A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Cryptographic techniques for privacy-preserving data mining
2002
SIGKDD Explorations
We describe these results, discuss their efficiency, and demonstrate their relevance to privacy preserving computation of data mining algorithms. ...
We also show examples of secure computation of data mining algorithms that use these generic constructions. ...
Privacy preserving distributed computation of ID3. ...
doi:10.1145/772862.772865
fatcat:p36zbd3yvfbibacpsmxoqko5yy
A Survey of Cryptographic and Non-cryptographic Techniques for Privacy Preservation
2015
International Journal of Computer Applications
Because of this concern, the privacy preserving data mining (PPDM) techniques are being adopted. The major concern in the privacy preserving data mining is referring as sensitive pattern mining. ...
Privacy Preserving Data mining techniques implemented for modification of database with the help of insertion wrong information for concealing sensitive information. ...
doi:10.5120/ijca2015907146
fatcat:cjecbbvnjff43io7zz5adg2by4
A Review on Privacy Preservation in Data Mining
2016
International Journal of UbiComp
The data Perturbing values for preservation of customer privacy is the first approach. The other approach is Cryptographic tools to build data mining models. ...
COMPARISONS ON DIFFERENT PRIVACY PRESERVATION TECHNIQUES
CONCLUSION Review on data mining privacy preserving in social network. ...
doi:10.5121/iju.2016.7301
fatcat:ke23jisv4ngxjo636ar6lfthuy
Distributed Data Mining Protocols for Privacy: A Review of Some Recent Results
[chapter]
2006
Lecture Notes in Computer Science
In this paper, we briefly survey four recently proposed cryptographic techniques for protecting data privacy in distributed settings. ...
Then, we describe three privacy-preserving data mining techniques in a fully distributed setting where each customer holds a single data record of the database. ...
To illustrate how to use cryptographic techniques to design privacy-preserving solutions to enable mining across distributed parties, we describe a privacy-preserving solution for a particular data mining ...
doi:10.1007/11801412_7
fatcat:ekc7sdlfi5dgxcg2zwvqyls2ki
Privacy Preservation in Data Centric Environment: Analysis and Segregation
2017
International Journal of Engineering Research and
Accumulation of advanced information data by different governments, corporates, and people has made expansive extension of the data and learning based on choice making. ...
ubiquity every day and the same number of associations keeping up an extensive volume of information about people or different organizations under cloud computing environment that may conveys touchy data ...
Cryptographic technique Privacy preservation with and without trusted parties for horizontal partition of data, zero data leakage, high preservation to data parties Here contrasted the outcome privay saving ...
doi:10.17577/ijertv6is050071
fatcat:t4esvrnd6rh3teq2l33g3wyg4i
Secure Multi Party Computation Technique for Classification Rule Sharing
2012
International Journal of Computer Applications
Confidentiality of data or resources is of primary importance in Privacy Preserving Data Mining (PPDM) Systems. ...
The proposed model considers the C5.0 algorithm for data mining and classification rule generation due to its advances and classification accuracy over its predecessors. ...
To preserve the privacy of the data to be transacted
researchers have proposed varied privacy preserving
techniques like noise inclusion techniques[32][33],
cryptographic
techniques[12][13][16][17] ...
doi:10.5120/8764-2683
fatcat:fozueiaks5giviwyrmsrktd7k4
Privacy Preserving Data Mining: Techniques, Classification and Implications - A Survey
2016
International Journal of Computer Applications
The main categorization of Privacy Preserving Data Mining (PPDM) techniques falls into Perturbation, Secure Sum Computations and Cryptographic based techniques. ...
Privacy has become crucial in knowledge based applications. Proper integration of individual privacy is essential for data mining operations. ...
Authors in [9] [36] have introduced a cryptographic approach for privacy preservation for classification problem. ...
doi:10.5120/ijca2016909006
fatcat:k37zgytczbh6pjpse3wqu2inva
Privacy Preserving Data Mining Technique and Their Implementation
2017
International Journal of Research Studies in Computer Science and Engineering
It enables multiple parties to conduct collaborative data mining while preserving the privacy of their data. ...
Privacy preservation in data mining has gained significant recognition because of the increased concerns to ensure privacy of sensitive information. ...
of
Iterations
Clustering Assignment
Privacy Preserving Data Mining Technique and Their Implementation ...
doi:10.20431/2349-4859.0402003
fatcat:5tlh3b35sbdtrathml5veunope
Adaptive Random Decision Tree: A New Approach for Data Mining with Privacy Preserving
English
2015
International Journal of Innovative Research in Computer and Communication Engineering
English
Now a day's fastest growing field data mining with privacy preserving is essential for fast development of high dimensional data and to manage that data efficiently while preserving privacy. ...
In existing system, cryptography based technique is still too slow to be effective for managing distributed data. ...
The Dissertation is based on research work in A Random Decision Tree Framework for Privacy-Preserving Data Mining by G. ...
doi:10.15680/ijircce.2015.0307004
fatcat:bbhvvop36ferzpw3dhrmzv4kca
Privacy Preserving In Data Mining with No Data Loss with a Combinational Scheme
2019
International journal of recent technology and engineering
During data mining tasks, the sensitive information may be losing its privacy. Hence, Privacyprotection or preservation is becomes major issue for the organizations. ...
Publishing data or sharing information for mining with Privacypreservation is possible through Privacypreserve data mining technique (PPDM). ...
Combinational in Privacy preserving Data Mining Privacy preserving datamining techniques are emerged in the field of data mining to solve Privacy protection problems [1] [2] . ...
doi:10.35940/ijrte.d1107.1284s319
fatcat:tg5sutzgofc6tn24ff53z5uwne
Preserving Privacy and Sharing the Data in Distributed Environment using Cryptographic Technique on Perturbed data
[article]
2010
arXiv
pre-print
Privacy is becoming an increasingly important issue in many data mining applications in distributed environment. Privacy preserving data mining technique gives new direction to solve this problem. ...
query through cryptographic approach. ...
Privacy preserving data mining [20] is a special data mining technique which has emerged to protect the privacy of sensitive data and also give valid data mining results. ...
arXiv:1004.4477v1
fatcat:eq25l3z645eippjqe3lo476cf4
A Brief Survey on Privacy Preserving Techniques in Data Mining
2016
IOSR Journal of Computer Engineering
In this paper, various privacy preserving techniques such as Data anonymization, Data Randomization, use of cryptography are presented. General Terms: Data Mining, Privacy and Security. ...
The capability of privacy preserving data mining techniques is measured by using metrics such as performance in terms of time efficiency, data utility and level of uncertainty or resistance to data mining ...
If cryptographic techniques were used for privacy preservation, it will add more computational complexity. ...
doi:10.9790/0661-1804054751
fatcat:z2fi6ujibfg5nc453j3z7wkxne
Privacy-Preserving Data Mining
[chapter]
2015
Data Mining
Privacy Preserving Data Mining: Models and Algorithms proposes a number of techniques to perform the data mining tasks in a privacy-preserving way that alleviate these concerns. ...
These techniques generally fall into the following categories: data modification techniques, cryptographic methods & protocols for data sharing, statistical techniques for disclosure and inference control ...
doi:10.1007/978-3-319-14142-8_20
fatcat:qtz4vuw3zbdt5pm4sy4czh3bxa
Perspective Challenges & Proposed Solution for Ppdm Using Data Mining Techniques
2017
International Journal for Research in Applied Science and Engineering Technology
The task of mining data by preserving its privacy is called Privacy Preserving Data Mining (PPDM). ...
Privacy preserving is done to acquire precise paradigms without letting accession to secure information in the data records, hence finessing the difference between privacy and data mining. ...
Cryptographic techniques are for performing modifications to ensure required privacy level. ...
doi:10.22214/ijraset.2017.8298
fatcat:x6bmks5qxfd4jnbxmmi2hxepbe
2016, Page No. 16329-16332 Ms.K.Muthukarupaee1 , IJECS Volume 05 Issue 5 May 2016 Page No.16329-16332 Page 16329 Data Restoration and Privacy Preserving of Data Mining Using Random Decision Tree Over Vertically Partitioned Data
2016
International Journal Of Engineering And Computer Science
Existing cryptography is the based work for privacy-preserving data mining and is still too slow to be effective for the large scale. ...
, so privacy-preserving data mining (PPDM) it has become one of the most newest trends in the privacy, security and data mining research. ...
It was implemented using a classification rule for data mining with the privacy preserving. ...
doi:10.18535/ijecs/v5i5.02
fatcat:a7sss7gyxfah7kd2svuzazqyqi
« Previous
Showing results 1 — 15 out of 5,355 results