Downloads: 113 | Views: 238
Research Paper | Computer Science & Engineering | India | Volume 4 Issue 6, June 2015 | Popularity: 6.3 / 10
Hiding Sensitive Association Rules Using EMDSRRC
Marate Shashank S., Manjusha Yeola
Abstract: Association rules are generated to find out relation between item sets in database. So when it comes to large datasets, generating association rules becomes crucial. There are various techniques which are used to generate association rules such as Apriori algorithm and FP Growth algorithm. To find relation between item sets in database, association rule mining technologies are used. Many organizations uncover their information or data for mutual profits to find some useful information for some decision making purpose and improve their business. But this database may contain some secret data and which the organization doesn't want to uncover. In this paper, a heuristic based algorithm named EMDSRRC (Enhanced Modified Decrease Support of R. H. S. item of Rule Clusters) to hide the sensitive association rules with multiple items in consequent (R. H. S) and antecedent (L. H. S) is proposed. FP growth algorithm is used for generating rules and then selects items based on transactions to hide the sensitive information. We have proposed an algorithm EMDSRRC which uses FP growth algorithm to generate rules to overcome limitation in MDSRRC (Modified Decrease Support of R. H. S. item of Rule Clusters) which uses Apriori algorithm to generate rules.
Keywords: Association Rules, FP growth, Apriori, Sensitivity
Edition: Volume 4 Issue 6, June 2015
Pages: 2832 - 2834
Make Sure to Disable the Pop-Up Blocker of Web Browser
Downloads: 656 | Views: 2003
Computer Science & Engineering, India, Volume 9 Issue 7, July 2020
Pages: 1454 - 1458Heart Disease Prediction with Machine Learning Approaches
Megha Kamboj
Downloads: 401 | Views: 719
Computer Science & Engineering, India, Volume 7 Issue 11, November 2018
Pages: 1951 - 1955Hadoop Performance Improvement using Metadata and Securing with Oauth Token
Swapnali A. Salunkhe, Amol B. Rajmane
Downloads: 386 | Views: 700
Computer Science & Engineering, India, Volume 9 Issue 12, December 2020
Pages: 1 - 3Comparative Study of Conventional Desktop Computer and Compute Stick
Aadarsh Sooraj, Sooraj G.
Downloads: 354 | Views: 698
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 629 - 632Review Paper on Secure Hashing Algorithm and Its Variants
Priyanka Vadhera, Bhumika Lall
Downloads: 336 | Views: 688
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2148 - 2152The Impact and Application of 3D Printing Technology
Thabiso Peter Mpofu, Cephas Mawere, Macdonald Mukosera