Abstract
Objectives: To improve the security, as well as privacy while sharing data/information to third parties. From the database Duplicate data were eliminated and extracted the original database Methods/Statistical Analysis: FP tree based algorithm was proposed in this paper. It is used to generate the frequent item data sets. Those frequent data Item sets are extracted by using inverse data item set. It must achieve good security and privacy. Findings: The main problem in existing system is information leakage. In frequent pattern technique, federation rule mining process which tries to find some correlations and associations among the various types of data items in a dataset. It finds more privacy preserving techniques related to the data mining process. Applications/Improvement: To compare and evaluate the proposed of many algorithms, federation rule mining should able to maintain the data privacy in a proper manner.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.