Privacy Preserving Mining of Association Rules from the Outsourced Transaction Databases
نویسندگان
چکیده
Spurred by developments including cloud processing, there has become considerable recent fascination with the paradigm connected with data mining-as-a-service. A corporation (data owner) short of expertise or even computational methods can outsource their mining must a 3rd party service (server). Even so, both the things and the particular association rules on the outsourced database are thought private property on the corporation (data owner). To defend corporate comfort, the information owner turns its information and lines it on the server, sends exploration queries on the server, and recovers the actual patterns from the extracted designs received from the server. In this particular paper, we study the issue of outsourced workers the affiliation rule exploration task in a corporate privacy-preserving framework. We propose an strike model according to background information and develop a structure for comfort preserving outsourced exploration. Our scheme means that each transformed item is actually indistinguishable, t. r. t. the attacker’s qualifications knowledge, from at least k-1 other transformed things.. Keywords— ARM, Privacy Publishing, Data Mining
منابع مشابه
Privacy-Preserving in Outsourced Transaction Databases from Association Rules Mining
Data mining-as-a-service has been selected as considerable research issue by researchers. An organization (data owner) can outsource its mining needs like resources or expertise to a third party service provider (server). However, both the association rules and the items of the outsourced transaction database are private property of data owner. The data owner encrypts its data, send data and mi...
متن کاملIntroducing an algorithm for use to hide sensitive association rules through perturb technique
Due to the rapid growth of data mining technology, obtaining private data on users through this technology becomes easier. Association Rules Mining is one of the data mining techniques to extract useful patterns in the form of association rules. One of the main problems in applying this technique on databases is the disclosure of sensitive data by endangering security and privacy. Hiding the as...
متن کاملPrivacy-preserving Mining of Association Rules from Outsourced Transaction Databases
Spurred by developments such as cloud computing, there has been considerable recent interest in the paradigm of datamining-as-service. A company (data owner) lacking in expertise or computational resources can outsource its mining needs to a third party service provider (server). However, both the items and the association rules of the outsourced database are considered private property of the ...
متن کاملAn Enhance Encryption Scheme For Privacy-Preserving Mining Association Rules In Outsourced Database
Data mining techniques are used to discover hidden information from large databases. Among many data mining techniques, association rule mining is receiving more attention to the researchers to find correlations between items or items sets efficiently. In distributed database environment, the way the data is distributed plays an important role in the problem definition. The data may be distribu...
متن کاملPrivacy-Preserving Mining of Association Rules on Distributed Databases
Data mining techniques can extract hidden but useful information from large databases. Most efficient approaches for mining distributed databases suppose that all of the data at each site can be shared. However, source transaction databases usually include very sensitive information. In order to obtain an accurate mining result on distributed databases and to preserve the private data that is a...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014