Author(s): Chittaluri.Veeraiah, G.L.Chandrasekharao
Introduction of high end technologies used by most of the leading software companies needs a keen focus to be kept on Daas The data owner renovates data to defend corporate secrecy and ships it to the server, server receives mining queries and true designs are recovered from the extracted designs which are received from the server. A study is done on the problem of farm out the association rule mining task within a corporate secrecy-preserving framework. An Occurrence model based on background knowledge and scheme is devised for secrecy preserving outsourced mining. The scheme introduced ensures that from at least k-1 other transformed items each transformed item are indistinguishable with respect to the Occurrenceer's background knowledge