Seminar Topics & Project Ideas On Computer Science Electronics Electrical Mechanical Engineering Civil MBA Medicine Nursing Science Physics Mathematics Chemistry ppt pdf doc presentation downloads and Abstract

Full Version: Main Project On Hiding Sensitive Association Rules with Limited Side Effects
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
Main Project On Hiding Sensitive Association Rules with Limited Side Effects


[attachment=53927]

ABSTRACT

Data mining techniques have been widely used in various applications. However, the misuse of these techniques may lead to the disclosure of sensitive information. Researchers have recently made efforts at hiding sensitive association rules. Nevertheless, undesired side effects, e.g., nonsensitive rules falsely hidden and spurious rules falsely generated may be produced in the rule hiding process. In this paper, we present a novel approach that strategically modifies a few transactions in the transaction database to decrease the supports or confidences of sensitive rules without producing the side effects. Since the correlation among rules can make it impossible to achieve this goal, in this paper, we propose heuristic methods for increasing the number of hidden sensitive rules and reducing the number of modified entries.
The experimental results show the effectiveness of our approach, i.e., undesired side effects are avoided in the rule hiding process. The results also report that in most cases, all the sensitive rules are hidden without spurious rules falsely generated. Moreover, the good scalability of our approach in terms of database size and the influence of the correlation among rules on rule hiding are observed.

Existing System

Although a business might use a set of programs that it knows and trusts, and might train its administrators and Help Desk personnel to support those programs, administrators lose control as soon as users begin running unknown code. The increasing role of the Internet in business puts your network at a greater risk than ever before.

Proposed System

Sensitive rules are the major advantage of the proposed system. We can get the copy of the database without affecting the original database. For this purpose we are using the sensitive rules. For example, in one organization a salesman always giving the good production means remaining staff those who want to get a good profit can use his database from him. If someone made any changes in that original database means we cannot retrieve the original data again.
Because of that purpose we are building the project to get the copy of database using the sensitive rules. It does not affect the original database forever. It provides restricting access to sensitive data and Security to End user.
We remove the assumption and allow the user to select sensitive rules from all strong rules such as Minimum support threshold (MST) and Minimum Confidence Threshold (MCT).