2010
DOI: 10.5121/ijdms.2010.2306
|View full text |Cite
|
Sign up to set email alerts
|

Implementation of Cryptography for Privacy Preserving Data Mining

Abstract: ABSTARCT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2012
2012
2020
2020

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 17 publications
(6 citation statements)
references
References 16 publications
0
6
0
Order By: Relevance
“…An attractive novel trend for data mining research is the development of techniques that integrates privacy concerns [15], [16], [17], [18]. Two current central categories to perform data mining tasks without compromising privacy are Perturbation method [19], [20], [21] and the secure computation method [22], [23], [24], [25]. By including any privacy preserving technique to data mining, the communication and computation cost will not be increased.…”
Section: Privacy Preserving Of Sensitive Cluster Data Objectsmentioning
confidence: 99%
“…An attractive novel trend for data mining research is the development of techniques that integrates privacy concerns [15], [16], [17], [18]. Two current central categories to perform data mining tasks without compromising privacy are Perturbation method [19], [20], [21] and the secure computation method [22], [23], [24], [25]. By including any privacy preserving technique to data mining, the communication and computation cost will not be increased.…”
Section: Privacy Preserving Of Sensitive Cluster Data Objectsmentioning
confidence: 99%
“…They used oblivious transfer protocol for secure computation. Their work has many advantages such as trust, correctness, efficiency, and fairness [5].…”
Section: Related Workmentioning
confidence: 99%
“…Anand Sharma [13] describes in his paper the various types of cryptographic techniques as association rules, clustering or classification etc which are being implemented to achieve remarkable results. Special functions are being computed to store the sensitive data and providing access to stored data based on individual's role, thus the privacy is taken as main concern.…”
Section: ©Ijraset (Ugc Approved Journal): All Rights Are Reservedmentioning
confidence: 99%