You are on page 1of 1

HIDING SENSATIVE RULE USING DISTORTION TECHNIQUE

L. Kankane(1), Y. Malpani(2)
(People’s College of Research & Technology, Bhopal, India)

ABSTRACT
Many strategies had been proposed in the The first dimension refers to the
literature to hide the information containing distribution of data. Some of the approaches
sensitive items. Some use distributed have been developed for centralized data,
databases over several sites, some use data while others refer to a distributed data
perturbation, some use clustering and some scenario. The second dimension refers to the
use data distortion technique. Present paper data modification scheme. In general, data
focuses on data distortion technique. modification is used in order to modify the
Algorithms based on this technique either original values of a database that needs to be
hide a specific rule using data alteration released to the public and in this way to
technique or hide the rules depending on the ensure high privacy protection. It is
sensitivity of the items to be hidden. The important that a data modification technique
proposed approach is based on data distortion should be in concert with the privacy policy
technique where the position of the sensitive adopted by an organization. The third
items is altered but its support is never dimension refers to the data mining
changed. The proposed approach uses the algorithm, for which the data modification is
idea of representative rules to prune the rules taking place. This is actually something that
first and then hides the sensitive rules. is not known beforehand, but it facilitates
Experimental results show that proposed the analysis and design of the data hiding
approach hides more number of rules in algorithm. Among them, the most important
minimum number of database scans ideas have been developed for classification
compared to existing algorithms based on the data mining algorithms, like decision tree
same approach i.e. data distortion technique. inducers, association rule mining algorithms,
clustering algorithms, rough sets and
PRIVACY is becoming an increasingly Bayesian networks. The fourth dimension
important issue in many data-mining refers to whether raw data or aggregated
applications that deal with health care, data should be hidden.
security, financial and other types of sensitive
data. It is also becoming important in counter In this work, we have studied the database
terrorism and defense related applications. privacy problems caused by data mining
These applications may require creating technology and proposed e algorithm for
profiles, constructing social network models, hiding sensitive data in association rules
and detecting terrorist communications. This mining. The proposed algorithm doesn’t
calls for well-designed techniques that pay modifying the database transactions so that
careful attention to hiding privacy-sensitive the support &confidence of the association
information while preserving the inherent rules remains unchanged. Examples
statistical dependencies, which are important demonstrating the proposed algorithms are
for data mining applications. There are many shown. The efficiency of the proposed
techniques available for privacy preserving approach is shown in graph It was shown
data mining: that our approach required less number of
• Data distribution database scanning and prune more number
• Data modification of hidden rules.
• Data mining algorithm
• Data or rule hiding
• Privacy preservation

You might also like