Journal of Computing
To control data mining process for different users with different privileges, two approaches were designed to protect the database and data mining usage. The first approach, privacy protection of individuals by adding a white Gaussian noise to selected columns in a database to be mined for an unauthorized user. The second approach, knowledge protection, is done by encrypting the result of data mining before it appears to the unauthorized users by using Rijndael algorithm. In this case the clear answer will appear to the authorized users only.