Ijcot v8p310

Page 1

International Journal of Computer & Organization Trends – Volume 8 Number 1 – May 2014

Encrypted Privacy Preserving Based Association Rules in Distributed Environment K.Venkata Subbarao Department of Computer science and Engineering. VASIREDDY VENKATADRI INSTITUTE OF TECHNOLOGY, Guntur District.

Rajesh Pleti Department of Computer science and Engineering. VASIREDDY VENKATADRI INSTITUTE OF TECHNOLOGY, Guntur District.

Abstract

Data mining techniques have already been developed in many applications. However, in addition they cause a threat to privacy preserving is one of the biggest problem in data mining applications. With this paper, we proposed a greedy way of hiding sensitive rules. Privacy-preserving data mining just emerged to address possibly one of the problems in sensitive data mining technology: the threat to user privacy through data mining, an individual is ready to suffer sensitive information, including personal information or perhaps patterns, from non-sensitive information or unclassified data. We divide the proposals of privacy preserving association rule mining into two stages: heuristic-based reconstruction techniques, cryptography-based techniques. Experimental results gives research directions of privacy preserving algorithms of association rule mining by analyzing the most present work results. Keywords – P a t t e r n s , Rules, Cryptography, Sensitive.

I. INTRODUCTION Privacy preserving association rule mining needs to prevent disclosure not only of confidential personal information from original or aggregated data, but also to prevent data mining techniques from discovering sensitive knowledge. In this section, we will discuss the purposed methods for privacy preserving on sensitive rules. It is known that each strong rule extracts from frequent itemsets. To prevent sensitive rules (determined by the experts) being mined in the process of association rule mining, many methods are developed, all of which are based on reducing the support and confidence of rules that specify how significant they are. In order to achieve this goal, transactions are modified by removing some items, or inserting new items depending on the hiding strategy. In recent years, data mining based on privacy preserving has become a hot spot of database study. Association

ISSN: 2249-2593

rules are researched popularly too. Association rule mining is to find the interesting relationship and interrelationship of item sets among the mass data. The privacy preserving of association rule is an operation done to hide the sensitive rules aimed to frustrate the data user’s attempt to mine the data from its owner before the process of association rule mining. To implement the privacy preserving of data, we need to consider the follow two points: One is how to ensure the privacy not to be revealed during data application process. Data mining is the process of filtering through large amounts of raw data for useful information. This information is made up of meaningful patterns and trends that are already in the data but were previously unseen. Different data mining techniques help analysts recognize significant relationships, trends and patterns in raw data in order to make better decisions. Distributed data mining algorithms apply data mining tasks on datasets distributed among different sites. However, privacy concerns may prevent cooperative sites to provide their data for mining; a survey of Internet users’ attitudes towards privacy [1] showed that 17% of the users are extremely concerned about any use of their data and generally unwilling to provide their data, even when privacy protection measures were in place. For 56% of the users, these concerns are often significantly reduced by the presence of privacy protection measures. Indeed, there is an increasing need to develop privacy-preserving solutions for different cooperative computation scenarios, including data mining. A set of items is referred as an itemset. An itemset that contains k items is a k-itemset. The support count of an itemset is the number of transactions containing the itemset. An itemset is frequent if its support count is not less than the minimum support count. Rules with the support more than a minimum support threshold (smin) and the confidence more than a minimum confidence threshold (cmin) are called strong. Association rule mining is a two-step process: (1) Finding all frequent itemsets; (2) Generating strong association rules from the frequent itemsets. The purpose of privacy preserving is to discover accurate patterns without precise access to the original data. The algorithm of association rule mining is to mine the association rule based on the given minimal support and minimal confidence. Therefore, the most direct method to hide association rule is to reduce the

http://www.ijcotjournal.org

Page 60


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.