Security in Outsourced Association Rule Mining Agenda Introduction Approximate randomized technique Encryption Summary and future work Introduction Data mining in company…