5,355 Hits in 3.3 sec

Cryptographic techniques for privacy-preserving data mining

Benny Pinkas
2002 SIGKDD Explorations  
We describe these results, discuss their efficiency, and demonstrate their relevance to privacy preserving computation of data mining algorithms.  ...  We also show examples of secure computation of data mining algorithms that use these generic constructions.  ...  Privacy preserving distributed computation of ID3.  ... 
doi:10.1145/772862.772865 fatcat:p36zbd3yvfbibacpsmxoqko5yy

A Survey of Cryptographic and Non-cryptographic Techniques for Privacy Preservation

Bhawani Singh, Anju Singh, Divakar Singh
2015 International Journal of Computer Applications  
Because of this concern, the privacy preserving data mining (PPDM) techniques are being adopted. The major concern in the privacy preserving data mining is referring as sensitive pattern mining.  ...  Privacy Preserving Data mining techniques implemented for modification of database with the help of insertion wrong information for concealing sensitive information.  ... 
doi:10.5120/ijca2015907146 fatcat:cjecbbvnjff43io7zz5adg2by4

A Review on Privacy Preservation in Data Mining

Nandhini T, Vanathi D, Sengottuvelan P
2016 International Journal of UbiComp  
The data Perturbing values for preservation of customer privacy is the first approach. The other approach is Cryptographic tools to build data mining models.  ...  COMPARISONS ON DIFFERENT PRIVACY PRESERVATION TECHNIQUES CONCLUSION Review on data mining privacy preserving in social network.  ... 
doi:10.5121/iju.2016.7301 fatcat:ke23jisv4ngxjo636ar6lfthuy

Distributed Data Mining Protocols for Privacy: A Review of Some Recent Results [chapter]

Rebecca N. Wright, Zhiqiang Yang, Sheng Zhong
2006 Lecture Notes in Computer Science  
In this paper, we briefly survey four recently proposed cryptographic techniques for protecting data privacy in distributed settings.  ...  Then, we describe three privacy-preserving data mining techniques in a fully distributed setting where each customer holds a single data record of the database.  ...  To illustrate how to use cryptographic techniques to design privacy-preserving solutions to enable mining across distributed parties, we describe a privacy-preserving solution for a particular data mining  ... 
doi:10.1007/11801412_7 fatcat:ekc7sdlfi5dgxcg2zwvqyls2ki

Privacy Preservation in Data Centric Environment: Analysis and Segregation

Jyotir Moy Chatterjee
2017 International Journal of Engineering Research and  
Accumulation of advanced information data by different governments, corporates, and people has made expansive extension of the data and learning based on choice making.  ...  ubiquity every day and the same number of associations keeping up an extensive volume of information about people or different organizations under cloud computing environment that may conveys touchy data  ...  Cryptographic technique Privacy preservation with and without trusted parties for horizontal partition of data, zero data leakage, high preservation to data parties Here contrasted the outcome privay saving  ... 
doi:10.17577/ijertv6is050071 fatcat:t4esvrnd6rh3teq2l33g3wyg4i

Secure Multi Party Computation Technique for Classification Rule Sharing

Murugeshwari B, Jayakumar C, Sarukesi K
2012 International Journal of Computer Applications  
Confidentiality of data or resources is of primary importance in Privacy Preserving Data Mining (PPDM) Systems.  ...  The proposed model considers the C5.0 algorithm for data mining and classification rule generation due to its advances and classification accuracy over its predecessors.  ...  To preserve the privacy of the data to be transacted researchers have proposed varied privacy preserving techniques like noise inclusion techniques[32][33], cryptographic techniques[12][13][16][17]  ... 
doi:10.5120/8764-2683 fatcat:fozueiaks5giviwyrmsrktd7k4

Privacy Preserving Data Mining: Techniques, Classification and Implications - A Survey

Alpa Shah, Ravi Gulati
2016 International Journal of Computer Applications  
The main categorization of Privacy Preserving Data Mining (PPDM) techniques falls into Perturbation, Secure Sum Computations and Cryptographic based techniques.  ...  Privacy has become crucial in knowledge based applications. Proper integration of individual privacy is essential for data mining operations.  ...  Authors in [9] [36] have introduced a cryptographic approach for privacy preservation for classification problem.  ... 
doi:10.5120/ijca2016909006 fatcat:k37zgytczbh6pjpse3wqu2inva

Privacy Preserving Data Mining Technique and Their Implementation

2017 International Journal of Research Studies in Computer Science and Engineering  
It enables multiple parties to conduct collaborative data mining while preserving the privacy of their data.  ...  Privacy preservation in data mining has gained significant recognition because of the increased concerns to ensure privacy of sensitive information.  ...  of Iterations Clustering Assignment Privacy Preserving Data Mining Technique and Their Implementation  ... 
doi:10.20431/2349-4859.0402003 fatcat:5tlh3b35sbdtrathml5veunope

Adaptive Random Decision Tree: A New Approach for Data Mining with Privacy Preserving

Hemlata B. Deorukhakar, Prof. Pradnya Kasture
2015 International Journal of Innovative Research in Computer and Communication Engineering  
Now a day's fastest growing field data mining with privacy preserving is essential for fast development of high dimensional data and to manage that data efficiently while preserving privacy.  ...  In existing system, cryptography based technique is still too slow to be effective for managing distributed data.  ...  The Dissertation is based on research work in A Random Decision Tree Framework for Privacy-Preserving Data Mining by G.  ... 
doi:10.15680/ijircce.2015.0307004 fatcat:bbhvvop36ferzpw3dhrmzv4kca

Privacy Preserving In Data Mining with No Data Loss with a Combinational Scheme

2019 International journal of recent technology and engineering  
During data mining tasks, the sensitive information may be losing its privacy. Hence, Privacyprotection or preservation is becomes major issue for the organizations.  ...  Publishing data or sharing information for mining with Privacypreservation is possible through Privacypreserve data mining technique (PPDM).  ...  Combinational in Privacy preserving Data Mining Privacy preserving datamining techniques are emerged in the field of data mining to solve Privacy protection problems [1] [2] .  ... 
doi:10.35940/ijrte.d1107.1284s319 fatcat:tg5sutzgofc6tn24ff53z5uwne

Preserving Privacy and Sharing the Data in Distributed Environment using Cryptographic Technique on Perturbed data [article]

P. Kamakshi, A. Vinaya Babu
2010 arXiv   pre-print
Privacy is becoming an increasingly important issue in many data mining applications in distributed environment. Privacy preserving data mining technique gives new direction to solve this problem.  ...  query through cryptographic approach.  ...  Privacy preserving data mining [20] is a special data mining technique which has emerged to protect the privacy of sensitive data and also give valid data mining results.  ... 
arXiv:1004.4477v1 fatcat:eq25l3z645eippjqe3lo476cf4

A Brief Survey on Privacy Preserving Techniques in Data Mining

Vinoth kumar J, Santhi V
2016 IOSR Journal of Computer Engineering  
In this paper, various privacy preserving techniques such as Data anonymization, Data Randomization, use of cryptography are presented. General Terms: Data Mining, Privacy and Security.  ...  The capability of privacy preserving data mining techniques is measured by using metrics such as performance in terms of time efficiency, data utility and level of uncertainty or resistance to data mining  ...  If cryptographic techniques were used for privacy preservation, it will add more computational complexity.  ... 
doi:10.9790/0661-1804054751 fatcat:z2fi6ujibfg5nc453j3z7wkxne

Privacy-Preserving Data Mining [chapter]

Charu C. Aggarwal
2015 Data Mining  
Privacy Preserving Data Mining: Models and Algorithms proposes a number of techniques to perform the data mining tasks in a privacy-preserving way that alleviate these concerns.  ...  These techniques generally fall into the following categories: data modification techniques, cryptographic methods & protocols for data sharing, statistical techniques for disclosure and inference control  ... 
doi:10.1007/978-3-319-14142-8_20 fatcat:qtz4vuw3zbdt5pm4sy4czh3bxa

Perspective Challenges & Proposed Solution for Ppdm Using Data Mining Techniques

Charu Sharma
2017 International Journal for Research in Applied Science and Engineering Technology  
The task of mining data by preserving its privacy is called Privacy Preserving Data Mining (PPDM).  ...  Privacy preserving is done to acquire precise paradigms without letting accession to secure information in the data records, hence finessing the difference between privacy and data mining.  ...  Cryptographic techniques are for performing modifications to ensure required privacy level.  ... 
doi:10.22214/ijraset.2017.8298 fatcat:x6bmks5qxfd4jnbxmmi2hxepbe

2016, Page No. 16329-16332 Ms.K.Muthukarupaee1 , IJECS Volume 05 Issue 5 May 2016 Page No.16329-16332 Page 16329 Data Restoration and Privacy Preserving of Data Mining Using Random Decision Tree Over Vertically Partitioned Data

Ms.K. Muthukarupaee, Ms. Blessyselvam
2016 International Journal Of Engineering And Computer Science  
Existing cryptography is the based work for privacy-preserving data mining and is still too slow to be effective for the large scale.  ...  , so privacy-preserving data mining (PPDM) it has become one of the most newest trends in the privacy, security and data mining research.  ...  It was implemented using a classification rule for data mining with the privacy preserving.  ... 
doi:10.18535/ijecs/v5i5.02 fatcat:a7sss7gyxfah7kd2svuzazqyqi
« Previous Showing results 1 — 15 out of 5,355 results