International Journal of Computer Science and Mobile Computing (IJCSMC)
Introduction of high end technologies used by most of the leading software companies needs a keen focus to be kept on DaaS (Data-mining-as-a-Service). The data owner transforms data to protect corporate privacy and ships it to the server, server receives mining queries and true patterns are recovered from the extracted patterns which are received from the server. A study is done on the problem of outsourcing the association rule mining task within a corporate privacy-preserving framework. An attack model based on background knowledge and scheme is devised for privacy preserving outsourced mining.