228
Tạp chí
Kinh tế - Kỹ thuật
1.2. Data mining and Techniques: Data mining is the process to find out the useful data or
frequent pattern from the huge amount of database such as data warehouse, data warehouse is the
multidimensional data base in which new information will be append but editing of old information
is not allowed. Data mining is a step of the KDD.
1.3. Distributed Database: It is a database in which data are physically located in different
computer but connected through the controlled network. In distributed database system is the high
speed, less memory required method of data connection but apart from this it costly too because it
need provide security and more management task, such as care about duplication and replication.
1.3.1. Replication: In distribution database whenever modification is occurs on one site that
modification must be synchronous done on all site where the copy of that is store so that all the
copy will look alike .For doing this replication need software.
1.3.2. Duplication: In the process of duplication in distributed database it is necessary to
identify one copy of original database and make that database as a master database and create
duplicate copy of that database for all sites as the local database of the site. In the duplication
process any change in local database does not effect on the other copy of that database.
1.4. Horizontal Partitioning: In horizontal partitioning, disparate sites gather the similar set of
information, but about unlike entities. Consider the example of the organization which has number
of branch office located in different cities such as Mumbai ,Delhi, Kolkata ,this organization has
partitions its centered data in the form of horizontal data partitioning ,now each branch having only
there local data but can access other branch data by using distributed network. This cusses privacy
problem which lead to use different algorithm for privacy- preserving data mining.
1.5. Spatial Data Mining: Spatial
characterize how objects vigorous together in space, among
the world. Spatial data is an enumerated data which has the length, height, wide etc. attribute of
an object in it. Spatial database is the data base of this kind of enumerated data type which defines
a geographic structure present in the world. This will be represented in the form of there pictorial
views which will be the correlation of their pixel-position in three dimensional structure. Database
is improved to store and access geometric space is called spatial database. This type of data is
generally contains coordinates, points, line, polygons. Some spatial databases can deal with more
complicated information like 3D articles, topological scope and continuous networkss. Spatial
information mining is the use of information mining to spatial models.
1.6. Secure Multiparty Computation: Secure multiparty computation (SMC) work with the
assumption that all the party, which want to communicate each are not trust on each other or they
don’t trust on communication channels .Still they want computation of some common operations
with the privacy of their local data. The skeleton of secure multiparty computation provides a
concrete theoretical foundation for privacy.
1.7. Trusted Third Party Model: Trusted third party (TTP) model will work with the assumption
that the data will not inferable from anyone else. The main aim of the secure protocol is to get that
level of privacy. TTP model work, when the data is distributed in the distributed environment, and
each database owner have their own private datasets, and no one wants to disclose their private
information to other data owner, so select one of them as the trusted third party, that is responsible
for calculating or managing all the private and secure information from all the other data owner
presented in the environment.
1.8. Semi-honest Model: It is also known as the honest-but-curious model [6] [7]. A semi-honest
party work with the correct input followed by protocol , be that as it may, after the convention is discharge
it utilize whatever it get amid execution of the convention to trade off security or protection.