Skip to main content
Log in

Association rules and deep learning for cryptographic algorithm in privacy preserving data mining

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

Security in database is important as it contains sensitized information. Data mining provides mechanisms for intermediate representation of data. Privacy preservation is vital due to the security aspects. Privacy denotes mechanisms for allowing the data to be accessed in secured manner. The basic idea is to protect the data that are sensitive from data miners such that it is not possible to pull out the sensitive data from database. Association rules are crucial idea to change the dataset from the original data set. Association rules with cryptographic techniques has been used. They also demonstrate the applicability by applying this algorithm on real life data sets. This research work proposed a well-organized privacy preservation data-mining scheme with data-mining perturbation merged approach. It uses the association rules with cryptography techniques. The paper also demonstrates how neural networks is being applied for predicting the medical dataset. The paper also provides scope on how deep convolution neural network can be applied for medical analysis.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Sharma, S. Agrawal, J., Agarwal, S., Sharma, S.: Machine learning techniques for data mining: a survey. In: Proceeding of the IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), pp. 1–10 (2013)

  2. Shyu, F.-M., Cheng, P.-H., Su, M.-J., Luh, J.-J., Chen, H.-S., Chen, S.-J.: Context-based model for mobile electronic medical records. In: Proceedings of the IEEE Conference, pp. 1–8 (2006)

  3. McLatchey, J. , Barnett, G.O., McDonnell, G., Piggins, J., Zielstorff, R.D., Weidman-Dahl, F., Hoffer, E., Hupp, J.A.: The capturing of more detailed medical information in costar. In: Proceedings of the IEEE Conference, pp. 1–8 (1983)

  4. Pisanelli, D.M., Ricci, F.L.: Electronic medical records: the aggregation of single events for health care planning and quality assurance. In: Proceedings of the IEEE Conference, pp. 1–8 (1991)

  5. Shokri, R., Shmatikov, V.: Privacy-preserving deep learning. In: Proceedings of the Fifty-third Annual Allerton Conference, pp. 909–910 (2015)

  6. Tahamtan, A., Eder, J.: Privacy preservation through process views. In: Proceedings of the 24th International Conference on Advanced Information Networking and Applications Workshops, pp. 1100–1107 (2010)

  7. Meng, F., Liu, B., Wang, C.: Privacy preserving clustering over distributed data. In: Proceedings of the 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE), pp. 544–548 (2010)

  8. Nguyen, H.X., Roughan,M.: Multi-observer privacy-preserving hidden Markov models. In: Proceedings of the IEEE Network Operations and Management Symposium (NOMS): Short Paper, pp. 514–517 (2012)

  9. Mendes, R., Vilela, J.P.: Privacy-preserving data mining: methods, metrics, and applications. IEEE Translat. Content Min. 5, 10562–10582 (2017)

    Google Scholar 

  10. Yu, C.-M., Chen, C.-Y., Chao, H.-C.: Privacy-preserving multikeyword similarity search over outsourced cloud data. IEEE Syst. J. 11(2), 385–393 (2017)

    Article  Google Scholar 

  11. Fung, B.C.M., Wang, K., Fu, A.W.-C., Yu, P.S.: Privacy-preserving data publishing: a survey of recent developments. In: Book—Introduction to Privacy-Preserving Data Publishing: Concepts and Techniques (2010)

  12. Rajesh, N., Selvakumar, A.L.: Hiding personalised anonymity of attributes using privacy preserving data mining. Int. J. Adv. Intell. Paradig. 7(3/4), 395–396 (2015)

    Article  Google Scholar 

  13. Mahendran, M.: An efficient algorithm for privacy preserving data mining using heuristic approach. Int. J. Adv. Res. Comput. Commun. Eng. 1(9), 742–743 (2012)

    Google Scholar 

  14. Thakur, D., Gupta, H.: An exemplary study of privacy preserving association rule mining techniques. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 3(11), 893–900 (2013)

    Google Scholar 

  15. Narang, G., Shaikh, A.: Preservation of privacy in mining using association rule technique. Int. J. Sci. Technol. Res. 2(3), 219–220 (2013)

    Google Scholar 

  16. Verma, D., Jha, D.K.: Association rules hiding algorithm for privacy preserving data mining. Int. J. Comput. Sci. Emerg. Trends (IJCSET) 02(01), 16–20 (2013)

    Google Scholar 

  17. Chintada, S.K., Madina, J.R.: A privacy preserving association rule mining over unrealized datasets. Int. J. Eng. Trends Technol. (IJETT) 5(4), 207–210 (2013)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to N. Rajesh.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Rajesh, N., Selvakumar, A.A.L. Association rules and deep learning for cryptographic algorithm in privacy preserving data mining. Cluster Comput 22 (Suppl 1), 119–131 (2019). https://doi.org/10.1007/s10586-018-1827-6

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-018-1827-6

Keywords

Navigation