TẠP CHÍ KHỞI NGHIỆP CHO SINH VIÊN - Trang 232

228

Tạp chí

Kinh tế - Kỹ thuật

1.2. Data mining and Techniques: Data mining is the process to find out the useful data or

frequent pattern from the huge amount of database such as data warehouse, data warehouse is the

multidimensional data base in which new information will be append but editing of old information

is not allowed. Data mining is a step of the KDD.

1.3. Distributed Database: It is a database in which data are physically located in different

computer but connected through the controlled network. In distributed database system is the high

speed, less memory required method of data connection but apart from this it costly too because it

need provide security and more management task, such as care about duplication and replication.

1.3.1. Replication: In distribution database whenever modification is occurs on one site that

modification must be synchronous done on all site where the copy of that is store so that all the

copy will look alike .For doing this replication need software.

1.3.2. Duplication: In the process of duplication in distributed database it is necessary to

identify one copy of original database and make that database as a master database and create

duplicate copy of that database for all sites as the local database of the site. In the duplication

process any change in local database does not effect on the other copy of that database.

1.4. Horizontal Partitioning: In horizontal partitioning, disparate sites gather the similar set of

information, but about unlike entities. Consider the example of the organization which has number

of branch office located in different cities such as Mumbai ,Delhi, Kolkata ,this organization has

partitions its centered data in the form of horizontal data partitioning ,now each branch having only

there local data but can access other branch data by using distributed network. This cusses privacy

problem which lead to use different algorithm for privacy- preserving data mining.

1.5. Spatial Data Mining: Spatial

characterize how objects vigorous together in space, among

the world. Spatial data is an enumerated data which has the length, height, wide etc. attribute of

an object in it. Spatial database is the data base of this kind of enumerated data type which defines

a geographic structure present in the world. This will be represented in the form of there pictorial

views which will be the correlation of their pixel-position in three dimensional structure. Database

is improved to store and access geometric space is called spatial database. This type of data is

generally contains coordinates, points, line, polygons. Some spatial databases can deal with more

complicated information like 3D articles, topological scope and continuous networkss. Spatial

information mining is the use of information mining to spatial models.

1.6. Secure Multiparty Computation: Secure multiparty computation (SMC) work with the

assumption that all the party, which want to communicate each are not trust on each other or they

don’t trust on communication channels .Still they want computation of some common operations

with the privacy of their local data. The skeleton of secure multiparty computation provides a

concrete theoretical foundation for privacy.

1.7. Trusted Third Party Model: Trusted third party (TTP) model will work with the assumption

that the data will not inferable from anyone else. The main aim of the secure protocol is to get that

level of privacy. TTP model work, when the data is distributed in the distributed environment, and

each database owner have their own private datasets, and no one wants to disclose their private

information to other data owner, so select one of them as the trusted third party, that is responsible

for calculating or managing all the private and secure information from all the other data owner

presented in the environment.

1.8. Semi-honest Model: It is also known as the honest-but-curious model [6] [7]. A semi-honest

party work with the correct input followed by protocol , be that as it may, after the convention is discharge

it utilize whatever it get amid execution of the convention to trade off security or protection.

Liên Kết Chia Sẽ

** Đây là liên kết chia sẻ bới cộng đồng người dùng, chúng tôi không chịu trách nhiệm gì về nội dung của các thông tin này. Nếu có liên kết nào không phù hợp xin hãy báo cho admin.