JOURNAL OF COMPUTING, VOLUME 2, ISSUE 10, OCTOBER 2010, ISSN 2151-9617HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCOMPUTING/ WWW.JOURNALOFCOMPUTING.ORG
Security Information Hiding in Data Mining onthe Basis of Privacy Preserving Technique
Dr.R.Dhanapal, Gayathri Subramanian, M.R.Raja Gopal, K.Hemamalini
—Data mining has attracted a great deal of information industry and in society as a whole in recent years, due to thewide availability of huge amount of data and the imminent need for such data into useful information and knowledge. Theinformation and knowledge gained can be used for applications ranging from market analysis, fraud detection and customerretention, to production control and science exploration. With and more information accessible in electronic forms and availableon the web, and increasingly powerful data mining tools being developed and put into use, data mining may pose a threat to ourprivacy and data security .The real privacy concerns are with unconstrained access of individual records, like credit card,banking applications, customer ID, which must access privacy sensitive information. In this paper we investigate the issue ofdata mining, as data shared before mining the means to shield it with Unified Modeling Language diagrams. Describing theprivacy preserving definition, problem statement privacy preserving data mining technique, Architecture of the proposed work.We propose an amalgamated scaffold for Privacy Preserving Data Mining that ensures that the mining process will not trespassPrivacy up to a certain degree of security.
—Association Rules, Clustering, Confidence, Data Snooping, Data Sanitization, Privacy, Privacy Preserving DataMining, Sensitive Data, Unified Modeling Language.
Data mining technology provides the number ofadvantages using automated tools to analyze corporate,research and development, biological, Financial data,retail industry, telecommunication industry, and otherscientific applications can help to find way to increaseefficiency of organization, industry, or in medicalapplications. Privacy preserving data mining [1,2], is anovel research direction in data mining and statisticaldatabases , where data mining algorithms are analyzedfor the side-effects they incur in data privacy. Knowledgecan equally well compromise data privacy, as weknowledge about individuals or groups that could beagainst privacy policies, especially if there is potentialdissemination of discovered information. Another issuethat arises from this concern is the appropriate use of datamining. Due to the value of data, databases of all sorts ofcontent are regularly sold, and because of the competitiveadvantage that can be attained from will indicate. Themain objective in privacy preserving data mining is todevelop algorithms for modifying the original data insome way, so that the private data and private knowledgeremain private even after the mining process. Theproblem that arises when confidential information can bederived from released data by unauthorized users is alsocommonly called the “database inference” problem.Using UML methodology the privacy model to beportrayed with use of several diagrams, such as logicaldiagrams, use case diagrams, scenario and activitydiagrams, collaborations and distribution diagrams,Through the analysis of different occurring privacypreserving research project work scenarios, we were ableto define the use case type, applying the appropriateUML diagrams. Conventional research project recordmaintenance poses sample obstacles to intruders, becausethose seeking to inspect records must have authorization.They can view records only in person. Moreover, becausepaper records were decentralized – a single projectrecords maybe disjointed across a number of places in theevent of a rupture of security, illegitimate access wouldbe restricted.The remainder of this paper is organized as follows:Section 2 offers an overview of the privacy preservingData mining. In this section we have also analyzed thedifferent problems in Data mining and the existingsolutions. Section 3 discusses the problem statement,PPDM techniques for the research project services.Section 4 presents the block diagram, PPDM techniquesfor the research lab services. Section 5 discusses theimplementation details using UML diagrams. Section 6concludes this paper with a brief summary.
Prof.Dr.R.Dhanapal is with the Department of Computer Applications,Easwari Engineering College, Affiliated to Anna University of Technology,Chennai – 600 089, Tamil Nadu, India.
Gayathri Subramanian is with the Department of Computer Science,R B Gothi Jain College for Women, Affiliated to University of Madras,Chennai – 600 052,Tamil Nadu India, a research scholar pursuing Ph.DComputer Science in Dravidian University
M.R. Raja Gopal is with the Department of Computer Science, SwamiDayananda College of Arts and Science, Manjakkudi, a research scholar pursuing Ph.D Computer Science in Dravidian University
K.Hemamalini doing second year MCA at Easwari Engineering College, Affiliated to Anna University of Technology Chennai.