A Survey on Privacy-Preserving Mining of Association Rule on Databases
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 114 | Views: 328

Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 11, November 2014 | Popularity: 6.6 / 10


     

A Survey on Privacy-Preserving Mining of Association Rule on Databases

Asavari G.Smart, P. M. Mane


Abstract: Many large businesses share their data, outsourcing for their business problem. In the field of data mining Privacy Preserving Data Mining (PPDM) is a research area related with the protecting private data. Nowadays, privacy preserving has widely used field of research. In the area of data mining PPDM is important field of research. In PPDM, various methods and techniques have been used till date. In this paper, we provide survey on Privacy Preserving Association Rule Mining. This is popular technique in pattern discovery methods in the field of privacy preserving data mining. In recent years, many algorithms have been proposed. We divide the proposals of privacy preserving association rule mining into three categories: reconstruction-based techniques, heuristic-based techniques, cryptography-based techniques. Finally, we conclude further research directions of privacy preserving algorithms of association rule mining by analysing the existing work.


Keywords: privacy preserving algorithm, association rule mining, data mining, security, private data


Edition: Volume 3 Issue 11, November 2014


Pages: 2234 - 2236



Make Sure to Disable the Pop-Up Blocker of Web Browser


Text copied to Clipboard!
Asavari G.Smart, P. M. Mane, "A Survey on Privacy-Preserving Mining of Association Rule on Databases", International Journal of Science and Research (IJSR), Volume 3 Issue 11, November 2014, pp. 2234-2236, https://www.ijsr.net/getabstract.php?paperid=OCT141415, DOI: https://www.doi.org/10.21275/OCT141415

Similar Articles

Downloads: 6 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 1, January 2024

Pages: 516 - 519

I-Vote Android Application for Internet-Voting

Rahul Kumar, Hima Saxena, Dr. Suman Sharma

Share this Article

Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this Article

Downloads: 138 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2246 - 2249

Packet Analysis with Network Intrusion Detection System

Rashmi Hebbar, Mohan K

Share this Article

Downloads: 0

Survey Paper, Computer Science & Engineering, India, Volume 11 Issue 7, July 2022

Pages: 1023 - 1029

A Survey and High-Level Design on Human Activity Recognition

Abhishikat Kumar Soni, Dhruv Agrawal, Md. Ahmed Ali, Dr. B. G. Prasad

Share this Article

Downloads: 0

Research Paper, Computer Science & Engineering, India, Volume 11 Issue 11, November 2022

Pages: 642 - 647

Face Liveness to Identify Between Actual Face and Spoof Face

Lovely Pal, Renuka Singh

Share this Article
Top