2012
DOI: 10.5120/4883-7321
|View full text |Cite
|
Sign up to set email alerts
|

Privacy Preserving Association Rule Mining in Vertically Partitioned Databases

Abstract: Data mining techniques are useful to discover hidden patterns from the large databases. Association rule mining is one of the important data mining techniques to discover relationships between items or item sets. In many organizations the database may exist in centralized or in distributed environment.In distributed environment, database may be partitioned in different ways such as horizontally partitioned, vertically partitioned and mixed mode which consists of both horizontal and vertical partitioning method… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 24 publications
0
5
0
Order By: Relevance
“…N. Muthu Lakshmi and K. Sandhya Rani [9] explored the vertically partitioned databases and had proposed a model to identify association rules. It considers "n" number of sites, and calculate the protection imperatives alongside information data miner.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…N. Muthu Lakshmi and K. Sandhya Rani [9] explored the vertically partitioned databases and had proposed a model to identify association rules. It considers "n" number of sites, and calculate the protection imperatives alongside information data miner.…”
Section: Related Workmentioning
confidence: 99%
“…Mining must also incorporate the efficiency in usage of information and users should be benefitted in terms of order of protection. The security and protection schemes used in information mining implements the techniques such as, cryptography, buildup, K-secrecy, Ldiversity, randomization techniques [8,9]. The Privacy Preserving Data Mining strategies secure the information by hiding or concealing some sensitive data with the goal that private data isn't easily accessible.…”
Section: Introductionmentioning
confidence: 99%
“…The structure is to modify a trade off among mystery and efficiency. The use cryptographic techniques constantly have computational costs to keep away from information spillage [4,6].…”
Section: Introductionmentioning
confidence: 99%
“…When data is distributed among different sites, finding the global association rules is a challenging task as the privacy of the individual site's data is to be preserved. In this paper, a model is proposed to find global association rules by preserving the privacy of individual sites data when the data is partitioned horizontally among n number of sites [4].…”
Section: Introductionmentioning
confidence: 99%