International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 113 | Views: 238

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 6, June 2015 | Popularity: 6.3 / 10


     

Hiding Sensitive Association Rules Using EMDSRRC

Marate Shashank S., Manjusha Yeola


Abstract: Association rules are generated to find out relation between item sets in database. So when it comes to large datasets, generating association rules becomes crucial. There are various techniques which are used to generate association rules such as Apriori algorithm and FP Growth algorithm. To find relation between item sets in database, association rule mining technologies are used. Many organizations uncover their information or data for mutual profits to find some useful information for some decision making purpose and improve their business. But this database may contain some secret data and which the organization doesn't want to uncover. In this paper, a heuristic based algorithm named EMDSRRC (Enhanced Modified Decrease Support of R. H. S. item of Rule Clusters) to hide the sensitive association rules with multiple items in consequent (R. H. S) and antecedent (L. H. S) is proposed. FP growth algorithm is used for generating rules and then selects items based on transactions to hide the sensitive information. We have proposed an algorithm EMDSRRC which uses FP growth algorithm to generate rules to overcome limitation in MDSRRC (Modified Decrease Support of R. H. S. item of Rule Clusters) which uses Apriori algorithm to generate rules.


Keywords: Association Rules, FP growth, Apriori, Sensitivity


Edition: Volume 4 Issue 6, June 2015


Pages: 2832 - 2834



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Marate Shashank S., Manjusha Yeola, "Hiding Sensitive Association Rules Using EMDSRRC", International Journal of Science and Research (IJSR), Volume 4 Issue 6, June 2015, pp. 2832-2834, URL: https://www.ijsr.net/getabstract.php?paperid=SUB156102, DOI: https://www.doi.org/10.21275/SUB156102



Downloads: 656 | Views: 2003

Computer Science & Engineering, India, Volume 9 Issue 7, July 2020

Pages: 1454 - 1458

Heart Disease Prediction with Machine Learning Approaches

Megha Kamboj


Downloads: 401 | Views: 719

Computer Science & Engineering, India, Volume 7 Issue 11, November 2018

Pages: 1951 - 1955

Hadoop Performance Improvement using Metadata and Securing with Oauth Token

Swapnali A. Salunkhe, Amol B. Rajmane


Downloads: 386 | Views: 700

Computer Science & Engineering, India, Volume 9 Issue 12, December 2020

Pages: 1 - 3

Comparative Study of Conventional Desktop Computer and Compute Stick

Aadarsh Sooraj, Sooraj G.


Downloads: 354 | Views: 698

Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 629 - 632

Review Paper on Secure Hashing Algorithm and Its Variants

Priyanka Vadhera, Bhumika Lall


Downloads: 336 | Views: 688

Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2148 - 2152

The Impact and Application of 3D Printing Technology

Thabiso Peter Mpofu, Cephas Mawere, Macdonald Mukosera


Top