Privacy Preserving Data Mining using Attribute Encryption and Data Perturbation
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2013, Vol 6, Issue 3
Abstract
Data mining is a very active research area that deals with the extraction of  knowledge from very large databases. Data mining has made knowledge extraction and decision making easy. The extracted knowledge could reveal the personal information , if the data contains various private and sensitive attributes about an individual. This poses a threat to the personal information as there is a possibility of misusing the information behind the scenes without the knowledge of the individual. So, privacy becomes a great concern for the data owners and the organizations  as none of the organizations would like to share their data. To solve this problem Privacy Preserving Data Mining technique have emerged and also solved problems of various domains as it provides the benefit of data mining without compromising the privacy of an individual. This paper proposes a privacy preserving data mining technique the uses randomized perturbation and cryptographic technique. The performance evaluation of the proposed technique shows the same result with the modified data and the original data.
Authors and Affiliations
Meenakshi Vishnoi, Seeja K. R
Designing an e-democracy framework to enhance the Egyptian e-government
E-democracy concept can enhance Egyptian participation in rule and it can move e-the Egyptian government to a new era. E-democracy concept can be applied in conjunction with database connection to transfer Egyptian e-gov...
BER performance analysis of Subtractive interference cancellation (SIC) Using Rayleigh channel in DS-CDMA Receiver system
In this paper, we present and analyze the performance of a parallel interference cancellation (PIC) scheme for multicarrier (MC) direct-sequence code-division multiple-access (DS-CDMA) systems. In order to mitigate the m...
TheWorkQueue with Dynamic Replication-FaultTolerant Scheduler in Desktop Grid Environment
Desktop Grid is different from Grid in terms of the characteristics of resources as well as types of sharing. Particularly, resource providers in Desktop Grid are volatile, heterogeneous, faulty, and malicious. These dis...
DEVELOPMENT OF AN INTRUSION DETECTION SYSTEM IN A COMPUTER NETWORK
The development of network technologies and application has promoted network attack both in number and severity. The last few years have seen a dramatic increase in the number of attacks, hence, intrusion detection has...
E-Library using the Mobile OPAC
In the todays Communication world, mobile and its applications are the most emerging trends. Mobile applications are the exact replacements of web based applications. Based on this statistics we are planning to migrate w...