HIDING SENSITIVE INFORMATION
#1

[attachment=14308]
1.1 ABOUT HIDING SENSITIVE:
Large repositories of data contain sensitive information which must be protected against unauthorized access. Here, we are going to hide sensitive information in large database in order to reduce modifications in database and reduce unwanted side effects. e.g., nonsensitive rules falsely hidden and spurious rules falsely generated may be produced in the rule hiding process. Here, we investigate confidentiality issues of a broad category of rules, which are called association rules. If the disclosure risk of some of these rules are above a certain privacy threshold, those rules must be characterized as sensitive. Sometimes, sensitive rules should not be disclosed to the public since, among other things, they may be used for inferencing sensitive data, or they may provide business competitors with an advantage.
1.2 BENEFITS OF HIDING SENSITIVE:
The experimental results show that the undesired side effects are avoided by using our approach. The results also report that in most cases, all the sensitive rules are hidden without generating false rules. Moreover, the good scalability of our approach in terms of database size and the influence of the correlation among rules on rule hiding are observed.
CHAPTER 2
SYSTEM ANALYSIS
2.1 EXISTING SYSTEM:

Although a business might use a set of programs that it knows and trusts, and might train its administrators and Help Desk personnel to support those programs, administrators lose control as soon as users begin running unknown code. The increasing role of the Internet in business puts your network at a greater risk than ever before.
Such user-installed programs can conflict with other installed programs, change critical configuration data, or introduce a virus. Users often cannot make safe or informed choices about what software to run because viruses intentionally conceal the malicious purpose of the program. Also, the problems that are associated with running unknown code can increase support costs substantially because they lead to more system maintenance, more help desk time, and lost user productivity
2.2 LIMITATIONS:
All the items in a sensitive rule do not appear in any other sensitive rule. With this assumption, hiding a sensitive rule will not affect any other sensitive rule and, therefore, hiding them one at a time or all together will not make any difference. Thus, their algorithms hide one rule at a time and decrease the supports or confidences one unit at a time. Since this work aims at hiding all sensitive rules, it cannot avoid the undesired side effects .
2.3 PROPOSED SYSTEM:
Sensitive rules are the major advantage of the proposed system.
We can get the copy of the database without affecting the original database. For this purpose we are using the sensitive rules. For example, in one organization a salesman always giving the good production means remaining staff those who want to get a good profit can use his database from him. If some one made any changes in that original database means we cannot retrieve the original data again.
Because of that purpose we are building the project to get the copy of database using the sensitive rules. It does not affect the original database forever. It provides restricting access to sensitive data and Security to End user.
We remove the assumption and allow the user to select sensitive rules from all strong rules such as Minimum support threshold (MST) and Minimum Confidence Threshold (MCT).
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: what is hiding sensitive, hiding sensitive information, free downloade hiding sensitive associative rules for ppt, price sensitive information, protecting information and sensitive data, hiding sensitive assocation rules, sensitive plant information,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Packet-Hiding Methods for Preventing Selective Jamming Attacks 1 698 14-02-2017, 11:35 AM
Last Post: ijasti
  Secured Data Hiding and Extractions Using BPCS project report helper 4 3,690 04-02-2016, 12:52 PM
Last Post: seminar report asees
  Data Hiding in Binary Images for Authentication & Annotation project topics 2 1,847 06-11-2015, 02:27 PM
Last Post: seminar report asees
  STUDENT INFORMATION SYSTEM IN JAVA project topics 14 10,648 19-08-2015, 11:28 PM
Last Post: Guest
  INTELLECTUAL INFORMATION SYSTEM USING GPS+GSM smart paper boy 3 2,019 10-04-2015, 09:52 AM
Last Post: seminar report asees
  ENQUIRY INFORMATION ON INSTITUTE full report seminar topics 1 2,231 10-11-2014, 09:15 PM
Last Post: Guest
  WEB PORTAL FOR STUDENT INFORMATION SYSTEM OF E.C.A smart paper boy 2 3,160 29-03-2014, 11:49 PM
Last Post: Guest
  Developing a web application to transfer image and patient information project report maker 2 3,699 21-03-2014, 01:44 AM
Last Post: MichaelPn
  Packet-Hiding Methods for Preventing Selective Jamming Attacks Projects9 5 4,394 30-07-2013, 05:30 PM
Last Post: mounikabujji
  HUMAN RESOURCE INFORMATION SYSTEMS electronics seminars 1 2,172 29-11-2012, 01:51 PM
Last Post: seminar details

Forum Jump: