SlideShare a Scribd company logo
1 of 4
Download to read offline
International Journal of Engineering Research and Development
ISSN: 2278-067X, Volume 1, Issue 8 (June 2012), PP.18-21
www.ijerd.com

             Privacy Preserving Association Rule in Data Mining
                                       Jayashree Patil1, Y.C.Kulkarni2
                                                     1,2
                                                           BVDUCOE, Pune,India,


Abstract—Privacy is an important issue in Data mining. The privacy field has seen speedy advances in current years
because ability to store data has increased. Precisely, current advances in the data mining field have led to increased
concerns about privacy. Privacy-preserving data mining has been studied extensively, because of the wide proliferation of
sensitive information on the internet. . Many methods have been brought out to solve this. As a result privacy becomes one of
the prime anxieties in data mining research public. A new class of data mining approaches, known as privacy preserving
data mining algorithms, has been developed by the research public working on security and knowledge discovery. The goal
of these algorithms is the extraction of relevant knowledge from large amount of digital data and while protecting at the
same time sensitive information. Several data mining techniques, incorporating privacy protection mechanisms, have been
advanced that allow one to hide sensitive item sets or patterns, before the data mining process is executed. Association rule
mining helps to preserves the confidentiality of each database. To find the association rule, each participant has to segment
their own data. Thus, much privacy information may be transmitted or been illegal used. Association rule mining is one of
the vital problems in data mining, privacy preserving classification methods, instead, prevent a miner from building a
classifier which is able to predict sensitive data.

Keywords—Data mining, Data hiding, Knowledge hiding, Association Rule, Privacy preserving

                                              I.             INTRODUCTION
           Data mining technology has been developed with the goal of providing tools for automatically and intelligently
transforming large amount of data in knowledge relevant to users. The extracted knowledge often expressed in form of
association rules decision trees or clusters, allows one to find interesting patterns and regularities deeply buried in the data,
which are meant to facilitate decision making processes. Such a knowledge discovery process however can also return
sensitive information about individuals, compromising the individual’s right to privacy. Moreover data mining techniques
can reveal critical information about business transactions, compromising the free competition in a business setting. Thus,
there is a strong need to prevent disclosure not only of confidential personal information, but also of knowledge which is
considered sensitive in a given context. For this reason, recently much research effort has been devoted to addressing the
problem of privacy preserving in data mining. As a result several data mining techniques, incorporating privacy protection
mechanisms, have been developed based on different approaches. For instance, various sanitization techniques have been
proposed for hiding sensitive items or patterns that are based on removing reserved information or inserting noise into data.
Privacy preserving classification methods instead, prevent a miner from building a classifier able to predict sensitive data.
Additionally privacy preserving clustering techniques have been recently proposed, which distort sensitive numerical
attributes while preserving general features for clustering analysis.

          Given the number of different privacy preserving association rule mining techniques that have been developed
over the last years, there is an emerging need of moving toward standardization in this new research area. Because all the
various techniques differ among each other with respect to a number of criteria like performance, data quality, privacy level,
it is important to provide a systematic and comprehensive study for their evaluation. In many cases no technique is better
than the other ones with respect to all criteria. Thus, one has to select the privacy preserving technique based on the criterion
to be optimized. A framework like the one developed here is thus essential in order to select the privacy preserving technique
which is more adequate based on the data and the requirements of the application domain. In evaluating privacy preserving
association rule mining algorithm it is important to assess the quality of the transformed data. In evaluating privacy
preserving association rule mining algorithm it is important to assess the quality of the transformed data To do this, we need
methodologies for the assessment of the quality of data, intended as the state of the individual items in the database resulting
from the application of a privacy preserving technique, as well as the quality of the information that is extracted from the
modified data by using a given data mining method. This presents such a methodology which allows one to compare the
various privacy preserving techniques on a common platform. The methodology consists of a number of evaluation criteria
and a set of tools for data pre-processing and privacy preserving data mining algorithm evaluation [1].

                                               II.            BACKGROUND
            As we know, the data processed in data mining may be obtained from many sources in which different data types
may be used. However, no algorithm can be applied to all applications due to the difficulty for fitting data types of the
algorithm, so the selection of an appropriate mining algorithm is based on not only the goal of application, but also the data
fit ability. Therefore, to transform the non-fitting data type into target one and protecting private data is also an important
work in data mining, but the work is often tedious or complex since a lot of data types exist in real world. Merging the
similar data types of a given selected mining algorithm into a generalized data type seems to be a good approach to reduce
the transformation complexity. Recent research in the area of privacy preserving data mining has devoted much effort to

                                                                  18
Privacy Preserving Association Rule in Data Mining

determine a trade-off between the right to privacy and the need of knowledge discovery which is crucial in order to improve
decision-making processes and other human activities. Such research has resulted in several approaches to the evaluation of
privacy preserving techniques.

          Verykios et al. (2004) analyze the state-of-the-art in the area of Privacy Preserving Data Mining (PPDM),
classifying the proposed privacy preservation techniques according to five different dimensions:
         Data distribution (centralized or distributed).
         The modification applied to the data (encryption, perturbation, generalization, and so on) in order to sanitize them.
         The data mining algorithm which the privacy preservation technique is designed for.
         The data type (single data items or complex data correlations) that need to be protected from disclosure.
         The approach adopted for preserving privacy (heuristic, reconstruction or cryptography based approaches).

          Oliveira and Zaiane (2002) propose a heuristic-based framework for preserving privacy in mining frequent item
sets. They focus on hiding a set of frequent patterns, containing highly sensitive knowledge. They propose a set of sanitized
algorithms that only remove information from a transactional database, also known in the SDC area as non-perturbative
algorithms, unlike those algorithms, that modify the existing information by inserting noise into the data, referred to as
perturbative algorithms. The algorithms proposed by Oliveira and Zaiane rely on a item-restriction approach, in order to
avoid the addition of noise to the data and limit the removal of real data. In the evaluation of the proposed algorithms they
introduce some measures quantifying the effectiveness and the efficiency of their algorithms. The first parameter is
evaluated in terms of: Hiding Failure, that is, the percentage of restrictive patterns that are discovered from the sanitized
database Misses Cost, that is, the percentage of non-restrictive patterns that are hidden after the sanitization process;
Artifactual Pattern, measured in terms of the percentage of discovered patterns that are artifacts[4].

          The specific algorithms proposed by Oliveira and Zaiane do not introduce any artifactual patterns, whereas with
respect to the hiding failure and misses cost parameters, it turns out that the more restrictive patterns are hidden, the more
legitimate patterns are missed. The specification of a disclosure threshold Ф, representing the percentage of sensitive
transactions that are not sanitized, allows one to find a balance between the hiding failure and the number of misses. The
efficiency of the algorithms is measured in terms of CPU time, by first keeping constant both the size of the database and the
set of restrictive patterns, and then by increasing the size of the input data in order to assess the algorithm scalability.
Moreover, Oliveira and Zaiane propose three different methods to measure the dissimilarity between the original and
sanitized databases. The first method is based on the difference between the frequency histograms of the original and the
sanitized databases. The second method is based on computing the difference between the sizes of the sanitized database and
the original one. The third method is based on a comparison between the contents of two databases.

           In Sweeney (2002) Sweeney proposes a heuristic-based approach for protecting raw data through generalization
and suppression techniques. The methods she proposes provide K-Anonymity. Roughly speaking a database is K-
anonymous with respect to some attributes if there exist at least k transactions in the database for each combination of the
attribute values. A database A can be converted into a new database A1 that guarantees the K Anonymity property for a
sensible attribute by performing some generalizations on the values of the target attributes. As result, such attributes are
susceptible to cell distortion due to the different level of generalization applied in order to achieve K Anonymity technique s
for hiding sensitive information [5].

          A framework for mining association rules from transactions consisting of categorical items is proposed
(Evfimievski et al. (2002) where the data has been randomized to preserve privacy of individual communications, ensuring
at the same time that only true associations are mined. They also provide a formal definition of privacy cracks and a class of
randomization operators that are effective in limiting cracks than uniform randomization. Definition accordingly
(Evfimievski et al. (2002) an item set A results in a privacy break of level ρ if the likelihood that an item in A belongs to a
non randomized transaction, given that A is included in a randomized transaction, is greater or equal to ρ . In some scenarios,
being confident that item be not present in the original transaction may be considered a privacy breach. In order to evaluate
the privacy cracks, the approach taken by Evfimievski et al. is to count the occurrences of an item set in a randomized
transaction and in its sub-items in the corresponding non randomized transaction. Out of all sub-items of an item set, the
item causing the worst privacy breach is chosen. Then, for each combination of transaction size and item set size, the worst
and the average value of this breach level are computed over all frequent item sets. Finally, the item set size giving the worst
value for each of these two values is selected.[2].

           Clifton (2002) defined a Cryptography-based approach. Such approach reports the problem of association_ rule_
mining in vertically_ partitioned_ data. Aim is to determine the item frequency when transactions are split through different
sites, without revealing the contents of individual transactions. A security and communication analysis is also presented. In
particular, the security of the protocol for computing the scalar product is analysed. The total communication cost depends
on the number of candidate item sets and can best be expressed as a constant multiple of the I/O cost of the aprior algorithm
[3].




                                                              19
Privacy Preserving Association Rule in Data Mining

                                            III.      EVALUATION MODEL
The main goals of a privacy preserving association rule mining algorithm should enforce:
        A privacy preserving association rule mining algorithm should have to prevent the discovery of sensible
         information.
        It should be resistant to the various data mining techniques.
        It should not compromise the access and the use of non sensitive data.
        It should be usable on large amounts of data.
        It should not have an exponential computational complexity

     Current privacy preserving association rule mining algorithms do not satisfy all these goals at the same time; for
instance, only few of them satisfy the point (2). The above list of goals helps us to understand how to evaluate these
algorithms in a common way. The framework is identified is based on the following evaluation dimensions:
         Efficiency - the ability of a privacy preserving algorithm to execute with good performance in terms of all the
          resources implied by the algorithm
         Scalability - which evaluates the efficiency trend of a privacy preserving data mining algorithm for increasing
          sizes of the data from which relevant information is mined while ensuring privacy
         Data quality – After the application of a privacy preserving technique, considered both as the quality of data
          themselves and the quality of the data mining results after the hiding strategy is applied
         Hiding failure - The portion of sensitive information that is not hidden by the application of a privacy
          preservation technique. Privacy level offered by a privacy preserving technique, which estimates the degree of
          uncertainty, according to which sensitive information, that has been hidden, can still be predicted.

                                       IV.         CURRENT METHODOLOGY
         To measure the effective accuracy of the parameters some experimental evaluations on a set of data hiding
algorithms have been carried out.. The data set and methodology which have been used are described for the evaluation
process.

A.          Rule hiding Problem:
            A formal description of the rule hiding problem is given. Let D be a transactional database and I = {i1,. . . , in} be
a set of literals, called items. Each transaction can be considered as an item set that is included in I. The items in a
transaction or in an item set are sorted according to a lexicographic order. According to a bitmap notation, each transaction t
in the database D is represented as a triple <TID ,values of items, size>, where TID is the identifier of the transaction t, and
values of items is a list of values, one value for each item in I, associated with transaction t. An item is supported by a
transaction t if its value in the values of items is 1, and it is not supported by t if its value in the values of items is 0. Size is
the number of 1 value which appears in the values of items, that is, the number of items supported by the transaction. An
association rule is an effect of the form X => Y between two disjoint item sets X and Y in I. Each rule is assigned both a
support and a confidence value. The first one is a measure of a rule frequency, more precisely, it is the chance to find in the
database transactions containing all the items in XỤY, whereas the confidence is a measure of the strength of the relation
between the antecedent X and the consequent Y of the rule, that is, the probability to find transactions containing all the
items in XỤY, once we know that they contain X. An association rule mining process consists of two steps: first step is the
identification of all the frequent item sets, that is, all the item sets, whose supports are higher than a pre-determined
minimum support threshold, minsupp; and second step is the generation of strong association rules from the frequent item
sets, that is, those frequent rules whose confidence values are higher than a minimum confidence threshold, minconf. Along
with confidence and support, a sensitivity level is assigned only to both frequent and strong rules. If a strong and frequent
rule is above a certain sensitivity level, the hiding process should be applied in such a way that either the frequency or the
strength of the rule is reduced below the min_supp and the min_conf correspondingly. The problem of association rule
hiding can be stated as follows: given a database D, a set R of relevant rules that are mined from D and a subset Rh of those
sensitive rules included in R, we want to transform D into a database D’ in such a way that the rules in R can still be mined,
except for the rules in Rh.


B.         Rule hiding algorithms based on data fuzziffication:
           According to the data fuzzification method , a sequence of symbol in the new alphabet of an item {0,1,?} is related
with each transaction where one symbol is associated with each item in the set of items I. The ith value in the list of valu es
is 1 if the transaction supports the ith item, it is 0 otherwise. The novelty of this approach is the insertion of an uncertainty
symbol, e.g. a question mark, in a given position of the list of values which means that there is no information on whether
the transaction supports the corresponding item. In this case, the confidence and the support of an association rule may be
not uniquely determined, but they can range between a minimum and a maximum value. The least support of an item set is
defined as the percentage of transactions that certainly support the item set, while the extreme support represents the
percentage of transactions that support or could support the item set. The minimum confidence of a rule is obviously the
minimum level of confidence that the rule can accept based on the support value, and similarly for the maximum confidence.

         A rule hiding process takes place according to two different strategies: decreasing its support or its confidence.
The adopted alternative strategies aim at introducing uncertainty in the frequency or the importance of the rules to hide.

                                                                 20
Privacy Preserving Association Rule in Data Mining

          The two strategies reduce the minimum support and the minimum confidence of the item sets generating these
rules below the minimum support threshold (MST) and minimum confidence threshold (MCT) correspondingly by a certain
safety margin (SM) fixed by the user. In order to reduce the support of the large item set generating a sensitive rule,
Algorithm 1 replaces 1’s by “ ? “ for the items in transactions associate the item set until its minimum support goes below
the minimum support threshold MST by the fixed safety margin SM. Algorithms CR1 and CR2 operate by reducing the
minimum sureness value of sensitive rules. The first one decreases the minimum support of the generating item set of a
sensitive rule by replacing items of the rule consequent with unknown values. The second one, instead, increases the
supreme support value of the antecedent of the rule to hide via placing question marks in the place of the zero values of
items in the antecedent. All the fuzzification algorithms hide a sensitive rule with an uncertainty level by decreasing the
minimum support or confidence values below the resulting thresholds, MST-SM and MCT-SM.

                                                V.        CONCLUSION
          In this paper, a methodology for evaluating privacy preserving association rule mining algorithms is proposed.
Such methodology allows one to assess the different features of a privacy preserving algorithm according to a variety of
evaluation criteria. Parameters like level of privacy, data quality, data types fitability and hiding failure have been defi ned
and the evaluations of such parameters over a set of association rule hiding algorithms have been presented, which can help
users to select suitable data mining algorithms for their data sets. The proposed evaluation methodologies can be applied in
new set of privacy preservation like cryptography-based and web-based algorithms.

                                                     REFERENCES
[1]. Agrawal, R. and Srikant, R. 2000. Privacy preserving datamining.In Proceeedings of the ACM SIGMOD conferenceof
     management of data, ACM, pp. 439.450.
[2]. J Evfimievski, A. 2002. Randomization in privacy preservingdata mining. SIGKDD Explor.Newsl., 4(2):43.48J.
     Breckling, Ed., The Analysis of Directional Time Series: Applications to Wind Speed and Direction, ser. Lecture Notes
     in Statistics. Berlin, Germany: Springer, 1989, vol. 61.
[3]. Kantarcioglu, M. and Clifton, C. 2002. Privacy preserving distributed mining of association rules on
     horizontallypartitioned data. In ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge
     Discovery, pp. 24.31.
[4]. Oliveira, S.R.M. and Zaiane, O.R. 2002. Privacy preservingfrequent itemset mining. In IEEE icdm Workshop
     onPrivacy, Security and Data Mining, Vol. 14, pp. 43.54.
[5]. Sweeney, L. 2002. Achieving k-anonymity privacy protectionusing generalization and suppression. International
     Journalof Uncertainty, Fuzziness and Knowledge Based Systems,10(5):571.588.




                                                              21

More Related Content

What's hot

Privacy Preservation and Restoration of Data Using Unrealized Data Sets
Privacy Preservation and Restoration of Data Using Unrealized Data SetsPrivacy Preservation and Restoration of Data Using Unrealized Data Sets
Privacy Preservation and Restoration of Data Using Unrealized Data SetsIJERA Editor
 
Cluster Based Access Privilege Management Scheme for Databases
Cluster Based Access Privilege Management Scheme for DatabasesCluster Based Access Privilege Management Scheme for Databases
Cluster Based Access Privilege Management Scheme for DatabasesEditor IJMTER
 
Privacy preserving in data mining with hybrid approach
Privacy preserving in data mining with hybrid approachPrivacy preserving in data mining with hybrid approach
Privacy preserving in data mining with hybrid approachNarendra Dhadhal
 
Data mining and privacy preserving in data mining
Data mining and privacy preserving in data miningData mining and privacy preserving in data mining
Data mining and privacy preserving in data miningNeeda Multani
 
Privacy preserving dm_ppt
Privacy preserving dm_pptPrivacy preserving dm_ppt
Privacy preserving dm_pptSagar Verma
 
PERFORMING DATA MINING IN (SRMS) THROUGH VERTICAL APPROACH WITH ASSOCIATION R...
PERFORMING DATA MINING IN (SRMS) THROUGH VERTICAL APPROACH WITH ASSOCIATION R...PERFORMING DATA MINING IN (SRMS) THROUGH VERTICAL APPROACH WITH ASSOCIATION R...
PERFORMING DATA MINING IN (SRMS) THROUGH VERTICAL APPROACH WITH ASSOCIATION R...Editor IJMTER
 
IRJET- Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...
IRJET-  	  Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...IRJET-  	  Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...
IRJET- Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...IRJET Journal
 
Data Transformation Technique for Protecting Private Information in Privacy P...
Data Transformation Technique for Protecting Private Information in Privacy P...Data Transformation Technique for Protecting Private Information in Privacy P...
Data Transformation Technique for Protecting Private Information in Privacy P...acijjournal
 
Cryptography for privacy preserving data mining
Cryptography for privacy preserving data miningCryptography for privacy preserving data mining
Cryptography for privacy preserving data miningMesbah Uddin Khan
 
Privacy Preserving DB Systems
Privacy Preserving DB SystemsPrivacy Preserving DB Systems
Privacy Preserving DB SystemsAshraf Bashir
 
Privacy preservation techniques in data mining
Privacy preservation techniques in data miningPrivacy preservation techniques in data mining
Privacy preservation techniques in data miningeSAT Publishing House
 
IRJET- A Study of Privacy Preserving Data Mining and Techniques
IRJET- A Study of Privacy Preserving Data Mining and TechniquesIRJET- A Study of Privacy Preserving Data Mining and Techniques
IRJET- A Study of Privacy Preserving Data Mining and TechniquesIRJET Journal
 
Maintaining Data Confidentiality in Association Rule Mining in Distributed En...
Maintaining Data Confidentiality in Association Rule Mining in Distributed En...Maintaining Data Confidentiality in Association Rule Mining in Distributed En...
Maintaining Data Confidentiality in Association Rule Mining in Distributed En...IJSRD
 
78201919
7820191978201919
78201919IJRAT
 
A SURVEY ON PRIVACY PRESERVING ASSOCIATION RULE MINING
A SURVEY ON PRIVACY PRESERVING ASSOCIATION RULE MININGA SURVEY ON PRIVACY PRESERVING ASSOCIATION RULE MINING
A SURVEY ON PRIVACY PRESERVING ASSOCIATION RULE MININGijdkp
 

What's hot (18)

Privacy Preservation and Restoration of Data Using Unrealized Data Sets
Privacy Preservation and Restoration of Data Using Unrealized Data SetsPrivacy Preservation and Restoration of Data Using Unrealized Data Sets
Privacy Preservation and Restoration of Data Using Unrealized Data Sets
 
Cluster Based Access Privilege Management Scheme for Databases
Cluster Based Access Privilege Management Scheme for DatabasesCluster Based Access Privilege Management Scheme for Databases
Cluster Based Access Privilege Management Scheme for Databases
 
Privacy preserving in data mining with hybrid approach
Privacy preserving in data mining with hybrid approachPrivacy preserving in data mining with hybrid approach
Privacy preserving in data mining with hybrid approach
 
Data mining and privacy preserving in data mining
Data mining and privacy preserving in data miningData mining and privacy preserving in data mining
Data mining and privacy preserving in data mining
 
Ib3514141422
Ib3514141422Ib3514141422
Ib3514141422
 
Privacy preserving dm_ppt
Privacy preserving dm_pptPrivacy preserving dm_ppt
Privacy preserving dm_ppt
 
J017536064
J017536064J017536064
J017536064
 
PERFORMING DATA MINING IN (SRMS) THROUGH VERTICAL APPROACH WITH ASSOCIATION R...
PERFORMING DATA MINING IN (SRMS) THROUGH VERTICAL APPROACH WITH ASSOCIATION R...PERFORMING DATA MINING IN (SRMS) THROUGH VERTICAL APPROACH WITH ASSOCIATION R...
PERFORMING DATA MINING IN (SRMS) THROUGH VERTICAL APPROACH WITH ASSOCIATION R...
 
IRJET- Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...
IRJET-  	  Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...IRJET-  	  Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...
IRJET- Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...
 
Data Transformation Technique for Protecting Private Information in Privacy P...
Data Transformation Technique for Protecting Private Information in Privacy P...Data Transformation Technique for Protecting Private Information in Privacy P...
Data Transformation Technique for Protecting Private Information in Privacy P...
 
Cryptography for privacy preserving data mining
Cryptography for privacy preserving data miningCryptography for privacy preserving data mining
Cryptography for privacy preserving data mining
 
Privacy Preserving DB Systems
Privacy Preserving DB SystemsPrivacy Preserving DB Systems
Privacy Preserving DB Systems
 
Privacy preservation techniques in data mining
Privacy preservation techniques in data miningPrivacy preservation techniques in data mining
Privacy preservation techniques in data mining
 
IRJET- A Study of Privacy Preserving Data Mining and Techniques
IRJET- A Study of Privacy Preserving Data Mining and TechniquesIRJET- A Study of Privacy Preserving Data Mining and Techniques
IRJET- A Study of Privacy Preserving Data Mining and Techniques
 
Maintaining Data Confidentiality in Association Rule Mining in Distributed En...
Maintaining Data Confidentiality in Association Rule Mining in Distributed En...Maintaining Data Confidentiality in Association Rule Mining in Distributed En...
Maintaining Data Confidentiality in Association Rule Mining in Distributed En...
 
1699 1704
1699 17041699 1704
1699 1704
 
78201919
7820191978201919
78201919
 
A SURVEY ON PRIVACY PRESERVING ASSOCIATION RULE MINING
A SURVEY ON PRIVACY PRESERVING ASSOCIATION RULE MININGA SURVEY ON PRIVACY PRESERVING ASSOCIATION RULE MINING
A SURVEY ON PRIVACY PRESERVING ASSOCIATION RULE MINING
 

Viewers also liked (8)

Demonstrating Chaos on Financial Markets through a Discrete Logistic Price Dy...
Demonstrating Chaos on Financial Markets through a Discrete Logistic Price Dy...Demonstrating Chaos on Financial Markets through a Discrete Logistic Price Dy...
Demonstrating Chaos on Financial Markets through a Discrete Logistic Price Dy...
 
Lipid Profile of Kashmiri Type 2 Diabetic Patients
Lipid Profile of Kashmiri Type 2 Diabetic PatientsLipid Profile of Kashmiri Type 2 Diabetic Patients
Lipid Profile of Kashmiri Type 2 Diabetic Patients
 
Energy Consumption in Key Management Operations in WSNs
Energy Consumption in Key Management Operations in WSNsEnergy Consumption in Key Management Operations in WSNs
Energy Consumption in Key Management Operations in WSNs
 
Opportunistic Routing in Delay Tolerant Network with Different Routing Algorithm
Opportunistic Routing in Delay Tolerant Network with Different Routing AlgorithmOpportunistic Routing in Delay Tolerant Network with Different Routing Algorithm
Opportunistic Routing in Delay Tolerant Network with Different Routing Algorithm
 
Sexual Networking, Sexual Practices and Level of Awareness among MSM on HIV/ ...
Sexual Networking, Sexual Practices and Level of Awareness among MSM on HIV/ ...Sexual Networking, Sexual Practices and Level of Awareness among MSM on HIV/ ...
Sexual Networking, Sexual Practices and Level of Awareness among MSM on HIV/ ...
 
Study on Application of Three Methods for Calculating the Dispersion Paramete...
Study on Application of Three Methods for Calculating the Dispersion Paramete...Study on Application of Three Methods for Calculating the Dispersion Paramete...
Study on Application of Three Methods for Calculating the Dispersion Paramete...
 
Effectiveness of ERules in Generating Non Redundant Rule Sets in Pharmacy Dat...
Effectiveness of ERules in Generating Non Redundant Rule Sets in Pharmacy Dat...Effectiveness of ERules in Generating Non Redundant Rule Sets in Pharmacy Dat...
Effectiveness of ERules in Generating Non Redundant Rule Sets in Pharmacy Dat...
 
Hiding slides
Hiding slidesHiding slides
Hiding slides
 

Similar to www.ijerd.com

A Survey on Features and Techniques Description for Privacy of Sensitive Info...
A Survey on Features and Techniques Description for Privacy of Sensitive Info...A Survey on Features and Techniques Description for Privacy of Sensitive Info...
A Survey on Features and Techniques Description for Privacy of Sensitive Info...IRJET Journal
 
A Frame Work for Ontological Privacy Preserved Mining
A Frame Work for Ontological Privacy Preserved MiningA Frame Work for Ontological Privacy Preserved Mining
A Frame Work for Ontological Privacy Preserved MiningIJNSA Journal
 
The Survey of Data Mining Applications And Feature Scope
The Survey of Data Mining Applications  And Feature Scope The Survey of Data Mining Applications  And Feature Scope
The Survey of Data Mining Applications And Feature Scope IJCSEIT Journal
 
Performance analysis of perturbation-based privacy preserving techniques: an ...
Performance analysis of perturbation-based privacy preserving techniques: an ...Performance analysis of perturbation-based privacy preserving techniques: an ...
Performance analysis of perturbation-based privacy preserving techniques: an ...IJECEIAES
 
Fundamentals of data mining and its applications
Fundamentals of data mining and its applicationsFundamentals of data mining and its applications
Fundamentals of data mining and its applicationsSubrat Swain
 
Privacy Preserving Distributed Association Rule Mining Algorithm for Vertical...
Privacy Preserving Distributed Association Rule Mining Algorithm for Vertical...Privacy Preserving Distributed Association Rule Mining Algorithm for Vertical...
Privacy Preserving Distributed Association Rule Mining Algorithm for Vertical...IJCSIS Research Publications
 
A review on privacy preservation in data mining
A review on privacy preservation in data miningA review on privacy preservation in data mining
A review on privacy preservation in data miningijujournal
 
A Review on Privacy Preservation in Data Mining
A Review on Privacy Preservation in Data MiningA Review on Privacy Preservation in Data Mining
A Review on Privacy Preservation in Data Miningijujournal
 
A Review on Privacy Preservation in Data Mining
A Review on Privacy Preservation in Data MiningA Review on Privacy Preservation in Data Mining
A Review on Privacy Preservation in Data Miningijujournal
 
A Review on Privacy Preservation in Data Mining
A Review on Privacy Preservation in Data MiningA Review on Privacy Preservation in Data Mining
A Review on Privacy Preservation in Data Miningijujournal
 
data minig for eng with all topics and history
data minig for eng with all topics and historydata minig for eng with all topics and history
data minig for eng with all topics and historynbaisane16
 
Analysis of Pattern Transformation Algorithms for Sensitive Knowledge Protect...
Analysis of Pattern Transformation Algorithms for Sensitive Knowledge Protect...Analysis of Pattern Transformation Algorithms for Sensitive Knowledge Protect...
Analysis of Pattern Transformation Algorithms for Sensitive Knowledge Protect...IOSR Journals
 
Multilevel Privacy Preserving by Linear and Non Linear Data Distortion
Multilevel Privacy Preserving by Linear and Non Linear Data DistortionMultilevel Privacy Preserving by Linear and Non Linear Data Distortion
Multilevel Privacy Preserving by Linear and Non Linear Data DistortionIOSR Journals
 
DATA SCIENCE METHODOLOGY FOR CYBERSECURITY PROJECTS
DATA SCIENCE METHODOLOGY FOR CYBERSECURITY PROJECTS DATA SCIENCE METHODOLOGY FOR CYBERSECURITY PROJECTS
DATA SCIENCE METHODOLOGY FOR CYBERSECURITY PROJECTS cscpconf
 

Similar to www.ijerd.com (20)

A Survey on Features and Techniques Description for Privacy of Sensitive Info...
A Survey on Features and Techniques Description for Privacy of Sensitive Info...A Survey on Features and Techniques Description for Privacy of Sensitive Info...
A Survey on Features and Techniques Description for Privacy of Sensitive Info...
 
E04623438
E04623438E04623438
E04623438
 
A Frame Work for Ontological Privacy Preserved Mining
A Frame Work for Ontological Privacy Preserved MiningA Frame Work for Ontological Privacy Preserved Mining
A Frame Work for Ontological Privacy Preserved Mining
 
The Survey of Data Mining Applications And Feature Scope
The Survey of Data Mining Applications  And Feature Scope The Survey of Data Mining Applications  And Feature Scope
The Survey of Data Mining Applications And Feature Scope
 
1699 1704
1699 17041699 1704
1699 1704
 
Performance analysis of perturbation-based privacy preserving techniques: an ...
Performance analysis of perturbation-based privacy preserving techniques: an ...Performance analysis of perturbation-based privacy preserving techniques: an ...
Performance analysis of perturbation-based privacy preserving techniques: an ...
 
Fundamentals of data mining and its applications
Fundamentals of data mining and its applicationsFundamentals of data mining and its applications
Fundamentals of data mining and its applications
 
Privacy Preserving Distributed Association Rule Mining Algorithm for Vertical...
Privacy Preserving Distributed Association Rule Mining Algorithm for Vertical...Privacy Preserving Distributed Association Rule Mining Algorithm for Vertical...
Privacy Preserving Distributed Association Rule Mining Algorithm for Vertical...
 
A review on privacy preservation in data mining
A review on privacy preservation in data miningA review on privacy preservation in data mining
A review on privacy preservation in data mining
 
A Review on Privacy Preservation in Data Mining
A Review on Privacy Preservation in Data MiningA Review on Privacy Preservation in Data Mining
A Review on Privacy Preservation in Data Mining
 
A Review on Privacy Preservation in Data Mining
A Review on Privacy Preservation in Data MiningA Review on Privacy Preservation in Data Mining
A Review on Privacy Preservation in Data Mining
 
A Review on Privacy Preservation in Data Mining
A Review on Privacy Preservation in Data MiningA Review on Privacy Preservation in Data Mining
A Review on Privacy Preservation in Data Mining
 
J018116973
J018116973J018116973
J018116973
 
data minig for eng with all topics and history
data minig for eng with all topics and historydata minig for eng with all topics and history
data minig for eng with all topics and history
 
K017167076
K017167076K017167076
K017167076
 
Analysis of Pattern Transformation Algorithms for Sensitive Knowledge Protect...
Analysis of Pattern Transformation Algorithms for Sensitive Knowledge Protect...Analysis of Pattern Transformation Algorithms for Sensitive Knowledge Protect...
Analysis of Pattern Transformation Algorithms for Sensitive Knowledge Protect...
 
Data security and privacy
Data security and privacyData security and privacy
Data security and privacy
 
Multilevel Privacy Preserving by Linear and Non Linear Data Distortion
Multilevel Privacy Preserving by Linear and Non Linear Data DistortionMultilevel Privacy Preserving by Linear and Non Linear Data Distortion
Multilevel Privacy Preserving by Linear and Non Linear Data Distortion
 
DATA SCIENCE METHODOLOGY FOR CYBERSECURITY PROJECTS
DATA SCIENCE METHODOLOGY FOR CYBERSECURITY PROJECTS DATA SCIENCE METHODOLOGY FOR CYBERSECURITY PROJECTS
DATA SCIENCE METHODOLOGY FOR CYBERSECURITY PROJECTS
 
Data Mining Applications And Feature Scope Survey
Data Mining Applications And Feature Scope SurveyData Mining Applications And Feature Scope Survey
Data Mining Applications And Feature Scope Survey
 

More from IJERD Editor

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksIJERD Editor
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEIJERD Editor
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...IJERD Editor
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’IJERD Editor
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignIJERD Editor
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationIJERD Editor
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...IJERD Editor
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRIJERD Editor
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingIJERD Editor
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string valueIJERD Editor
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...IJERD Editor
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...IJERD Editor
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraIJERD Editor
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...IJERD Editor
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...IJERD Editor
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingIJERD Editor
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...IJERD Editor
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart GridIJERD Editor
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderIJERD Editor
 

More from IJERD Editor (20)

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACE
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding Design
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and Verification
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive Manufacturing
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string value
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF Dxing
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart Grid
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powder
 

Recently uploaded

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 

Recently uploaded (20)

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 

www.ijerd.com

  • 1. International Journal of Engineering Research and Development ISSN: 2278-067X, Volume 1, Issue 8 (June 2012), PP.18-21 www.ijerd.com Privacy Preserving Association Rule in Data Mining Jayashree Patil1, Y.C.Kulkarni2 1,2 BVDUCOE, Pune,India, Abstract—Privacy is an important issue in Data mining. The privacy field has seen speedy advances in current years because ability to store data has increased. Precisely, current advances in the data mining field have led to increased concerns about privacy. Privacy-preserving data mining has been studied extensively, because of the wide proliferation of sensitive information on the internet. . Many methods have been brought out to solve this. As a result privacy becomes one of the prime anxieties in data mining research public. A new class of data mining approaches, known as privacy preserving data mining algorithms, has been developed by the research public working on security and knowledge discovery. The goal of these algorithms is the extraction of relevant knowledge from large amount of digital data and while protecting at the same time sensitive information. Several data mining techniques, incorporating privacy protection mechanisms, have been advanced that allow one to hide sensitive item sets or patterns, before the data mining process is executed. Association rule mining helps to preserves the confidentiality of each database. To find the association rule, each participant has to segment their own data. Thus, much privacy information may be transmitted or been illegal used. Association rule mining is one of the vital problems in data mining, privacy preserving classification methods, instead, prevent a miner from building a classifier which is able to predict sensitive data. Keywords—Data mining, Data hiding, Knowledge hiding, Association Rule, Privacy preserving I. INTRODUCTION Data mining technology has been developed with the goal of providing tools for automatically and intelligently transforming large amount of data in knowledge relevant to users. The extracted knowledge often expressed in form of association rules decision trees or clusters, allows one to find interesting patterns and regularities deeply buried in the data, which are meant to facilitate decision making processes. Such a knowledge discovery process however can also return sensitive information about individuals, compromising the individual’s right to privacy. Moreover data mining techniques can reveal critical information about business transactions, compromising the free competition in a business setting. Thus, there is a strong need to prevent disclosure not only of confidential personal information, but also of knowledge which is considered sensitive in a given context. For this reason, recently much research effort has been devoted to addressing the problem of privacy preserving in data mining. As a result several data mining techniques, incorporating privacy protection mechanisms, have been developed based on different approaches. For instance, various sanitization techniques have been proposed for hiding sensitive items or patterns that are based on removing reserved information or inserting noise into data. Privacy preserving classification methods instead, prevent a miner from building a classifier able to predict sensitive data. Additionally privacy preserving clustering techniques have been recently proposed, which distort sensitive numerical attributes while preserving general features for clustering analysis. Given the number of different privacy preserving association rule mining techniques that have been developed over the last years, there is an emerging need of moving toward standardization in this new research area. Because all the various techniques differ among each other with respect to a number of criteria like performance, data quality, privacy level, it is important to provide a systematic and comprehensive study for their evaluation. In many cases no technique is better than the other ones with respect to all criteria. Thus, one has to select the privacy preserving technique based on the criterion to be optimized. A framework like the one developed here is thus essential in order to select the privacy preserving technique which is more adequate based on the data and the requirements of the application domain. In evaluating privacy preserving association rule mining algorithm it is important to assess the quality of the transformed data. In evaluating privacy preserving association rule mining algorithm it is important to assess the quality of the transformed data To do this, we need methodologies for the assessment of the quality of data, intended as the state of the individual items in the database resulting from the application of a privacy preserving technique, as well as the quality of the information that is extracted from the modified data by using a given data mining method. This presents such a methodology which allows one to compare the various privacy preserving techniques on a common platform. The methodology consists of a number of evaluation criteria and a set of tools for data pre-processing and privacy preserving data mining algorithm evaluation [1]. II. BACKGROUND As we know, the data processed in data mining may be obtained from many sources in which different data types may be used. However, no algorithm can be applied to all applications due to the difficulty for fitting data types of the algorithm, so the selection of an appropriate mining algorithm is based on not only the goal of application, but also the data fit ability. Therefore, to transform the non-fitting data type into target one and protecting private data is also an important work in data mining, but the work is often tedious or complex since a lot of data types exist in real world. Merging the similar data types of a given selected mining algorithm into a generalized data type seems to be a good approach to reduce the transformation complexity. Recent research in the area of privacy preserving data mining has devoted much effort to 18
  • 2. Privacy Preserving Association Rule in Data Mining determine a trade-off between the right to privacy and the need of knowledge discovery which is crucial in order to improve decision-making processes and other human activities. Such research has resulted in several approaches to the evaluation of privacy preserving techniques. Verykios et al. (2004) analyze the state-of-the-art in the area of Privacy Preserving Data Mining (PPDM), classifying the proposed privacy preservation techniques according to five different dimensions:  Data distribution (centralized or distributed).  The modification applied to the data (encryption, perturbation, generalization, and so on) in order to sanitize them.  The data mining algorithm which the privacy preservation technique is designed for.  The data type (single data items or complex data correlations) that need to be protected from disclosure.  The approach adopted for preserving privacy (heuristic, reconstruction or cryptography based approaches). Oliveira and Zaiane (2002) propose a heuristic-based framework for preserving privacy in mining frequent item sets. They focus on hiding a set of frequent patterns, containing highly sensitive knowledge. They propose a set of sanitized algorithms that only remove information from a transactional database, also known in the SDC area as non-perturbative algorithms, unlike those algorithms, that modify the existing information by inserting noise into the data, referred to as perturbative algorithms. The algorithms proposed by Oliveira and Zaiane rely on a item-restriction approach, in order to avoid the addition of noise to the data and limit the removal of real data. In the evaluation of the proposed algorithms they introduce some measures quantifying the effectiveness and the efficiency of their algorithms. The first parameter is evaluated in terms of: Hiding Failure, that is, the percentage of restrictive patterns that are discovered from the sanitized database Misses Cost, that is, the percentage of non-restrictive patterns that are hidden after the sanitization process; Artifactual Pattern, measured in terms of the percentage of discovered patterns that are artifacts[4]. The specific algorithms proposed by Oliveira and Zaiane do not introduce any artifactual patterns, whereas with respect to the hiding failure and misses cost parameters, it turns out that the more restrictive patterns are hidden, the more legitimate patterns are missed. The specification of a disclosure threshold Ф, representing the percentage of sensitive transactions that are not sanitized, allows one to find a balance between the hiding failure and the number of misses. The efficiency of the algorithms is measured in terms of CPU time, by first keeping constant both the size of the database and the set of restrictive patterns, and then by increasing the size of the input data in order to assess the algorithm scalability. Moreover, Oliveira and Zaiane propose three different methods to measure the dissimilarity between the original and sanitized databases. The first method is based on the difference between the frequency histograms of the original and the sanitized databases. The second method is based on computing the difference between the sizes of the sanitized database and the original one. The third method is based on a comparison between the contents of two databases. In Sweeney (2002) Sweeney proposes a heuristic-based approach for protecting raw data through generalization and suppression techniques. The methods she proposes provide K-Anonymity. Roughly speaking a database is K- anonymous with respect to some attributes if there exist at least k transactions in the database for each combination of the attribute values. A database A can be converted into a new database A1 that guarantees the K Anonymity property for a sensible attribute by performing some generalizations on the values of the target attributes. As result, such attributes are susceptible to cell distortion due to the different level of generalization applied in order to achieve K Anonymity technique s for hiding sensitive information [5]. A framework for mining association rules from transactions consisting of categorical items is proposed (Evfimievski et al. (2002) where the data has been randomized to preserve privacy of individual communications, ensuring at the same time that only true associations are mined. They also provide a formal definition of privacy cracks and a class of randomization operators that are effective in limiting cracks than uniform randomization. Definition accordingly (Evfimievski et al. (2002) an item set A results in a privacy break of level ρ if the likelihood that an item in A belongs to a non randomized transaction, given that A is included in a randomized transaction, is greater or equal to ρ . In some scenarios, being confident that item be not present in the original transaction may be considered a privacy breach. In order to evaluate the privacy cracks, the approach taken by Evfimievski et al. is to count the occurrences of an item set in a randomized transaction and in its sub-items in the corresponding non randomized transaction. Out of all sub-items of an item set, the item causing the worst privacy breach is chosen. Then, for each combination of transaction size and item set size, the worst and the average value of this breach level are computed over all frequent item sets. Finally, the item set size giving the worst value for each of these two values is selected.[2]. Clifton (2002) defined a Cryptography-based approach. Such approach reports the problem of association_ rule_ mining in vertically_ partitioned_ data. Aim is to determine the item frequency when transactions are split through different sites, without revealing the contents of individual transactions. A security and communication analysis is also presented. In particular, the security of the protocol for computing the scalar product is analysed. The total communication cost depends on the number of candidate item sets and can best be expressed as a constant multiple of the I/O cost of the aprior algorithm [3]. 19
  • 3. Privacy Preserving Association Rule in Data Mining III. EVALUATION MODEL The main goals of a privacy preserving association rule mining algorithm should enforce:  A privacy preserving association rule mining algorithm should have to prevent the discovery of sensible information.  It should be resistant to the various data mining techniques.  It should not compromise the access and the use of non sensitive data.  It should be usable on large amounts of data.  It should not have an exponential computational complexity Current privacy preserving association rule mining algorithms do not satisfy all these goals at the same time; for instance, only few of them satisfy the point (2). The above list of goals helps us to understand how to evaluate these algorithms in a common way. The framework is identified is based on the following evaluation dimensions:  Efficiency - the ability of a privacy preserving algorithm to execute with good performance in terms of all the resources implied by the algorithm  Scalability - which evaluates the efficiency trend of a privacy preserving data mining algorithm for increasing sizes of the data from which relevant information is mined while ensuring privacy  Data quality – After the application of a privacy preserving technique, considered both as the quality of data themselves and the quality of the data mining results after the hiding strategy is applied  Hiding failure - The portion of sensitive information that is not hidden by the application of a privacy preservation technique. Privacy level offered by a privacy preserving technique, which estimates the degree of uncertainty, according to which sensitive information, that has been hidden, can still be predicted. IV. CURRENT METHODOLOGY To measure the effective accuracy of the parameters some experimental evaluations on a set of data hiding algorithms have been carried out.. The data set and methodology which have been used are described for the evaluation process. A. Rule hiding Problem: A formal description of the rule hiding problem is given. Let D be a transactional database and I = {i1,. . . , in} be a set of literals, called items. Each transaction can be considered as an item set that is included in I. The items in a transaction or in an item set are sorted according to a lexicographic order. According to a bitmap notation, each transaction t in the database D is represented as a triple <TID ,values of items, size>, where TID is the identifier of the transaction t, and values of items is a list of values, one value for each item in I, associated with transaction t. An item is supported by a transaction t if its value in the values of items is 1, and it is not supported by t if its value in the values of items is 0. Size is the number of 1 value which appears in the values of items, that is, the number of items supported by the transaction. An association rule is an effect of the form X => Y between two disjoint item sets X and Y in I. Each rule is assigned both a support and a confidence value. The first one is a measure of a rule frequency, more precisely, it is the chance to find in the database transactions containing all the items in XỤY, whereas the confidence is a measure of the strength of the relation between the antecedent X and the consequent Y of the rule, that is, the probability to find transactions containing all the items in XỤY, once we know that they contain X. An association rule mining process consists of two steps: first step is the identification of all the frequent item sets, that is, all the item sets, whose supports are higher than a pre-determined minimum support threshold, minsupp; and second step is the generation of strong association rules from the frequent item sets, that is, those frequent rules whose confidence values are higher than a minimum confidence threshold, minconf. Along with confidence and support, a sensitivity level is assigned only to both frequent and strong rules. If a strong and frequent rule is above a certain sensitivity level, the hiding process should be applied in such a way that either the frequency or the strength of the rule is reduced below the min_supp and the min_conf correspondingly. The problem of association rule hiding can be stated as follows: given a database D, a set R of relevant rules that are mined from D and a subset Rh of those sensitive rules included in R, we want to transform D into a database D’ in such a way that the rules in R can still be mined, except for the rules in Rh. B. Rule hiding algorithms based on data fuzziffication: According to the data fuzzification method , a sequence of symbol in the new alphabet of an item {0,1,?} is related with each transaction where one symbol is associated with each item in the set of items I. The ith value in the list of valu es is 1 if the transaction supports the ith item, it is 0 otherwise. The novelty of this approach is the insertion of an uncertainty symbol, e.g. a question mark, in a given position of the list of values which means that there is no information on whether the transaction supports the corresponding item. In this case, the confidence and the support of an association rule may be not uniquely determined, but they can range between a minimum and a maximum value. The least support of an item set is defined as the percentage of transactions that certainly support the item set, while the extreme support represents the percentage of transactions that support or could support the item set. The minimum confidence of a rule is obviously the minimum level of confidence that the rule can accept based on the support value, and similarly for the maximum confidence. A rule hiding process takes place according to two different strategies: decreasing its support or its confidence. The adopted alternative strategies aim at introducing uncertainty in the frequency or the importance of the rules to hide. 20
  • 4. Privacy Preserving Association Rule in Data Mining The two strategies reduce the minimum support and the minimum confidence of the item sets generating these rules below the minimum support threshold (MST) and minimum confidence threshold (MCT) correspondingly by a certain safety margin (SM) fixed by the user. In order to reduce the support of the large item set generating a sensitive rule, Algorithm 1 replaces 1’s by “ ? “ for the items in transactions associate the item set until its minimum support goes below the minimum support threshold MST by the fixed safety margin SM. Algorithms CR1 and CR2 operate by reducing the minimum sureness value of sensitive rules. The first one decreases the minimum support of the generating item set of a sensitive rule by replacing items of the rule consequent with unknown values. The second one, instead, increases the supreme support value of the antecedent of the rule to hide via placing question marks in the place of the zero values of items in the antecedent. All the fuzzification algorithms hide a sensitive rule with an uncertainty level by decreasing the minimum support or confidence values below the resulting thresholds, MST-SM and MCT-SM. V. CONCLUSION In this paper, a methodology for evaluating privacy preserving association rule mining algorithms is proposed. Such methodology allows one to assess the different features of a privacy preserving algorithm according to a variety of evaluation criteria. Parameters like level of privacy, data quality, data types fitability and hiding failure have been defi ned and the evaluations of such parameters over a set of association rule hiding algorithms have been presented, which can help users to select suitable data mining algorithms for their data sets. The proposed evaluation methodologies can be applied in new set of privacy preservation like cryptography-based and web-based algorithms. REFERENCES [1]. Agrawal, R. and Srikant, R. 2000. Privacy preserving datamining.In Proceeedings of the ACM SIGMOD conferenceof management of data, ACM, pp. 439.450. [2]. J Evfimievski, A. 2002. Randomization in privacy preservingdata mining. SIGKDD Explor.Newsl., 4(2):43.48J. Breckling, Ed., The Analysis of Directional Time Series: Applications to Wind Speed and Direction, ser. Lecture Notes in Statistics. Berlin, Germany: Springer, 1989, vol. 61. [3]. Kantarcioglu, M. and Clifton, C. 2002. Privacy preserving distributed mining of association rules on horizontallypartitioned data. In ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery, pp. 24.31. [4]. Oliveira, S.R.M. and Zaiane, O.R. 2002. Privacy preservingfrequent itemset mining. In IEEE icdm Workshop onPrivacy, Security and Data Mining, Vol. 14, pp. 43.54. [5]. Sweeney, L. 2002. Achieving k-anonymity privacy protectionusing generalization and suppression. International Journalof Uncertainty, Fuzziness and Knowledge Based Systems,10(5):571.588. 21