Open Access   Article Go Back

Analysis of Functionality and Major Issues in Data mining

J. Jones Mary1 , P. Srivaramangai2

Section:Survey Paper, Product Type: Journal Paper
Volume-07 , Issue-02 , Page no. 80-85, Jan-2019

Online published on Jan 31, 2019

Copyright © J. Jones Mary, P. Srivaramangai . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: J. Jones Mary, P. Srivaramangai, “Analysis of Functionality and Major Issues in Data mining,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.02, pp.80-85, 2019.

MLA Style Citation: J. Jones Mary, P. Srivaramangai "Analysis of Functionality and Major Issues in Data mining." International Journal of Computer Sciences and Engineering 07.02 (2019): 80-85.

APA Style Citation: J. Jones Mary, P. Srivaramangai, (2019). Analysis of Functionality and Major Issues in Data mining. International Journal of Computer Sciences and Engineering, 07(02), 80-85.

BibTex Style Citation:
@article{Mary_2019,
author = {J. Jones Mary, P. Srivaramangai},
title = {Analysis of Functionality and Major Issues in Data mining},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {1 2019},
volume = {07},
Issue = {02},
month = {1},
year = {2019},
issn = {2347-2693},
pages = {80-85},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=651},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=651
TI - Analysis of Functionality and Major Issues in Data mining
T2 - International Journal of Computer Sciences and Engineering
AU - J. Jones Mary, P. Srivaramangai
PY - 2019
DA - 2019/01/31
PB - IJCSE, Indore, INDIA
SP - 80-85
IS - 02
VL - 07
SN - 2347-2693
ER -

           

Abstract

Database mining can be characterized as the way toward mining for understood, once unidentified, and possibly basic data from horrendously enormous databases by proficient information disclosure strategies. The protection and security of client data have turned out to be critical open strategy tensions and these nerves are getting expanded enthusiasm by the both open and government administrator and controller, security advocates, and the media. In this paper we centers around key online protection and security issues and concerns, the job of self-control and the client on security and security insurances, data assurance laws, administrative patterns, and the standpoint for protection and security enactment. Normally such a procedure may open up new presumption measurements, recognize new attack examples, and raises new data security issues. Ongoing improvements in data innovation have empowered accumulation and preparing of tremendous measure of individual data, for example, criminal records, online shopping habits, online banking, credit and medical history, and driving records and essentially the administration concerned data.

Key-Words / Index Term

Data mining, Security, Privacy

References

[1]. D. R. Stinson, “Cryptography: Theory and Practice 3rd Edition,”Text Book, 2006.
[2]. C.-H. Yeh, G. Lee, and C.-Y. Lin, “Robust Laser Speckle Authentication System through Data Mining Techniques,” IEEE Transactions on Industrial Informatics, vol. 11, no. 2, pp. 505–512, 2015.
[3]. S. Khan, A. Sharma, A. S. Zamani, and A. Akhtar, “Data Mining for Security Purpose & its Solitude Suggestions,” International Journal of Technology Enhancements and Emerging Engineering Research, vol. 1, no. 7, pp. 1–4, 2012.
[4]. Venugopal K R, K G Srinivasa and L M Patnaik,“Soft Computing for Data Mining Applications,” Springer, 2009.
[5]. Vasanthakumar G U, BagulPrajakta , P Deepa Shenoy, Venugopal K R and L M Patnaik,“PIB: Profiling Influential Blogger in Online Social Networks, A Knowledge Driven Data Mining Approach,”11th International Multi-Conference on Information Processing (IMCIP), vol. 54, pp. 362– 370, 2015.
[6]. H. Zang and J. Bolot, “Anonymization of Location Data Does Not Work: A Large-Scale Measurement Study,” In Proceedings of the 17th Annual International Conference on Mobile Computing and Networking, pp. 145–156, 2011.
[7]. R. J. Bayardo and R. Agrawal, “Data Privacy Through Optimal k-Anonymization,” 21st International Conference on Data Engineering (ICDE’05), pp. 217–228, 2005.
[8]. A. Friedman, R. Wolff, and A. Schuster, “Providing kAnonymity in Data Mining,” The VLDB Journal, vol. 17, no. 4, pp. 789–804, 2008.
[9]. R. Lu, X. Liang, X. Li, X. Lin, and X. Shen, “EPPA: An Efficient and Privacy-Preserving Aggregation Scheme for Secure Smart Grid Communications,” IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 9, pp. 1621–1631, 2012.
[10]. C. Dwork, F. McSherry, K. Nissim, and A. Smith, “Calibrating Noise to Sensitivity in Private Data Analysis,” Theory of Cryptography Conference, pp. 265–284, 2006.
[11]. M. Siddiqui, M. C. Wang, and J. Lee, “Detecting Internet Worms Using Data Mining Techniques,” Journal of Systemics, Cybernetics and Informatics, vol. 6, no. 6, pp. 48–53, 2009.
[12]. Wu, V. Kumar, J. R. Quinlan, J. Ghosh, Q. Yang, H. Motoda, G. J. McLachlan, A. Ng, B. Liu, S. Y. Philip et al., “Top 10 Algorithms in Data Mining,” Knowle - dge and Information Systems, vol. 14, no. 1, pp. 1– 37, 2008.
[13]. M. S. Abadeh, J. Habibi, and C. Lucas, “Intrusion Detection using a Fuzzy Genetics-Based Learning Algorithm,” Journal of Network and Computer Applications, vol. 30, no. 1, pp. 414–428, 2007.
[14]. K. S. Desale and R. Ade, “Genetic Algorithm Based Feature Selection Approach for Effective Intrusion Detection System,” International Conference on Computer Communication and Informatics (ICCCI), pp. 1–6, 2015.