Mining Privacy-Preserving Association Rules based on Parallel Processing in Cloud Computing

by   Dhinakaran D, et al.

With the onset of the Information Era and the rapid growth of information technology, ample space for processing and extracting data has opened up. However, privacy concerns may stifle expansion throughout this area. The challenge of reliable mining techniques when transactions disperse across sources is addressed in this study. This work looks at the prospect of creating a new set of three algorithms that can obtain maximum privacy, data utility, and time savings while doing so. This paper proposes a unique double encryption and Transaction Splitter approach to alter the database to optimize the data utility and confidentiality tradeoff in the preparation phase. This paper presents a customized apriori approach for the mining process, which does not examine the entire database to estimate the support for each attribute. Existing distributed data solutions have a high encryption complexity and an insufficient specification of many participants' properties. Proposed solutions provide increased privacy protection against a variety of attack models. Furthermore, in terms of communication cycles and processing complexity, it is much simpler and quicker. Proposed work tests on top of a realworld transaction database demonstrate that the aim of the proposed method is realistic.


page 2

page 4

page 5

page 8

page 9


A Brief Study of Privacy-Preserving Practices (PPP) in Data Mining

Data mining is the way toward mining fascinating patterns or information...

Preserving Data Confidentiality in Association Rule Mining Using Data Share Allocator Algorithm

These days, investigations of information are becoming essential for var...

cSELENE: Privacy Preserving Query Retrieval System on Heterogeneous Cloud Data

While working in collaborative team elsewhere sometimes the federated (h...

A one-phase tree-based algorithm for mining high-utility itemsets from a transaction database

High-utility itemset mining finds itemsets from a transaction database w...

A lightweight Encryption Method For Privacy-Preserving in Process Mining

Novel technological achievements in the fields of business intelligence,...

Hybrid Microaggregation for Privacy-Preserving Data Mining

k-Anonymity by microaggregation is one of the most commonly used anonymi...

MDL-based Compressing Sequential Rules

Nowadays, with the rapid development of the Internet, the era of big dat...

Please sign up or login with your details

Forgot password? Click here to reset