Privacy Preserving Association Rules by Using Greedy Approach
#1

Privacy Preserving Association Rules by Using Greedy Approach

[attachment=16378]

Introduction
In the data mining, the most well-known method is the
Apriori algorithm. Since the Apriori algorithm is costly to find
candidate itemsets, there are many variants of Apriori that
differ in how they check candidate itemsets against the
database [4]. For example, Zaki et al. [9] presented the
algorithms MaxEclat and CHARM for identifying maximal
frequent itemsets. Furthermore, in [8] employed an efficient
data structure FCET and a novel algorithm GMAR to mine
generalized association rules.
Recently

Problem Formulation
Let Γ={i1,i2,i3…in} be a set of literals, called items. Let
D={T1,T2,…Tm} be a set of transactions which is the database
that is going to be disclosed. Each transaction Tj∈D is a subset
of Γ of itemsets, such that T⊆ Γ. For each transaction Tj is
associated with a unique identifier, which we call TID. We
assume that the items in a transaction or an itemset are sorted
in lexicographic order.


The Framework for Privacy Preservation
As depicted in Figure 2, our framework consists of an
original database, mining algorithm, FCET index tree,
sanitized algorithm used for hiding restrictive association rules
from the database, and a transaction retrieval procedure which
is included in sanitizing algorithm for fast retrieval of
transactions.


The Greedy Approach
As depicted in Figure 3, our greedy approach include the
sanitize procedure, we also use extra two sets that are artificial
set and missing set where the values in sets store for artificial
rules and missing rules, respectively. Initially, the sensitive
rules are stored in the sensitive set. The missing set and
artificial set are empty
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: who is timmy on rules, using a hash based method with transaction trimming and database scan reduction for mining association rules presentation, hiding sensitive association rules with limited side effects, mining association rules between sets of items, safety rules in, on the deep order preserving submatrix problem a best effort approach, nra rules,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Privacy-Preserving Updates to Anonymous and Confidential Databases - JAVA project uploader 3 2,184 23-12-2012, 07:35 PM
Last Post: mr.patil1234
  Hiding Sensitive Association Rules with Limited Side Effects seminar paper 1 1,363 19-11-2012, 12:21 PM
Last Post: seminar details
  Benefits of the 3R approach for agricultural waste management seminar details 0 1,008 12-06-2012, 01:01 PM
Last Post: seminar details
  The CoQUOS Approach to Continuous Queries in Unstructured Overlays seminar details 0 1,048 09-06-2012, 05:21 PM
Last Post: seminar details
  Computer Security Pretty Good Privacy seminar details 0 1,000 09-06-2012, 04:22 PM
Last Post: seminar details
  Electronic Industries Association (EIA) seminar details 0 816 09-06-2012, 03:45 PM
Last Post: seminar details
  AN EFFICIENT APPROACH FOR CAPACITOR SIZING AND LOCATION ON A RADIAL seminar details 0 1,053 09-06-2012, 02:17 PM
Last Post: seminar details
  An Object Oriented Approach to Image Restoration in Matlab seminar details 0 907 07-06-2012, 05:28 PM
Last Post: seminar details
  An Energy efficient approach in Heterogeneous WSN project uploader 0 1,476 06-06-2012, 11:42 AM
Last Post: project uploader
  SECURITY and PRIVACY IN WIRELESS LAN seminar details 0 802 05-06-2012, 05:57 PM
Last Post: seminar details

Forum Jump: