Implementation of Client Controlled Privacy Preserving Data Model for Mining Decision Rules Using Decision Tree and Association Rules
Md Ilyasi1, Dhanraj Vermai2, Manoj kumar Deshpandei3, Rajeev Raghuvanshi4

1Md. Ilyas*, Dr. APJ Abdul Kalam University, Indore.
2Dr. Dhanraj Verma, Dr. APJ Abdul Kalam University, Indore.
3Dr. Manojkumar Deshpande, Prestige Institute of Engineering Management & Research, Indore.
4Rajeev Raghuvanshi, Prestige Institute of Engineering Management & Research, Indore. 

Manuscript received on October 16, 2019. | Revised Manuscript received on 27 October, 2019. | Manuscript published on November 10, 2019. | PP: 3617-3624 | Volume-9 Issue-1, November 2019. | Retrieval Number: A4614119119/2019©BEIESP | DOI: 10.35940/ijitee.A4614.119119
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: The privacy-preserving data mining (PPDM) is one of the techniques which are used for mining data dynamically with preserving privacy of the end data owner. In this paper, a PPDM technique for generating the privacy-preserving decision rules is proposed and implemented. The key motive of presenting this privacy-preserving decision rule mining technique is to demonstrate how securely data is aggregated in the PPDM environment, how securely extract them and consumed them with the help of applications. In addition to comparing the state of art methods for mining privacy preserving decision rules for preparing the future directions of research. Therefore two different data models have used namely decision tree and association rule mining. The conducted experiments demonstrate that decision tree-based techniques are superior to the association rule mining based techniques for mining higher dimensional data with higher accuracy and low resource consumption. Therefore in the near future for extending this data model the two concepts are also introduced in this paper.
Keywords: Privacy Preserving Data Mining, Decision rule Mining, Implementation of Data Mining Technique, Performance Evaluation.
Scope of the Article: Data Mining