International Journal of Advance Computational Engineering and Networking (IJACEN)
.
Follow Us On :
current issues
Volume-12,Issue-8  ( Aug, 2024 )
Past issues
  1. Volume-12,Issue-7  ( Jul, 2024 )
  2. Volume-12,Issue-6  ( Jun, 2024 )
  3. Volume-12,Issue-5  ( May, 2024 )
  4. Volume-12,Issue-4  ( Apr, 2024 )
  5. Volume-12,Issue-3  ( Mar, 2024 )
  6. Volume-12,Issue-2  ( Feb, 2024 )
  7. Volume-12,Issue-1  ( Jan, 2024 )
  8. Volume-11,Issue-12  ( Dec, 2023 )
  9. Volume-11,Issue-11  ( Nov, 2023 )
  10. Volume-11,Issue-10  ( Oct, 2023 )

Statistics report
Dec. 2024
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
Issue Published : 140
Paper Published : 1656
No. of Authors : 4371
  Journal Paper


Paper Title :
Design And Development Of Novel Approach For Privacy Preservation Of Utility Patterns In Knowledge Discovery Process

Author :Ghouse Mohiyaddin Sharif G.M, Anooj Padmakumari Kunj Unni Nair

Article Citation :Ghouse Mohiyaddin Sharif G.M ,Anooj Padmakumari Kunj Unni Nair , (2015 ) " Design And Development Of Novel Approach For Privacy Preservation Of Utility Patterns In Knowledge Discovery Process " , International Journal of Advance Computational Engineering and Networking (IJACEN) , pp. 83-88, Volume-3, Issue-10

Abstract : The huge applications of data mining technologies have raised the concerns about securing information against unauthorized access, which serves as the important goal of database security and privacy. Privacy and security are the most significant essentialities, when data is distributed. Privacy is a term that is associated with mining task, with which we are able to hide some crucial information that we don’t want to disclose to the public. The important consideration in privacy preservation is to provide a proper balance between privacy protection and knowledge discovery. In order to handle these scenarios carefully, we propose a privacy preserving utility mining method in this paper based on the process, namely, sanitization, measure reduction in mining and post-reduction of sensitivity. The data sanitization is the process of identifying and reducing the sensitive attributes from the database and in the second way, the sensitive attributes are identified through the knowledge discovery process and the measure is reduced. In the third way, the utility pattern mined from the database is converted into insensitive utility patterns. The proposed approach is designed to handle privacy protection effectively using these three ways. Here, the utility pattern mining algorithm is devised utilizing the tree-based data structure and then, the privacy protection schemes are applied. The performance of the proposed approach is evaluated with the help of benchmark databases and three different evaluation metrics such as, hiding failure, miss cost and database difference ratio.The proposed approach is implemented using JAVA. Keywords— Utility Mining, Sanitization, Privacy Protection, Knowledge Discovery, Database Security.

Type : Research paper

Published : Volume-3, Issue-10


DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-3100   View Here

Copyright: © Institute of Research and Journals

| PDF |
Viewed - 97
| Published on 2015-10-13
   
   
IRAJ Other Journals
IJACEN updates
Paper Submission is open now for upcoming Issue.
The Conference World

JOURNAL SUPPORTED BY