PRIVACY PRESERVING DATA MINING AND DATA EXPOSER TECHNIQUE AND PERFORMANCE STUDY
Keywords:
Abstract
The data mining is used in a various applications in order to provide decisions, pattern matching and others. In order to mine data it is required to initially learn from the data and then extract the patterns form data which is supplied in raw formats. In some times data is available in parts and need to conclude the outcomes from the data in secure manner. Therefore a technique is required that securely combine data from all the participating partitions of the data. Mine the combined data for extracting the meaningful pattern in a secured manner. Finally disclose the data in such manner which is utilized by the different other application, without disturbing the outcomes of the final application decisions. In order to design and demonstrate the three parties of data are considered for combining them, and mine them. And finally using the C4.5 classification algorithm is applied to find the final utilization on different application. To find that the mining decision is not varied from the initial values of mining the comparison is made between the disclosed data and initial dataset on the basis of accuracy of classification. The experimental results demonstrate a very fewer patterns are misclassified after in comparison of the initial dataset classification in terms of accuracy.References
R. Hariharan, C. Mahesh, P. Prasenna and R. Vinoth Kumar, “Enhancing Privacy Preservation in Data Mining using Cluster based Greedy Method in Hierarchical”, Indian Journal of Science and Technology, Vol 9(3), January 2016
Zakaria Gheid, Yacine Challal, “Efficient and Privacy-Preserving k-means clustering For Big Data Mining”, IEEE TristCom, Aug 2016, Tianjin, China pp.791 - 798, 2016, TrustCom
Rajesh N, and Sujatha K., “Survey on Privacy Preserving Data Mining Techniques using Recent Algorithms”, International Journal of Computer Applications (IJCA) Volume 133 – No.7, January 2016
Li, Lichun, et al. "Privacy-preserving-outsourced association rule mining on vertically partitioned databases." IEEE Transactions on Information Forensics and Security, pp. 1847-1861, 2016
Susan, V. Shyamala, and T. Christopher. "Privacy Preserving Data Mining Using Multiple Objective Optimization." ICTACT Journal on Soft Computing , (2016).
Downloads
Published
Issue
Section
License
Copyright Notice
Submission of an article implies that the work described has not been published previously (except in the form of an abstract or as part of a published lecture or academic thesis), that it is not under consideration for publication elsewhere, that its publication is approved by all authors and tacitly or explicitly by the responsible authorities where the work was carried out, and that, if accepted, will not be published elsewhere in the same form, in English or in any other language, without the written consent of the Publisher. The Editors reserve the right to edit or otherwise alter all contributions, but authors will receive proofs for approval before publication.
Copyrights for articles published in World Scholars journals are retained by the authors, with first publication rights granted to the journal. The journal/publisher is not responsible for subsequent uses of the work. It is the author's responsibility to bring an infringement action if so desired by the author.