Privacy Preserving Data Mining using Attribute Encryption and Data Perturbation
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2013, Vol 6, Issue 3
Abstract
Data mining is a very active research area that deals with the extraction of  knowledge from very large databases. Data mining has made knowledge extraction and decision making easy. The extracted knowledge could reveal the personal information , if the data contains various private and sensitive attributes about an individual. This poses a threat to the personal information as there is a possibility of misusing the information behind the scenes without the knowledge of the individual. So, privacy becomes a great concern for the data owners and the organizations  as none of the organizations would like to share their data. To solve this problem Privacy Preserving Data Mining technique have emerged and also solved problems of various domains as it provides the benefit of data mining without compromising the privacy of an individual. This paper proposes a privacy preserving data mining technique the uses randomized perturbation and cryptographic technique. The performance evaluation of the proposed technique shows the same result with the modified data and the original data.
Authors and Affiliations
Meenakshi Vishnoi, Seeja K. R
WATERMARKING TECHNIQUES
Embedding a hidden stream of bits in a file is called Digital watermarking. The file could be an image, audio, video or text. Nowadays, a digital watermarking has many applications such as broadcast monitoring, owner ide...
FROM GRID COMPUTING TO CLOUD INFRASTRUCTURES
As a consequence of the economic crisis, the funds allocated for the development of the IT&C infrastructure in all domains become scarcer, whilst the need for computing services increases day by day and becomes a key...
Logical Database Design
The design, development and implementation of every database are mainly to serve as an information hub for organisations. The database is a key factor to the success of most organisations. The process of designing a data...
Virutalized Cloud Environment : A Survey
Cloud computing is one of today's most exciting technology because of its cost-reducing, flexibility, and scalability. With the fast growing of cloud computing technology, Data security becomes more and more important in...
A Heuristic Algorithm that Finds the Minimum and the Maximum of the Outputs of a Fuzzy Socio-political Model of E-democracy
Most of the techniques of nonlinear optimization assume the existence of a differential function, but there also exist other approaches. In this paper, we propose a non-differential algorithm that solves the problem of m...