Project Login
Registration No:
Password:
MAIL ALERTS SMS ALERTS
 
     
   
     

HIDING SENSITIVE INFORMATION IN LARGE DATABASES

Non IEEE Project : 2011

ABSTRACT Data mining techniques have been widely used in various applications. However, the misuse of these techniques may lead to the disclosure of sensitive information In this project, we present a novel approach that strategically modifies a few transactions in the transaction database to decrease the supports or confidences of sensitive rules without producing the side effects. Here we propose heuristic methods for increasing the number of hidden sensitive rules and reducing the number of modified entries. Modules: ï‚— Admin Module ï‚— Seller Module ï‚— Buyer Module ï‚— Database Module (Transaction tables ) Existing system: Although a business might use a set of programs that it knows and trusts, and might train its administrators and Help Desk personnel to support those programs, administrators lose control as soon as users begin running unknown code. The increasing role of the Internet in business puts your network at a greater risk than ever before. Such user-installed programs can conflict with other installed programs, change critical configuration data, or introduce a virus. Users often cannot make safe or informed choices about what software to run because viruses intentionally conceal the malicious purpose of the program. Also, the problems that are associated with running unknown code can increase support costs substantially because they lead to more system maintenance, more help desk time, and lost user productivity Proposed system: We can get the copy of the database without affecting the original database. For this purpose we are using the sensitive rules. For example, in one organization a salesman always giving the good production means remaining staff those who want to get a good profit can use his database from him. If some one made any changes in that original database means we cannot retrieve the original data again. Because of that purpose we are building the project to get the copy of database using the sensitive rules. It does not affect the original database forever. It provides restricting access to sensitive data and Security to End user. We remove the assumption and allow the user to select sensitive rules from all strong rules such as Minimum support threshold (MST) and Minimum Confidence Threshold (MCT). System specification: Hardware specification: Processor : Pentium IV processor Hard Disk : 40GB RAM : 256MB Software specification: Operating System : Win 2000 and above versions Technology : Java 1.5 Web Server : Apache Tomcat Server Database : MS-SQL Server Web Technologies : JSP

NOW GET PROJECTS ! GET TRAINED ! GET PLACED !

IEEE, NON-IEEE, REAL TIME LIVE ACADEMIC PROJECTS,

PROJECTS WITH COMPLETE COURSES,SOFT SKILLS & PLACEMENTS

ALLOVER INDIA & WORLD WIDE,

HOSTEL FACILITY AVAILABLE FOR GIRLS & BOYS SEPARATELY,

CALL: 08985129129 ,  E-Mail Id: support@ascentit.in

REGISTER FOR PROJECTS NOW ! GET DISCOUNT
   
1