To search, Click below search items.

 

All Published Papers Search Service

Title

Design of Smoke Screening Techniques for Data Surreptitiousness in Privacy Preserving Data Snooping Using Object Oriented Approach and UML

Author

K.Satheesh Kumar, Indumathi.J, G.V.Uma

Citation

Vol. 8  No. 4  pp. 106-115

Abstract

A smoke screen is a release of smoke in order to disguise the movement or location of military units such as infantry, tanks or ships. while smoke screens would formerly have been used to conceal movement from enemies line of sight, modern technology means that they are currently also available in new forms; they can screen in the infrared as well as visible spectrum of light to prevent detection by infrared sensors or viewers, available for vehicles is a super dense form used to prevent laser beams of enemy target designators or range finders on vehicles and to obscure the sensitive data. Surreptitiousness is used in the perspective of amassing a data trickily secret. In this paper, we focus primarily on solitude issues in Data Snooping, conspicuously when data are shared before mining, the means to shield it with Unified Modelling Language diagrams. The elucidation for competent systematization and sustain of facets, analysis, and diverse user groups are based on a common conceptual privacy model, and a concepts-services-mechanisms-algorithms-data scheme with use of UML or Unified Modelling Language. Tackling privacy preservation is complex since it should also pledge for well-founded Data Snooping results. Both these issues are equal and orthogonal in direction and it should clout a perfect balance between the two mechanisms. Under such state of affairs there arises the serious need for a rethinking mechanism to make obligatory privacy safeguards without trailing behind the gains of knowledge mining. These mechanisms can escort to novel privacy control methods to translate a database into a new one in such a way as to safeguard the main features of the original database for mining. Conscientiously, we deal with the problem of transforming a database to be shared into a new one that smoke screens clandestine information while preserving the general patterns and trends from the original database. To focus on this exigent problem, we propose an amalgamated scaffold for Privacy Preserving Data Mining that ensures that the mining process will not trespass privacy up to a certain degree of security. The scaffold framework encompasses a family of privacy-preserving data transformation methods and library of algorithms. Our exploration concludes that our Privacy Preserving Data Mining framework is effective, meets privacy requirements, and guarantees well-founded Data Snooping results while shielding vulnerable information (e.g., sensitive knowledge and individuals' privacy).

Keywords

Association Rules, Clustering, Confidence, Data Snooping, Data Sanitization, Privacy, Privacy Preserving Data Mining, Sensitive Data, Smoke Screening, Surreptitiousness, Unified Modelling Language

URL

http://paper.ijcsns.org/07_book/200804/20080416.pdf