12,966 Hits in 4.2 sec

A Dynamic K-means Algorithm for Searching Conserved Encrypted Data in a Cloud

Avinash C., Hasritha P., Abhinay J.
2015 International Journal of Computer Applications  
Thus, a verifiable method should be provided for users to verify the accuracy of the search results. This paper proposes a hierarchical clustering method in order to get a better clustering result.  ...  The owner of large amount of data chooses cloud facility to outsource their precious data. For the purpose of privacy the data owners encrypted their data before outsourcing.  ...  Using k-means algorithm for clustering process gives an accurate solution for grouping the documents. This accuracy makes the searching process efficient. C. Privacy.  ... 
doi:10.5120/ijca2015906918 fatcat:qciwozo32rhvnget6lhmiorm5a

A differential privacy protecting K-means clustering algorithm based on contour coefficients

Yaling Zhang, Na Liu, Shangping Wang, Muhammad Zubair Asghar
2018 PLoS ONE  
This paper, based on differential privacy protecting K-means clustering algorithm, realizes privacy protection by adding data-disturbing Laplace noise to cluster center point.  ...  OPEN ACCESS Citation: Zhang Y, Liu N, Wang S (2018) A differential privacy protecting K-means clustering algorithm based on contour coefficients. PLoS ONE 13(11): e0206832.  ...  , and Laplacian noise is added to the original data for privacy preservation.  ... 
doi:10.1371/journal.pone.0206832 pmid:30462662 pmcid:PMC6248925 fatcat:vftx6joyxjbxzmqmrpcxkji2jq

Privately Computing a Distributed k-nn Classifier [chapter]

Murat Kantarcıoǧlu, Chris Clifton
2004 Lecture Notes in Computer Science  
This paper presents a method for privately computing k − nn classification from distributed sources without revealing any information about the sources or their data, other than that revealed by the final  ...  Privacy preserving data mining provides a means of addressing this issue, particularly if data mining is done in a way that doesn't disclose information beyond the result.  ...  Interest has arisen in privacy-preserving data mining.  ... 
doi:10.1007/978-3-540-30116-5_27 fatcat:pxmlkb34vrewpetlelxzijxwtu

PartSOM: A Framework for Distributed Data Clustering Using SOM and K-Means [chapter]

Flavius L., Jose Alfredo F. Cost
2010 Self-Organizing Maps  
Privacy-preserving clustering focuses its efforts on algorithms that ensure data privacy and security, as for example, in medical or business databases.  ...  İnan et al. (2007) present a method for clustering horizontally partitioned databases, based on constructing the dissimilarity matrix of objects from different sites, which can be used for privacy preserving  ...  PartSOM: A Framework for Distributed Data Clustering Using SOM and K-Means, Self-Organizing Maps, George K Matsopoulos (Ed.), ISBN: 978-953-307-074-2, InTech, Available from:  ... 
doi:10.5772/9182 fatcat:5t3q6ofv4fhqhhy2kio2smunme

A distributed k-mean clustering algorithm for cloud data mining

Renu Asnani
2015 International Journal of Engineering Trends and Technoloy  
Thus in this presented work a survey is introduced for cloud data storage, and their cluster analysis for utilizing the data into various business intelligence applications. in addition of that a new model  ...  of cluster analysis of data is proposed which provides the clustering as service.  ...  The tagged data is used for feature extraction thus the data features are recovered and used with the improved k-means clustering.  ... 
doi:10.14445/22315381/ijett-v30p263 fatcat:swv2pq2fqzh63e5uothchsncgm

A Parallel Multi-keyword Top-k Search Scheme over Encrypted Cloud Data [chapter]

Maohu Yang, Hua Dai, Jingjing Bao, Xun Yi, Geng Yang
2019 Lecture Notes in Computer Science  
With searchable encryptions in the cloud computing, users can outsource their sensitive data in ciphertext to the cloud that provides efficient and privacy-preserving multi-keyword top-k searches.  ...  To support scalable searches, we propose a parallel multi-keyword top-k search scheme over encrypted cloud data.  ...  CONCLUSION In this paper, we propose a parallel privacy-preserving top-k search scheme over encrypted cloud data.  ... 
doi:10.1007/978-3-030-30709-7_14 fatcat:44qz3x2jerbn3k5rbgqgmnvh54

The k-means Algorithm: A Comprehensive Survey and Performance Evaluation

Mohiuddin Ahmed, Raihan Seraj, Syed Mohammed Shamsul Islam
2020 Electronics  
Additionally, such a clustering algorithm requires the number of clusters to be defined beforehand, which is responsible for different cluster shapes and outlier effects.  ...  A fundamental problem of the k-means algorithm is its inability to handle various data types.  ...  [17] Big data Privacy preserving k-means. [18] Multiview data k-means. [19] Wind power forecasting k-means with bagging neural network. [20] Social tags k-means based on latent semantic analysis.  ... 
doi:10.3390/electronics9081295 fatcat:63g2t367uzbf7dohoxf3rzfjnm

K-means quantization for a web-based open-source flow cytometry analysis platform

Nathan Wong, Daehwan Kim, Zachery Robinson, Connie Huang, Irina M. Conboy
2021 Scientific Reports  
Here we report a more effective way to analyze FCM data on the web.  ...  Freecyto is a free and intuitive Python-flask-based web application that uses a weighted k-means clustering algorithm to facilitate the interactive analysis of flow cytometry data.  ...  Acknowledgements We would like to thank Alex Park for providing technical help with these studies, and Michael Conboy for the helpful suggestions on the work and the manuscript.  ... 
doi:10.1038/s41598-021-86015-6 pmid:33762594 fatcat:wf4agglylrajzo3xzakhy7pnsu

A New Approach to Sensitive Rule Hiding

K. Duraiswamy, D. Manjula, N. Maheswari
2008 Computer and Information Science  
Privacy preserving data mining is a novel research direction in data mining and statistical databases, which has recently been proposed in response to the concerns of preserving personal or sensible information  ...  The first type of privacy, called output privacy, is that the data is altered so that the mining result will preserve certain privacy.  ...  The first type of privacy, called output privacy, is that the data is minimally altered so that the mining result will preserve certain privacy (Evfimievski, 2002 .  ... 
doi:10.5539/cis.v1n3p107 fatcat:d62ma2w3pjax3caafds2a6ve2q

Revealing the spatial distribution of a disease while preserving privacy

S. C. Wieland, C. A. Cassa, K. D. Mandl, B. Berger
2008 Proceedings of the National Academy of Sciences of the United States of America  
This method often preserves privacy but suffers from substantial information loss, which degrades the quality of subsequent disease mapping or cluster detection studies.  ...  We develop an optimal method based on linear programming to add noise to individual locations that preserves the distribution of a disease.  ...  We thank Clark Friefield, Gopal Ramachandran, Lucy Hadden, Peter Szolovits, Gil Alterovitz, Michael Baym, and Ronald Rivest for helpful discussions.  ... 
doi:10.1073/pnas.0801021105 pmid:19015533 pmcid:PMC2584758 fatcat:uhfdfnyqebf2rcrh4oueep25bu

A survey on Privacy Preserving Data Aggregation Schemes in People Centric Sensing Systems and Wireless Domains

K. R. Jansi, S. V. Kasmir Raja
2016 Indian Journal of Science and Technology  
Findings: A study about the existing privacy preserving aggregation schemes enables us to design a new method that is more suitable for people centric sensing network.  ...  Methods: Since people are the mobile custodians, privacy becomes a threat to the network.  ...  If there is no data loss in the network, both SMART and CPDA methods can result accurate aggregation in a privacy preserving way. PDA needs to be extended for specific aggregation functions.  ... 
doi:10.17485/ijst/2016/v9i37/102072 fatcat:6qqalqugurhvfje5dusf45fctm

A Survey on Effective Pattern Matching in Uncertain Time Series Stream Data

D. Rajalakshm, K. Dinakaran
2015 Asian Journal of Applied Sciences  
In real time application such as weather forecasting, coal mine surveillance and privacy preserving data streams arrive at a rate higher than in traditional sensing applications.  ...  Uncertainty in stream time series may occur for two reasons such as the inherent imprecision of sensor readings or privacy preserving conversion.  ...  Second, a certain degree of uncertainty is purposely added to time-series so as to preserve privacy.  ... 
doi:10.3923/ajaps.2015.217.226 fatcat:av2737xtdbhwtdcvzvnvdseftm

Survey on Control of Photo Sharing on Online Social Networks

Sahla Nazlin A, Vishnu K
2017 IJARCCE  
To check possible confidentiality outflow of a group photograph, we prepared a mechanism in which each person can take part in the decision making on the photograph posting, so everyone in the photograph  ...  Haar cascade classifier and CBIR (content based image retrieval) algorithm are used in the proposed system for face detection and recognition.  ...  We designed a privacy-preserving Content based image retrieval FR system to identify individuals in a co-photo.  ... 
doi:10.17148/ijarcce.2017.6363 fatcat:ljikkwv5zjhaxlelfe6ya2zn7e

Application of IoT in Predictive Health Analysis–A Review of Literature

Geetha Poornima K, K. Krishna Prasad
2020 Zenodo  
Predictive analysis is carried out on the real-time data of patients to analyze their current situation for the purpose of effective and accurate clinical-decision making.  ...  Generally, internet of thing has been extensively utilized for interconnecting the advanced medical resource as well as for providing effective and smart health care services to the people.  ...  A model is developed to resolve the security and privacy issues relating to the data.  ... 
doi:10.5281/zenodo.3821147 fatcat:udgs5mtblnfa7bvaibolgne2em

A Competent Multi-Keyword Exploration Scheme over Encrypted Data in Cloud

Saranya K, Manohari J, Haripriya H
2018 International Journal of Trend in Scientific Research and Development  
The system thus tends to provide more chances for tackling data privacy and confidentiality issues.  ...  In the work carried out below, an efficient keyword search method called K-Gram search is developed.  ...  The purpose of using secret key is to preserve the privacy for the outsourced data by the data owner.  ... 
doi:10.31142/ijtsrd11243 fatcat:qjlgmunearddzk4wnse5wktbey
« Previous Showing results 1 — 15 out of 12,966 results