Downloads: 111 | Views: 285
Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 12, December 2014 | Popularity: 6.8 / 10
Privacy-Preserving Two-Party Distributed Association Rules Mining on Horizontally Partitioned Data
Patil Suraj Kakaso, Gadage Shriniwas
Abstract: The need of data mining in various fields has been increased with the3 growth in storage of data. Searching the specific data is a tedious task if a wrong method is chosen. Many current applications, the data is stored in diverse locations, called as Distributed scenario. And in such scenarios, the data mining must be done for various reasons. Simultaneously, the security is very important. Opening the data for multiple users will make it more vulnerable to attacks. The misuse of the data is prime concern of the data owners within the distributed data scenario. Therefore, they wont donate their data for mining purpose and if the data is enclosed with some perceptive information, the data sharing goes low. The Privacy-Preserving data mining (PPDM) endeavors to protect the privacy of the data in the course of data mining. More effective and efficient protocols are needed because of the current generic protocols have no practical implementation in this type of case. If the participating sites are more than two, a protocol is required to be developed for the horizontally partitioned data situations occurred. Because of this reason, the Privacy Preserving distributed association rules mining protocols were developed. Yet, they tend to be dependent on a secured multi-party summary and unification computation. But these will not guarantee the security in the case of two participating parties. The implementation of the protocols for the privacy-preserving two-party distributed mining of association rule mining, a secure division computation protocols and use the commutative encryption as the foundation approach has been proposed in this paper.
Keywords: Distributed data scenario, data mining, PPDM, PPDM protocols
Edition: Volume 3 Issue 12, December 2014
Pages: 700 - 702
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 0
Survey Paper, Computer Science & Engineering, India, Volume 11 Issue 8, August 2022
Pages: 947 - 949COVID-19 Prediction using Machine Learning Algorithms
Saily Suresh Patil
Downloads: 1
Research Paper, Computer Science & Engineering, India, Volume 10 Issue 8, August 2021
Pages: 1068 - 1070Predicting the Course Knowledge Level of Students using Data Mining Techniques
Thapaswini P S
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Analysis Study Research Paper, Computer Science & Engineering, India, Volume 12 Issue 11, November 2023
Pages: 1840 - 1846Analysis of Placement for Electronics and Communication Engineering Students using Multiple Clustering
Dr. Dola Sanjay S
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Review Papers, Computer Science & Engineering, India, Volume 13 Issue 3, March 2024
Pages: 1036 - 1039An Investigation of the Applications of Artificial Intelligence and Other New Technologies in Smart Energy Infrastructure
Karan Chawla
Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 11 Issue 10, October 2022
Pages: 660 - 667Prediction of Student Admission using Fuzzy based Education Data Mining
Dr. Nikhat Khan