International Journal of Advance Computational Engineering and Networking (IJACEN)
Follow Us On :
current issues
Volume-8,Issue-9  ( Sep, 2020 )
Past issues
  1. Volume-8,Issue-8  ( Aug, 2020 )
  2. Volume-8,Issue-7  ( Jul, 2020 )
  3. Volume-8,Issue-6  ( Jun, 2020 )
  4. Volume-8,Issue-5  ( May, 2020 )
  5. Volume-8,Issue-4  ( Apr, 2020 )
  6. Volume-8,Issue-3  ( Mar, 2020 )
  7. Volume-8,Issue-2  ( Feb, 2020 )
  8. Volume-8,Issue-1  ( Jan, 2020 )
  9. Volume-7,Issue-12  ( Dec, 2019 )
  10. Volume-7,Issue-11  ( Nov, 2019 )

Statistics report
Jan. 2021
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
Issue Published : 92
Paper Published : 1266
No. of Authors : 3180
  Journal Paper

Paper Title
Design And Development Of Novel Approach For Privacy Preservation Of Utility Patterns In Knowledge Discovery Process

The huge applications of data mining technologies have raised the concerns about securing information against unauthorized access, which serves as the important goal of database security and privacy. Privacy and security are the most significant essentialities, when data is distributed. Privacy is a term that is associated with mining task, with which we are able to hide some crucial information that we don’t want to disclose to the public. The important consideration in privacy preservation is to provide a proper balance between privacy protection and knowledge discovery. In order to handle these scenarios carefully, we propose a privacy preserving utility mining method in this paper based on the process, namely, sanitization, measure reduction in mining and post-reduction of sensitivity. The data sanitization is the process of identifying and reducing the sensitive attributes from the database and in the second way, the sensitive attributes are identified through the knowledge discovery process and the measure is reduced. In the third way, the utility pattern mined from the database is converted into insensitive utility patterns. The proposed approach is designed to handle privacy protection effectively using these three ways. Here, the utility pattern mining algorithm is devised utilizing the tree-based data structure and then, the privacy protection schemes are applied. The performance of the proposed approach is evaluated with the help of benchmark databases and three different evaluation metrics such as, hiding failure, miss cost and database difference ratio.The proposed approach is implemented using JAVA. Keywords— Utility Mining, Sanitization, Privacy Protection, Knowledge Discovery, Database Security.

Author - Ghouse Mohiyaddin Sharif G.M, Anooj Padmakumari Kunj Unni Nair

| PDF |
Viewed - 89
| Published on 2015-10-13
IRAJ Other Journals
IJACEN updates
Paper Submission is open now for upcoming Issue.
The Conference World