CFP last date
20 May 2024
Reseach Article

Privacy Preserving Association Rule Mining using Horizontally Partition Data: Review Paper

by Arpita B. Modh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 111 - Number 7
Year of Publication: 2015
Authors: Arpita B. Modh
10.5120/19548-0726

Arpita B. Modh . Privacy Preserving Association Rule Mining using Horizontally Partition Data: Review Paper. International Journal of Computer Applications. 111, 7 ( February 2015), 7-9. DOI=10.5120/19548-0726

@article{ 10.5120/19548-0726,
author = { Arpita B. Modh },
title = { Privacy Preserving Association Rule Mining using Horizontally Partition Data: Review Paper },
journal = { International Journal of Computer Applications },
issue_date = { February 2015 },
volume = { 111 },
number = { 7 },
month = { February },
year = { 2015 },
issn = { 0975-8887 },
pages = { 7-9 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume111/number7/19548-0726/ },
doi = { 10.5120/19548-0726 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:47:46.522453+05:30
%A Arpita B. Modh
%T Privacy Preserving Association Rule Mining using Horizontally Partition Data: Review Paper
%J International Journal of Computer Applications
%@ 0975-8887
%V 111
%N 7
%P 7-9
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In Data mining is used to extract interested pattern or knowledge from large amount of data using many data mining technique. However it may also display sensitive information about individuals compromising the individual right to privacy When a collection of data is split among various parties. Now Each and Every party would wants to keep its sensitive information private during the mining process. Privacy preserving data mining is to develop data mining method without increases the risk of misuse of data. The main aim of privacy preserving data mining is to find the global mining results by preserving the individual sites private data/information. The various methods such as randomization, perturbation, heuristic and cryptography techniques. To Find privacy pre serving association rule mining in horizontally and vertically partitioned databases. In this paper, the analysis of different methods for PPARM is performed and their results are compared. Horizontally Partitioned databases, algorithm that combines advantage of both RSA public key cryptosystem and Homomorphic encryption scheme and algorithm that uses Paillier cryptosystem to compute global supports are used. This paper reviews the wide methods used for mining association rules over horizontally distributed dataset while preserving privacy.

References
  1. R. Agrawal, and R. Srikant. Fast algorithms for mining association rules. In: Proceeding of the 20th International Conference on Very Large Data Bases, 1994:487-499.
  2. D. Cheung, J. Han, V. Ng, et al. A fast distributed algorithm for mining association rules. In: Proceedings of 1996 International Conference of Parallel and Distributed Information Systems 1996:31-42.
  3. Mahmoud Hussein, Ashraf El-Sisi, Nabil Ismail: Fast CryptographicPrivacy Preserving Association Rules Mining on DistributedHomogenous Data Base. Knowledge-Based Intelligent Information andEngineering Systems, Lecture Notes in Computer Science, Volume5178/2008, pp. 607 -- 616 (2008)
  4. Xuan Canh Nguyen, Hoai Bac Le, Tung Anh Cao, "An Enhanced Scheme For Privacy-Preserving Association Rules Mining On Horizontally Distributed Databases," In 2012 IEEE.
  5. R. Agrawal, A. Evfimievski, and R. Srikant. Information sharing across private databases. In: Proceedings of The 2003 ACM SIGMOD International Conference on Management of Data. 2003:86-97.
  6. M. Kantarcioglu, and C. Clifton. Privacy-preserving distributed mining of association rules on horizontally partitioned Data. IEEE Transaction on Knowledge and Data Engineering. 2004, 16(9):1026-1037.
Index Terms

Computer Science
Information Sciences

Keywords

Privacy Preserving association rule mining cryptography method Secure multiparty computation.