

What's hot

Association rule Mining
Association rule MiningAssociation rule Mining
Association rule Miningafsana40
 
Market Basket Analysis
Market Basket AnalysisMarket Basket Analysis
Market Basket AnalysisSandeep Prasad
 
1.10.association mining 2
1.10.association mining 21.10.association mining 2
1.10.association mining 2Krish_ver2
 
A Performance Based Transposition algorithm for Frequent Itemsets Generation
A Performance Based Transposition algorithm for Frequent Itemsets GenerationA Performance Based Transposition algorithm for Frequent Itemsets Generation
A Performance Based Transposition algorithm for Frequent Itemsets GenerationWaqas Tariq
 
A Novel preprocessing Algorithm for Frequent Pattern Mining in Multidatasets
A Novel preprocessing Algorithm for Frequent Pattern Mining in MultidatasetsA Novel preprocessing Algorithm for Frequent Pattern Mining in Multidatasets
A Novel preprocessing Algorithm for Frequent Pattern Mining in MultidatasetsWaqas Tariq
 
Association 04.03.14
Association   04.03.14Association   04.03.14
Association 04.03.14rahulmath80
 
SELECTED DATA PREPARATION METHODS
SELECTED DATA PREPARATION METHODSSELECTED DATA PREPARATION METHODS
SELECTED DATA PREPARATION METHODSKAMIL MAJEED
 
Pattern Discovery Using Apriori and Ch-Search Algorithm
 Pattern Discovery Using Apriori and Ch-Search Algorithm Pattern Discovery Using Apriori and Ch-Search Algorithm
Pattern Discovery Using Apriori and Ch-Search Algorithmijceronline
 

What's hot (10)

Association rule Mining
Association rule MiningAssociation rule Mining
Association rule Mining
 
G0364347
G0364347G0364347
G0364347
 
Intake 37 DM
Intake 37 DMIntake 37 DM
Intake 37 DM
 
Market Basket Analysis
Market Basket AnalysisMarket Basket Analysis
Market Basket Analysis
 
1.10.association mining 2
1.10.association mining 21.10.association mining 2
1.10.association mining 2
 
A Performance Based Transposition algorithm for Frequent Itemsets Generation
A Performance Based Transposition algorithm for Frequent Itemsets GenerationA Performance Based Transposition algorithm for Frequent Itemsets Generation
A Performance Based Transposition algorithm for Frequent Itemsets Generation
 
A Novel preprocessing Algorithm for Frequent Pattern Mining in Multidatasets
A Novel preprocessing Algorithm for Frequent Pattern Mining in MultidatasetsA Novel preprocessing Algorithm for Frequent Pattern Mining in Multidatasets
A Novel preprocessing Algorithm for Frequent Pattern Mining in Multidatasets
 
Association 04.03.14
Association   04.03.14Association   04.03.14
Association 04.03.14
 
SELECTED DATA PREPARATION METHODS
SELECTED DATA PREPARATION METHODSSELECTED DATA PREPARATION METHODS
SELECTED DATA PREPARATION METHODS
 
Pattern Discovery Using Apriori and Ch-Search Algorithm
 Pattern Discovery Using Apriori and Ch-Search Algorithm Pattern Discovery Using Apriori and Ch-Search Algorithm
Pattern Discovery Using Apriori and Ch-Search Algorithm
 

Viewers also liked

ENERGY APPLICATION IN NANO TECHNOLOGY
ENERGY APPLICATION IN NANO TECHNOLOGYENERGY APPLICATION IN NANO TECHNOLOGY
ENERGY APPLICATION IN NANO TECHNOLOGYijsrd.com
 
A Survey on Opinion Mining and its Challenges
A Survey on Opinion Mining and its ChallengesA Survey on Opinion Mining and its Challenges
A Survey on Opinion Mining and its Challengesijsrd.com
 
An Analysis of Surface Roughness Improvement of 3D Printed Material
An Analysis of Surface Roughness Improvement of 3D Printed MaterialAn Analysis of Surface Roughness Improvement of 3D Printed Material
An Analysis of Surface Roughness Improvement of 3D Printed Materialijsrd.com
 
Comparison Between High Utility Frequent Item sets Mining Techniques
Comparison Between High Utility Frequent Item sets Mining TechniquesComparison Between High Utility Frequent Item sets Mining Techniques
Comparison Between High Utility Frequent Item sets Mining Techniquesijsrd.com
 
TRI-BAND MICROSTRIP PATCH ANTENNA FOR S-BAND NANO SATELLITE APPLICATION USING...
TRI-BAND MICROSTRIP PATCH ANTENNA FOR S-BAND NANO SATELLITE APPLICATION USING...TRI-BAND MICROSTRIP PATCH ANTENNA FOR S-BAND NANO SATELLITE APPLICATION USING...
TRI-BAND MICROSTRIP PATCH ANTENNA FOR S-BAND NANO SATELLITE APPLICATION USING...ijsrd.com
 
KICKBACK NOISE ANALYSIS OF LOW POWER COMPARATOR
KICKBACK NOISE ANALYSIS OF LOW POWER COMPARATORKICKBACK NOISE ANALYSIS OF LOW POWER COMPARATOR
KICKBACK NOISE ANALYSIS OF LOW POWER COMPARATORijsrd.com
 
Study on Strength of Fly Ash Based Geopolymer Concrete Under Heat Curing
Study on Strength of Fly Ash Based Geopolymer Concrete Under Heat CuringStudy on Strength of Fly Ash Based Geopolymer Concrete Under Heat Curing
Study on Strength of Fly Ash Based Geopolymer Concrete Under Heat Curingijsrd.com
 
Review of Productivity improvement by implementing automation In manufacturin...
Review of Productivity improvement by implementing automation In manufacturin...Review of Productivity improvement by implementing automation In manufacturin...
Review of Productivity improvement by implementing automation In manufacturin...ijsrd.com
 
Security and Privacy Enhancing Multicloud Architecture
Security and Privacy Enhancing Multicloud ArchitectureSecurity and Privacy Enhancing Multicloud Architecture
Security and Privacy Enhancing Multicloud Architectureijsrd.com
 
Prospect of Small Hydro Power in Uttarakhand
Prospect of Small Hydro Power in UttarakhandProspect of Small Hydro Power in Uttarakhand
Prospect of Small Hydro Power in Uttarakhandijsrd.com
 
Fly ash, Sic, Red mud, Al7075 alloy composite, mechanical properties, and sti...
Fly ash, Sic, Red mud, Al7075 alloy composite, mechanical properties, and sti...Fly ash, Sic, Red mud, Al7075 alloy composite, mechanical properties, and sti...
Fly ash, Sic, Red mud, Al7075 alloy composite, mechanical properties, and sti...ijsrd.com
 
A Low Power Row and Column Compression for High-Performance Multiplication on...
A Low Power Row and Column Compression for High-Performance Multiplication on...A Low Power Row and Column Compression for High-Performance Multiplication on...
A Low Power Row and Column Compression for High-Performance Multiplication on...ijsrd.com
 
A Review: Production of Third Generation Advance High Strength Steels
A Review: Production of Third Generation Advance High Strength SteelsA Review: Production of Third Generation Advance High Strength Steels
A Review: Production of Third Generation Advance High Strength Steelsijsrd.com
 
Strength Characteristics of Concrete with Sintered Fly Ash Aggregate
Strength Characteristics of Concrete with Sintered Fly Ash AggregateStrength Characteristics of Concrete with Sintered Fly Ash Aggregate
Strength Characteristics of Concrete with Sintered Fly Ash Aggregateijsrd.com
 
Variation of Compressive strength and water absorption of concrete made by Tw...
Variation of Compressive strength and water absorption of concrete made by Tw...Variation of Compressive strength and water absorption of concrete made by Tw...
Variation of Compressive strength and water absorption of concrete made by Tw...ijsrd.com
 
Shadow Detection and Removal in Still Images by using Hue Properties of Color...
Shadow Detection and Removal in Still Images by using Hue Properties of Color...Shadow Detection and Removal in Still Images by using Hue Properties of Color...
Shadow Detection and Removal in Still Images by using Hue Properties of Color...ijsrd.com
 
Faults in Digital VLSI Circuits
Faults in Digital VLSI CircuitsFaults in Digital VLSI Circuits
Faults in Digital VLSI Circuitsijsrd.com
 
Study of Nickal based Super Alloy
Study of Nickal based Super AlloyStudy of Nickal based Super Alloy
Study of Nickal based Super Alloyijsrd.com
 
Effect of Tool Rotation Speed on the Hardness of Welded Joints of Aluminium A...
Effect of Tool Rotation Speed on the Hardness of Welded Joints of Aluminium A...Effect of Tool Rotation Speed on the Hardness of Welded Joints of Aluminium A...
Effect of Tool Rotation Speed on the Hardness of Welded Joints of Aluminium A...ijsrd.com
 

Viewers also liked (19)

ENERGY APPLICATION IN NANO TECHNOLOGY
ENERGY APPLICATION IN NANO TECHNOLOGYENERGY APPLICATION IN NANO TECHNOLOGY
ENERGY APPLICATION IN NANO TECHNOLOGY
 
A Survey on Opinion Mining and its Challenges
A Survey on Opinion Mining and its ChallengesA Survey on Opinion Mining and its Challenges
A Survey on Opinion Mining and its Challenges
 
An Analysis of Surface Roughness Improvement of 3D Printed Material
An Analysis of Surface Roughness Improvement of 3D Printed MaterialAn Analysis of Surface Roughness Improvement of 3D Printed Material
An Analysis of Surface Roughness Improvement of 3D Printed Material
 
Comparison Between High Utility Frequent Item sets Mining Techniques
Comparison Between High Utility Frequent Item sets Mining TechniquesComparison Between High Utility Frequent Item sets Mining Techniques
Comparison Between High Utility Frequent Item sets Mining Techniques
 
TRI-BAND MICROSTRIP PATCH ANTENNA FOR S-BAND NANO SATELLITE APPLICATION USING...
TRI-BAND MICROSTRIP PATCH ANTENNA FOR S-BAND NANO SATELLITE APPLICATION USING...TRI-BAND MICROSTRIP PATCH ANTENNA FOR S-BAND NANO SATELLITE APPLICATION USING...
TRI-BAND MICROSTRIP PATCH ANTENNA FOR S-BAND NANO SATELLITE APPLICATION USING...
 
KICKBACK NOISE ANALYSIS OF LOW POWER COMPARATOR
KICKBACK NOISE ANALYSIS OF LOW POWER COMPARATORKICKBACK NOISE ANALYSIS OF LOW POWER COMPARATOR
KICKBACK NOISE ANALYSIS OF LOW POWER COMPARATOR
 
Study on Strength of Fly Ash Based Geopolymer Concrete Under Heat Curing
Study on Strength of Fly Ash Based Geopolymer Concrete Under Heat CuringStudy on Strength of Fly Ash Based Geopolymer Concrete Under Heat Curing
Study on Strength of Fly Ash Based Geopolymer Concrete Under Heat Curing
 
Review of Productivity improvement by implementing automation In manufacturin...
Review of Productivity improvement by implementing automation In manufacturin...Review of Productivity improvement by implementing automation In manufacturin...
Review of Productivity improvement by implementing automation In manufacturin...
 
Security and Privacy Enhancing Multicloud Architecture
Security and Privacy Enhancing Multicloud ArchitectureSecurity and Privacy Enhancing Multicloud Architecture
Security and Privacy Enhancing Multicloud Architecture
 
Prospect of Small Hydro Power in Uttarakhand
Prospect of Small Hydro Power in UttarakhandProspect of Small Hydro Power in Uttarakhand
Prospect of Small Hydro Power in Uttarakhand
 
Fly ash, Sic, Red mud, Al7075 alloy composite, mechanical properties, and sti...
Fly ash, Sic, Red mud, Al7075 alloy composite, mechanical properties, and sti...Fly ash, Sic, Red mud, Al7075 alloy composite, mechanical properties, and sti...
Fly ash, Sic, Red mud, Al7075 alloy composite, mechanical properties, and sti...
 
A Low Power Row and Column Compression for High-Performance Multiplication on...
A Low Power Row and Column Compression for High-Performance Multiplication on...A Low Power Row and Column Compression for High-Performance Multiplication on...
A Low Power Row and Column Compression for High-Performance Multiplication on...
 
A Review: Production of Third Generation Advance High Strength Steels
A Review: Production of Third Generation Advance High Strength SteelsA Review: Production of Third Generation Advance High Strength Steels
A Review: Production of Third Generation Advance High Strength Steels
 
Strength Characteristics of Concrete with Sintered Fly Ash Aggregate
Strength Characteristics of Concrete with Sintered Fly Ash AggregateStrength Characteristics of Concrete with Sintered Fly Ash Aggregate
Strength Characteristics of Concrete with Sintered Fly Ash Aggregate
 
Variation of Compressive strength and water absorption of concrete made by Tw...
Variation of Compressive strength and water absorption of concrete made by Tw...Variation of Compressive strength and water absorption of concrete made by Tw...
Variation of Compressive strength and water absorption of concrete made by Tw...
 
Shadow Detection and Removal in Still Images by using Hue Properties of Color...
Shadow Detection and Removal in Still Images by using Hue Properties of Color...Shadow Detection and Removal in Still Images by using Hue Properties of Color...
Shadow Detection and Removal in Still Images by using Hue Properties of Color...
 
Faults in Digital VLSI Circuits
Faults in Digital VLSI CircuitsFaults in Digital VLSI Circuits
Faults in Digital VLSI Circuits
 
Study of Nickal based Super Alloy
Study of Nickal based Super AlloyStudy of Nickal based Super Alloy
Study of Nickal based Super Alloy
 
Effect of Tool Rotation Speed on the Hardness of Welded Joints of Aluminium A...
Effect of Tool Rotation Speed on the Hardness of Welded Joints of Aluminium A...Effect of Tool Rotation Speed on the Hardness of Welded Joints of Aluminium A...
Effect of Tool Rotation Speed on the Hardness of Welded Joints of Aluminium A...
 

Similar to An Enhanced Approach of Sensitive Information Hiding

NEW ALGORITHM FOR SENSITIVE RULE HIDING USING DATA DISTORTION TECHNIQUE
NEW ALGORITHM FOR SENSITIVE RULE HIDING USING DATA DISTORTION TECHNIQUENEW ALGORITHM FOR SENSITIVE RULE HIDING USING DATA DISTORTION TECHNIQUE
NEW ALGORITHM FOR SENSITIVE RULE HIDING USING DATA DISTORTION TECHNIQUEcscpconf
 
5Association AnalysisBasic Concepts an.docx
 5Association AnalysisBasic Concepts an.docx 5Association AnalysisBasic Concepts an.docx
5Association AnalysisBasic Concepts an.docxShiraPrater50
 
An Effective Heuristic Approach for Hiding Sensitive Patterns in Databases
An Effective Heuristic Approach for Hiding Sensitive Patterns in  DatabasesAn Effective Heuristic Approach for Hiding Sensitive Patterns in  Databases
An Effective Heuristic Approach for Hiding Sensitive Patterns in DatabasesIOSR Journals
 
Analysis and Implementation of Efficient Association Rules using K-mean and N...
Analysis and Implementation of Efficient Association Rules using K-mean and N...Analysis and Implementation of Efficient Association Rules using K-mean and N...
Analysis and Implementation of Efficient Association Rules using K-mean and N...IOSR Journals
 
Data Mining Apriori Algorithm Implementation using R
Data Mining Apriori Algorithm Implementation using RData Mining Apriori Algorithm Implementation using R
Data Mining Apriori Algorithm Implementation using RIRJET Journal
 
Introduction To Multilevel Association Rule And Its Methods
Introduction To Multilevel Association Rule And Its MethodsIntroduction To Multilevel Association Rule And Its Methods
Introduction To Multilevel Association Rule And Its MethodsIJSRD
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceresearchinventy
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceresearchinventy
 
IRJET-Comparative Analysis of Apriori and Apriori with Hashing Algorithm
IRJET-Comparative Analysis of  Apriori and Apriori with Hashing AlgorithmIRJET-Comparative Analysis of  Apriori and Apriori with Hashing Algorithm
IRJET-Comparative Analysis of Apriori and Apriori with Hashing AlgorithmIRJET Journal
 
A literature review of modern association rule mining techniques
A literature review of modern association rule mining techniquesA literature review of modern association rule mining techniques
A literature review of modern association rule mining techniquesijctet
 
IRJET- Minning Frequent Patterns,Associations and Correlations
IRJET-  	  Minning Frequent Patterns,Associations and CorrelationsIRJET-  	  Minning Frequent Patterns,Associations and Correlations
IRJET- Minning Frequent Patterns,Associations and CorrelationsIRJET Journal
 

Similar to An Enhanced Approach of Sensitive Information Hiding (20)

F212734
F212734F212734
F212734
 
F1803033843
F1803033843F1803033843
F1803033843
 
I43055257
I43055257I43055257
I43055257
 
NEW ALGORITHM FOR SENSITIVE RULE HIDING USING DATA DISTORTION TECHNIQUE
NEW ALGORITHM FOR SENSITIVE RULE HIDING USING DATA DISTORTION TECHNIQUENEW ALGORITHM FOR SENSITIVE RULE HIDING USING DATA DISTORTION TECHNIQUE
NEW ALGORITHM FOR SENSITIVE RULE HIDING USING DATA DISTORTION TECHNIQUE
 
5Association AnalysisBasic Concepts an.docx
 5Association AnalysisBasic Concepts an.docx 5Association AnalysisBasic Concepts an.docx
5Association AnalysisBasic Concepts an.docx
 
F04713641
F04713641F04713641
F04713641
 
F04713641
F04713641F04713641
F04713641
 
An Effective Heuristic Approach for Hiding Sensitive Patterns in Databases
An Effective Heuristic Approach for Hiding Sensitive Patterns in  DatabasesAn Effective Heuristic Approach for Hiding Sensitive Patterns in  Databases
An Effective Heuristic Approach for Hiding Sensitive Patterns in Databases
 
Analysis and Implementation of Efficient Association Rules using K-mean and N...
Analysis and Implementation of Efficient Association Rules using K-mean and N...Analysis and Implementation of Efficient Association Rules using K-mean and N...
Analysis and Implementation of Efficient Association Rules using K-mean and N...
 
Cr4201623627
Cr4201623627Cr4201623627
Cr4201623627
 
Hiding slides
Hiding slidesHiding slides
Hiding slides
 
Data Mining Apriori Algorithm Implementation using R
Data Mining Apriori Algorithm Implementation using RData Mining Apriori Algorithm Implementation using R
Data Mining Apriori Algorithm Implementation using R
 
Introduction To Multilevel Association Rule And Its Methods
Introduction To Multilevel Association Rule And Its MethodsIntroduction To Multilevel Association Rule And Its Methods
Introduction To Multilevel Association Rule And Its Methods
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
IRJET-Comparative Analysis of Apriori and Apriori with Hashing Algorithm
IRJET-Comparative Analysis of  Apriori and Apriori with Hashing AlgorithmIRJET-Comparative Analysis of  Apriori and Apriori with Hashing Algorithm
IRJET-Comparative Analysis of Apriori and Apriori with Hashing Algorithm
 
A literature review of modern association rule mining techniques
A literature review of modern association rule mining techniquesA literature review of modern association rule mining techniques
A literature review of modern association rule mining techniques
 
IRJET- Minning Frequent Patterns,Associations and Correlations
IRJET-  	  Minning Frequent Patterns,Associations and CorrelationsIRJET-  	  Minning Frequent Patterns,Associations and Correlations
IRJET- Minning Frequent Patterns,Associations and Correlations
 
Dy33753757
Dy33753757Dy33753757
Dy33753757
 
Dy33753757
Dy33753757Dy33753757
Dy33753757
 

More from ijsrd.com

IoT Enabled Smart Grid
IoT Enabled Smart GridIoT Enabled Smart Grid
IoT Enabled Smart Gridijsrd.com
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Thingsijsrd.com
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Lifeijsrd.com
 
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTStudy on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTijsrd.com
 
Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...ijsrd.com
 
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...ijsrd.com
 
A Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's LifeA Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's Lifeijsrd.com
 
Pedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language LearningPedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language Learningijsrd.com
 
Virtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation SystemVirtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation Systemijsrd.com
 
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...ijsrd.com
 
Understanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart RefrigeratorUnderstanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart Refrigeratorijsrd.com
 
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...ijsrd.com
 
A Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingA Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingijsrd.com
 
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web LogsWeb Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logsijsrd.com
 
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMAPPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMijsrd.com
 
Making model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point TrackingMaking model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point Trackingijsrd.com
 
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...ijsrd.com
 
Study and Review on Various Current Comparators
Study and Review on Various Current ComparatorsStudy and Review on Various Current Comparators
Study and Review on Various Current Comparatorsijsrd.com
 
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...ijsrd.com
 
Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.ijsrd.com
 

More from ijsrd.com (20)

IoT Enabled Smart Grid
IoT Enabled Smart GridIoT Enabled Smart Grid
IoT Enabled Smart Grid
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Things
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Life
 
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTStudy on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOT
 
Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...
 
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
 
A Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's LifeA Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's Life
 
Pedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language LearningPedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language Learning
 
Virtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation SystemVirtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation System
 
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
 
Understanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart RefrigeratorUnderstanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart Refrigerator
 
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
 
A Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingA Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processing
 
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web LogsWeb Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
 
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMAPPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
 
Making model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point TrackingMaking model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point Tracking
 
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
 
Study and Review on Various Current Comparators
Study and Review on Various Current ComparatorsStudy and Review on Various Current Comparators
Study and Review on Various Current Comparators
 
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
 
Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.
 

Recently uploaded

18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 

Recently uploaded (20)

18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 

An Enhanced Approach of Sensitive Information Hiding

  • 1. IJSRD - International Journal for Scientific Research & Development| Vol. 2, Issue 09, 2014 | ISSN (online): 2321-0613 All rights reserved by www.ijsrd.com 356 An Enhanced Approach of Sensitive Information Hiding Kaushal Bhatt1 Ankit Dongre2 1 P.G. Scholar 2 Assistant Professor 1,2 JIT, Borawan, Khargone (M.P) Abstract— Organizations involving in similar businesses often share their databases to find out useful business logics. The process of finding is called data mining. But serious concern occur when the database, shared by organization contain some sensitive information and organization what to hide this information before sharing the database. Then the concept of privacy preserving data mining is comes in spot light where the sensitive information is hide in a such a way that database does not lost its integrity and business logics derived from this databases does not contain sensitive information. In this research we introduce new technique for privacy preserving data mining, which hides sensitive information effectively as compared to previous research work. Key words: PPDM, Hybrid algorithm, Sensitive information, Association rules I. INTRODUCTION Association rules are in the form of A ‐> B where A,B are subset of I are the sets of items called Item sets and A ∩B = Φ. Association rules show attributes value conditions that appear frequently together in a transaction data base. A mostly example are used of association rule data mining is Market Basket Analysis [2]. The set of items is‐ I = {Milk, Bread, Butter} A rule derived from the shopping market database could be {Butter, Bread} => {Milk} meaning that if butter and bread are bought, customers also buy milk. Association rules [4, 2] provide information on the basis of “if then” statements. These rules are computed from the data and, unlike the “if then” rules of logic, the association rules are probabilistic. If 90% of transactions that purchase bread and butter, then also purchase milk.  Antecedent: bread and butter  Consequent: milk  Confidence factor: 90% In addition to the antecedent (the “if” part) and the consequent (the “then” part), an association rule has two numbers that express the degree of uncertainty about the rule. Associations rule analysis the collection of antecedent and consequent are sets of items (called item sets) that are also known as disjoint. It means that they do not have any item in Common. Support for an association rule X‐>Y is the percentage of transaction in database That contains X U Y. The second big parameter is called the Confidence of the rule. Strength for an association rule X U Y is the ratio of number of transactions that contains X U Y to number of transaction that contains X. Support A=>B Common item in any giving table / Total no transaction in any table Confidence A=>B Total Support in Number (A U B) / Total support in Number (A) Association Rule Hiding The problem of association rule hiding was first probed in 1999.After that, many Approaches were proposed. They are categorized as ‐ data sanitization data modification approaches and knowledge sanitization data reconstruction approaches. The data modification approaches [7,10] are also the so‐called data sanitization. They generally hide sensitive association rules by directly modifying sanitizing the original data D, to the database D’ directly from D. As the sanitization is performed on data level, data modification approaches cannot control the hiding effects intuitively. Moreover, it is found that the data sanitization can produce a lot of I/O operations [6,9]. II. RELATED WORK Many researchers proposed research on association rule hiding, due to vast concern about privacy of data. In 2008 belwal [1] introduce modified definition of support and confidence in their research by introducing hiding counter which is used to reduce the confidence and support of association rule below minimum threshold. The ISL (increase support at left hand side) algorithm [] and DSR (Decrease Support at Right hand side) is achieved through modify the database table from 1 to 0 or from 0 to 1 in a selected transaction. The hybrid approach of association rule hiding suggested by research [ ] in order to hide an association rule, either decrease its support or its Confidence to be below than pre-specified minimum support and minimum confidence threshold . this method utilize the both ISL and DSR approaches of privacy preserving data mining This algorithm first tries to hide the rules in which item to be hidden i.e. A is in right hand side and then tries to hide the rules in which A is in left hand side. For this algorithm t is a transaction, T is a set of transactions, AR is used for rule, RHS(AR) is Right Hand Side of rule AR, LHS(AR) is the right hand side of the rule AR, Confidence(C) is the confidence of the rule AR. III. PROPOSED WORK A. Algorithm:- 1) Input:  A source database Do,  A minimum confidence threshold value min_confidence,  A set of hidden items Xh. B. Procedure: 1) Find all possible rules from given items Xh; 2) Compute confidence of all the rules. 3) For each hidden item H 4) For each rule AR in which H is in RHS  If confidence (C) < min_confidence, then Go to next large 2-itemset;  Else go to step 5 5) Decrease Confidence of RHS i.e. item h.  Find T = t in D | t ;  While (T is not empty)
  • 2. An Enhanced Approach of Sensitive Information Hiding (IJSRD/Vol. 2/Issue 09/2014/080) All rights reserved by www.ijsrd.com 357  Choose the first transaction t from T;  Modify t by putting 0 instead of 1 for RHS item;  Remove and save the first transaction t from T; End While 6) Compute confidence of AR; 7) If T is empty, then H cannot be hidden;  End For  End C. Output: Updated DO, as the transformed DM Diagram [3.1] Working Model of Algorithm IV. IMPLEMENTATION To hide any sensitive item X algorithm works on the basis of confidence (X → Y) or support (X → Y). To hide any sensitive item in rule X → Y, this algorithm first finds the value of confidence (conf) in the available set of rules if the confidence value is above the user specific minimum confidence level , then algorithm modify the database in such a way that, after calculating the confidence from modified database rules containing sensitive item either on left or right side always have confidence value below than user specific confidence value. Dataset: Suppose our transactional database is as follow- Tid Milk Butter Bread T1 1 1 1 T2 1 1 1 T3 1 1 1 T4 1 1 0 T5 1 0 0 T6 1 0 1 Table [4.1] Transaction Table L R C Milk Butter 67 Butter Bread 75 Bread Butter 75 Milk Bread 100 Bread Milk 67 Butter Milk 100 Table [4.2] Calculated confidence table A. Suppose Minimum threshold value of confidence is 60% Suppose we first want to hide item Milk, for this, first take rules in which Milk is in RHS. These rules are Butter–>Milk and Bread–>Milk and both have greater confidence. Choose Butter–>Milk and search all transactions where Milk and Butter is equal to 1.There are four transactions T1, T2, T3, T4 with Milk = Butter = 1. Put 0 for item Milk in all the four transactions. After this modification, we get Table 1 as the modified table. Tid Milk Butter Bread T1 0 1 1 T2 0 1 1 T3 0 1 1 T4 0 1 0 T5 1 0 0 T6 1 0 1 Table [4.3] Modified table1 Now calculate confidence of Butter–>Milk, it is 0% which is less than minimum confidence so now this rule is hidden. Now take rule Bread–>Milk, search for transactions in table 1 where Milk and Bread is equal to 1, only transaction T6 has Milk= Bread = 1, update transaction by putting 0 instead of 1 in place of Milk. Now calculate confidence of Bread–>Milk, it is 0% which is less than the minimum confidence so now this rule is hidden. After this modification, we again check the table 1 and it clearly shows that in T6 Milk value is changed to 0. Tid Milk Butter Bread T1 0 1 1 T2 0 1 1 T3 0 1 1 T4 0 1 0 T5 1 0 0 T6 0 0 1 Table [4.4] Modified table 1 After that we again calculated confidence from modified transaction table. L R C Milk Butter 0 Butter Bread 75 Bread Butter 75 Milk Bread 0 Bread Milk 0 Butter Milk 0 Table [4.5] Modified confidence table derived from table 4 We clearly see that association rules having sensitive information either on left hand side or right hand side having confidence below minimum confidence value which is 60%. Result set:- Our proposed technique scan database less as compared to hybrid algorithm that scan data item first for right hand side and modify table and again left hand side for the same. Which we consider unnecessary scan because after first modification the database having value of sensitive information is 0 Below we show graphical comparison between proposed algorithm and hybrid algorithm. Chart [4.1] Comparison in terms of database scan and rule hidden
  • 3. An Enhanced Approach of Sensitive Information Hiding (IJSRD/Vol. 2/Issue 09/2014/080) All rights reserved by www.ijsrd.com 358 Chart [4.2] Number of Rules v/s Time V. CONCLUSION In this research, we have proposed an algorithm for hiding sensitive data in association rules mining which based on modifying the database transactions so that the confidence of the association rules can be reduced. The efficiency of the proposed approach is further compared with Hybrid approach and shown that this approach prunes more number of hidden rules with less number of times database scanned. REFERENCES [1] Ila Chandrakar, Manasa, Usha Rani, and Renuka. Hybrid Algorithm for Association Rule mining. Journal of Computer Science 6(12), pages 1494‐ 1498, 2010. [2] A. K. Pujari. Data Mining Techniques (book), 2001. University Press (India) limited. [3] Poovammal, E. and M. Ponnavaikko, 2009. Utility independent privacy preserving data mining on vertically partitioned data. J. Comput. Sci., 9: 666- 673. DOI: 10.3844/jcssp.2009.666.673 [4] Agrawal, R. and R. Srikant, 1998. Fast Algorithms for Mining Association Rules. In: Readings in Database Systems, Stonebraker, M. and J. Hellerstein (Eds.). Morgan Kaufmann, Massachusetts, ISBN: 1558605231, pp: 580-592 [5] Belwal, Varsheney, Khan, Sharma, Bhattacharya. Hiding sensitive association rules efficiently by introducing new variable hiding counter .IEEE 2008. [6] Agrawal, R., and Srikant (2007), Privacy Preserving Data Mining‟, Proceedings of the 19th ACM International Conference on Knowledge Discovery and Data Mining, Canada, pp. 439-450. [7] Bhatt, Kaushal, and Ankit Dongre. "A Survey of Sensitive Information Hiding Techniques." IJETAE-volume-4 , issue -1. [8] R. Agrawal, T. Imielinski, and A. Swami. Mining association rules between sets of items in large databases. In Proceedings of the ACM SIGMOD Conference on Management of Data,pages 207– 216, New York, NY, USA, May 1993. ACM Press. [9] Aris Gkoulalas–Divanis;Vassilios S. Verykios ―Association Rule Hiding For Data Mining‖ Springer, DOI 10.1007/978-1-4419-6569-1, Springer Science + Business Media, LLC 2010 [10]E. Dasseni, V. S. Verykios, A. K. Elmagarmid, and E. Bertino. Hiding association rules by using confidence and support. In I. S. Moskowitz, editor, Proceedings of the 4th Information Hiding Workshop, volume 2137, pages 369–383, 2001. Springer Veralg Lecture Notes.