Full Paper View Go Back
A Survey: Preventing Discovering Association Rules for Large Data Base
M. Patel1 , A. Hasan2 , S.Kumar 3
Section:Review Paper, Product Type: Isroset-Journal
Vol.1 ,
Issue.2 , pp.30-32, Mar-2013
Online published on Apr 30, 2013
Copyright © M. Patel, A. Hasan , S.Kumar . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: M. Patel, A. Hasan , S.Kumar, âA Survey: Preventing Discovering Association Rules for Large Data Base,â International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.2, pp.30-32, 2013.
MLA Style Citation: M. Patel, A. Hasan , S.Kumar "A Survey: Preventing Discovering Association Rules for Large Data Base." International Journal of Scientific Research in Computer Science and Engineering 1.2 (2013): 30-32.
APA Style Citation: M. Patel, A. Hasan , S.Kumar, (2013). A Survey: Preventing Discovering Association Rules for Large Data Base. International Journal of Scientific Research in Computer Science and Engineering, 1(2), 30-32.
BibTex Style Citation:
@article{Patel_2013,
author = {M. Patel, A. Hasan , S.Kumar},
title = {A Survey: Preventing Discovering Association Rules for Large Data Base},
journal = {International Journal of Scientific Research in Computer Science and Engineering},
issue_date = {3 2013},
volume = {1},
Issue = {2},
month = {3},
year = {2013},
issn = {2347-2693},
pages = {30-32},
url = {https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=36},
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=36
TI - A Survey: Preventing Discovering Association Rules for Large Data Base
T2 - International Journal of Scientific Research in Computer Science and Engineering
AU - M. Patel, A. Hasan , S.Kumar
PY - 2013
DA - 2013/04/30
PB - IJCSE, Indore, INDIA
SP - 30-32
IS - 2
VL - 1
SN - 2347-2693
ER -
Abstract :
Data products are designed to inform public or business policy, and research or public information. Securing these products against unauthorized accesses has been a long-term goal of the database security research community and the government statistical agencies. Whether data is personal or corporate data, data mining offers the potential to reveal what other regard as sensitive (private). In some cases, it may be of mutual benefit for two parties (even competitors) to share their data for an analysis task. Sensitive knowledge which can be mined from a database by using data mining algorithms should also be excluded, because such knowledge can equally well compromise data privacy, as we will indicate. The main objective in privacy preserving data mining is to develop algorithms for modifying the original data in some way, so that the private data and private knowledge remain private even after the mining process. The problem that arises when confidential information can be derived from released data by unauthorized users is also commonly called the âdatabase inferenceâ problem.
Key-Words / Index Term :
Association Rule mining, Data mining
References :
[1] Alexandre Evfimievski and Tyrone Grandison, âPrivacy Preserving Data Miningâ at IBM Almaden Research Center, 2007.
[2] Tzung-Pei Hong, Dept. of Comput. Sci. & Inf. Eng., Nat. Univ. of Kaohsiung, Kaohsiung, Taiwan, âEvolutionary privacy-preserving data miningâ, 19-23 Sept. 2010.
[3] Adam, N. R. & Wortmann, J. C., âSecurity-Control Methods for Statistical Databases: A Comparative Studyâ, ACM Computing Surveys, Vol. 21, N. 4, pp. 515â556, 1989.
[4] âShyue-Lia Wang; Yu-Huei Lee; Billis, S.; Jafari, A. Systems, Man and Cybernetics âHiding Sensitive Items In Privacy Preserving Association Rule Miningâ, 2004 IEEE International Conference on Volume 4, Issue , 10-13 Page(s): 3239 â 3244, Oct. 2004.
[5] Cornelia Gyorodi Robert Gyorodii, prof. Stefan Holban, âA Comparative Study of Association Rules Mining Algorithms",. Jan 2004.
[6] Qi Wang and Krishnamoorthy Siva Kumar, USA:âOn the Privacy Preservin Properties of Random Data PerturbationTechniquesâ Proceedings of the Third IEEE International Conference on Data Mining, pages 43-56, 2003
[7] Krishnamoorthy Siva Kumar, âSpectralFiltering Ttechnique Methodâ Proceedings of the Third IEEE International Conference on Data Mining, pages 40-48, 2003.
[8] Hillol Kargupta, Kun Liu, Souptik Datta, and Jessica Ryan Krishnamoorthy Siva Kumar:â Homeland Security and Privacy Sensitive Data Mining from Multi-Party distributed Resourcesâ The IEEE International Conference on Fuzzy Systems pages 727-764, 2003
[9] Jaideep Vaidya Chris Clifton , âPrivacy Preserving Association Rule Mining in Vertically Partitioned Dataâ, In ACM SIGMOD Workshop on Research Issues Data Mining and Knowledge Discovery, pages 639-644, June 2002
[10] LiWu Chang and Ira S. Moskowitz, Parsimonious downgrading and decisiontrees applied to the inference problem, In Proceedings of the 1998 New SecurityParadigms Workshop, pages 82â89, 1998.
[11] Dr.Kenneth Collien, Dr Carreyand Mr.Donald Sautter, âA Perspective of Data Mining Techniquesâ,1998.
[12] Rakesh Agrawal, Tomasz Imielinski, Arun Swami.Mining âAssociation Rules Between Sets Of Items In Large Databasesâ. Proc. of the ACM SIG-MOD Conference on Management of Data 216, Washington, D.C., May 1993
[13] Alexandre Evfimievski and Tyrone Grandison, âPrivacy Preserving Data Miningâ at IBM Almaden Research Center, 2007.
[14] Tzung-Pei Hong, Dept. of Comput. Sci. & Inf. Eng., Nat. Univ. of Kaohsiung, Kaohsiung, Taiwan, âEvolutionary privacy-preserving data miningâ, 19-23 Sept. 2010.
[15] Er.M.R.Arun Venkatesh, Bharath University, Chennai, âPrivacy-Preserving Updates to Anonymous and Confidential Databaseâ, June-2012.
[16] Justin Zhan from Carnegie Mellon University, USA, âPrivacy- Preserving Collaborative Data Miningâ, 2008.
[17] Benjamin C.M. Fung, Ke Wang, and Philip S. Yu, Fellow, IEEE, âAnonymizing Classification Data for Privacy Preservationâ, may 2007.
[18] Keke Chen, Member, IEEE, and Ling Liu, Senior Member, IEEE, âPrivacy-Preserving Multiparty Collaborative Mining with Geometric Data Perturbationâ, Dec-2009.
[19] Agrawal, R. & Srikant, R., âPrivacy Preserving Data Mining. In Proc. of ACM SIGMODâ, Conference on Management of Data (SIGMODâ00), Dallas, TX, 2000.
You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at support@isroset.org or view contact page for more details.