Filters








339 Hits in 8.6 sec

A Universal Toolkit for Cryptographically Secure Privacy-Preserving Data Mining [chapter]

Dan Bogdanov, Roman Jagomägis, Sven Laur
2012 Lecture Notes in Computer Science  
In this paper, we describe Sharemind-a toolkit, which allows data mining specialist with no cryptographic expertise to develop data mining algorithms with good security guarantees.  ...  We list the building blocks needed to deploy a privacy-preserving data mining application and explain the design decisions that make Sharemind applications efficient in practice.  ...  Therefore, a data mining expert does not have to be a cryptography expert to use SHAREMIND and SECREC for creating privacy-preserving data mining applications.  ... 
doi:10.1007/978-3-642-30428-6_9 fatcat:xnatn2zo4ffythvc3gwmw4aype

A Fast and Efficient Privacy Preserving Data Mining Over Vertically Partitioned Data

P. S.Annakkodi
2013 International Journal of Computer Applications  
The dissertation presents several privacy preserving data mining algorithms operating over vertically partitioned data.  ...  This paper argues that it is indeed possible to have efficient and practical techniques for useful privacy-preserving mining of knowledge from large amounts of data.  ...  Oliveira and Zaiane [13] [14] [15] [16] develop several different methods for association rule mining, clustering and access control for privacy preserving data mining.  ... 
doi:10.5120/13218-0614 fatcat:latgdyf3fralljielzol3bfzlq

Privacy-preserving data mining: why, how, and when

J. Vaidya, C. Clifton
2004 IEEE Security and Privacy  
This article shows how technology from the security community can change data mining for the better, providing all its benefits while still maintaining privacy.  ...  Data mining is under attack from privacy advocates because of a misunderstanding about what it actually is and a valid concern about how it's generally done.  ...  It runs on top of the Weka data mining toolkit; we tested it with University of California, Irvine, machine-learning repository data sets.  ... 
doi:10.1109/msp.2004.108 fatcat:yvkwpcopr5dtfhvxm5ovmxgbmi

To Allot Secrecy-Safe Association Rules Mining Schema Using FP Tree

S. Suresh
2013 Software Engineering (Science Publishing Group)  
However, the sensitive information leakage is a problem we have to solve and privacy-preserving techniques are strongly needed.  ...  We display that our schema is secure and collusion-resistant for n parties, which means that even if n -1 dishonest party collude with a dishonest data miner in an attempt to learn the associations' rules  ...  Related Work The research of privacy-preserving techniques for data mining began in Year 2000, R.  ... 
doi:10.11648/j.se.20130101.11 fatcat:6wodtrd4bvdtrjo624cpt7cadm

Privacy-Preserving Graph Algorithms in the Semi-honest Model [chapter]

Justin Brickell, Vitaly Shmatikov
2005 Lecture Notes in Computer Science  
As in previous work on privacy-preserving data mining, we prove that our algorithms are secure provided the participants are "honest, but curious."  ...  ), as well as two new algorithms for privacy-preserving set union.  ...  The techniques we use in this paper are closely related to those previously used in the cryptographic version of privacy-preserving data mining, e.g., by Lindell and Pinkas in their privacy-preserving  ... 
doi:10.1007/11593447_13 fatcat:e6rxa4diezhxlpeh2tfm7wui3i

Privacy-Preserving Machine Learning: Methods, Challenges and Directions [article]

Runhua Xu, Nathalie Baracaldo, James Joshi
2021 arXiv   pre-print
Such a need for and the use of huge volumes of data raise serious privacy concerns because of the potential risks of leakage of highly privacy-sensitive information; further, the evolving regulatory environments  ...  Hence, well-designed privacy-preserving ML (PPML) solutions are critically needed for many emerging applications.  ...  [118] utilize additive secret sharing as a cryptographic primitive to implement a secure multiparty computation protocol for privacy-preserving clustering.  ... 
arXiv:2108.04417v2 fatcat:pmxmsbs2gvh6nd4jadcz4dnsrq

A Survey of Self-Sovereign Identity Ecosystem

Reza Soltani, Uyen Trang Nguyen, Aijun An, Clemente Galdi
2021 Security and Communication Networks  
This survey takes a journey through the origin of identity, defining digital identity and progressive iterations of digital identity models leading up to self-sovereign identity.  ...  relevant research initiatives, platforms, projects, and regulatory frameworks, as well as the building blocks including decentralized identifiers, verifiable credentials, distributed ledger, and various privacy  ...  [119] extend on this work to propose a secure and privacy-preserving data mining protocol.  ... 
doi:10.1155/2021/8873429 fatcat:r4g3lp5dzbhsfap7c6b7pd4rau

The applicability of the perturbation based privacy preserving data mining for real-world data

Li Liu, Murat Kantarcioglu, Bhavani Thuraisingham
2008 Data & Knowledge Engineering  
The perturbation method has been extensively studied for privacy preserving data mining.  ...  Unfortunately, current perturbation based privacy preserving data mining techniques do not allow the individuals to choose their desired privacy levels.  ...  This approach treats privacy preserving data mining as a special case of secure multi-party computation and not only aims for preserving individual privacy but also tries to preserve leakage of any information  ... 
doi:10.1016/j.datak.2007.06.011 fatcat:k45aqg7hg5fbzeh5ckfuclzxje

D1.2 - ASCLEPIOS Reference Architecture, Security and E-health Use Cases, and Acceptance Criteria

Tampere University, Norwegian Centre For E-Health Research, Amsterdam UMC
2019 Zenodo  
Furthermore, a description of the security and eHealth use cases to be implemented is provided, as well as a suitable set of acceptance criteria for the validation of the mechanisms developed within ASCLEPIOS  ...  Documentation of the overall architecture, describing the main components and artefacts of ASCLEPIOS, the interconnection scheme and the specific interfaces for exchange of information among them will  ...  Access control H-DAR4 A cloud-based e-health framework SHALL support the implementation of privacy-preserving distributed data mining.  ... 
doi:10.5281/zenodo.4022298 fatcat:vve7d3daqrcdfb2apx2czvvtmm

APHID: An architecture for private, high-performance integrated data mining

Jimmy Secretan, Michael Georgiopoulos, Anna Koufakou, Kel Cardona
2010 Future generations computer systems  
privacy preserving data mining process.  ...  The privacy-preserving PNN is the first such PNN in the literature, and provides not only a practical algorithm ready for use in privacy-preserving applications, but also a template for other data intensive  ...  Acknowledgments This work was supported in part by a National Science Foundation Graduate Research Fellowship as well as National Science Foundation grants: 0341601, 0647018, 0717674, 0717680, 0647120,  ... 
doi:10.1016/j.future.2010.02.017 fatcat:mgt2hbemorb5nhxsbas3ftt4yi

D2.4 - Data Owners' and Personal Health Data Privacy-Preserving Analytics

Amsterdam UMC, Norwegian Centre For E-Health Research, SECURA BV
2020 Zenodo  
Documentation of the design and security techniques for computing on data distributed across multiple data custodians that protect privacy.  ...  The techniques are developed based on the use cases and the security and privacy requirements of the project.  ...  A general survey of privacy-preserving data mining models and algorithms. Privacy-preserving data mining. New York: Springer; 2008. 9 Kantarcioglu M.  ... 
doi:10.5281/zenodo.4309801 fatcat:adqpzlwjmjg3damnvndai6blba

Secure collaboration in global design and supply chain environment: Problem analysis and literature review

Yong Zeng, Lingyu Wang, Xiaoguang Deng, Xinlin Cao, Nafisa Khundker
2012 Computers in industry (Print)  
This paper aims to collect and analyze systematically the existing scattered research of secure collaboration in global design and supply chain environment, and to give a comprehensive literature review  ...  Therefore, secure collaboration is of critical significance in the global design and supply chain management.  ...  Moreover, we express our thanks to Suo (Tandy) Tan, Thanh An Nguyen, Maomao (Maggie) Pan from Design Lab at Concordia University for their constructive comments to enhance the quality of this paper.  ... 
doi:10.1016/j.compind.2012.05.001 fatcat:eiex7mw6z5awhav6laap2h657u

The Indiana Center for Database Systems at Purdue University

Mourad Ouzzani, Sunil Prabhakar, Jeffrey S. Vitter, Xiang Zhang, Walid G. Aref, Elisa Bertino, Ann Christine Catlin, Christopher W. Clifton, Wing-Kai Hon, Ahmed K. Elmagarmid, Arif Ghafoor, Susanne E. Hambrusch
2005 SIGMOD record  
Our contribution in this context has been manifold: (1) We propose a toolkit of components that can be combined for specific privacypreserving data mining applications. (2) We propose secure mining of  ...  Security and Privacy We have initiated several projects to address security and privacy issues in database systems, data mining, and data sharing.  ... 
doi:10.1145/1083784.1083795 fatcat:lblzmkuu6vggznk4r44hm5z2oa

Privacy Preservation in Resource-Constrained IoT Devices Using Blockchain—A Survey

Zainab Iftikhar, Yasir Javed, Syed Yawar Abbas Zaidi, Munam Ali Shah, Zafar Iqbal Khan, Shafaq Mussadiq, Kamran Abbasi
2021 Electronics  
With opportunities brought by Internet of Things (IoT), it is quite a challenge to assure privacy preservation when a huge number of resource-constrained distributed devices is involved.  ...  The goal of this paper is to survey recent researches based on the implementation of blockchain in IoT for privacy preservation.  ...  Acknowledgments: The authors would like to acknowledge the support of Prince Sultan University for paying the Article Processing Charges (APC) of this publication.  ... 
doi:10.3390/electronics10141732 fatcat:rjx54sblivdxba6lmvhghbap4a

Security for 4G and 5G Cellular Networks: A Survey of Existing Authentication and Privacy-preserving Schemes [article]

Mohamed Amine Ferrag, Leandros Maglaras, Antonios Argyriou, Dimitrios Kosmanos, Helge Janicke
2017 arXiv   pre-print
This paper presents a comprehensive survey of existing authentication and privacy-preserving schemes for 4G and 5G cellular networks.  ...  In addition, we provide a taxonomy and comparison of authentication and privacy-preserving schemes for 4G and 5G cellular networks in form of tables.  ...  [248] proposed a new idea for privacy preserving for vehicular crowdsensing.  ... 
arXiv:1708.04027v1 fatcat:lozrjocwq5eblkams72kk4rv6i
« Previous Showing results 1 — 15 out of 339 results