Privacy Preserving Data Mining using Attribute Encryption and Data Perturbation
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2013, Vol 6, Issue 3
Abstract
Data mining is a very active research area that deals with the extraction of  knowledge from very large databases. Data mining has made knowledge extraction and decision making easy. The extracted knowledge could reveal the personal information , if the data contains various private and sensitive attributes about an individual. This poses a threat to the personal information as there is a possibility of misusing the information behind the scenes without the knowledge of the individual. So, privacy becomes a great concern for the data owners and the organizations  as none of the organizations would like to share their data. To solve this problem Privacy Preserving Data Mining technique have emerged and also solved problems of various domains as it provides the benefit of data mining without compromising the privacy of an individual. This paper proposes a privacy preserving data mining technique the uses randomized perturbation and cryptographic technique. The performance evaluation of the proposed technique shows the same result with the modified data and the original data.
Authors and Affiliations
Meenakshi Vishnoi, Seeja K. R
An Alternate Algorithm for (3x3) Median Filtering of Digital Images
Median filtering is a commonly used technique in image processing. The main problem of the median filter is its high computational cost (for sorting N pixels, the temporal complexity is O(N·log N), even w...
Security Defects in Biometric- based IdentificationSystemsand Mechanisms torectify them
Biometrics is one of the evolving technologies widely used in different aspects of life today. Theuse of biometrics for identification is a system mainly established to recognize a certain person through authentication b...
Segmentation In Medical Resonance images to extract the cancerous nodule for early diagnosis on cancer
Image segmentation plays a vital role in several medical imaging programs by assisting the delineation of physiological structures along with other parts. The objective of this research work is to segmentize human lung M...
A Modified Advanced Encryption Standard Algorithm for Image Encryption
Cryptography algorithms are becoming more necessary to ensure secure data transmission, which can be used in several applications. Increasing use of images in industrial process therefore it is essential to protect the c...
Design of BPSK Modulator Using VHDL
Binary Phase Shift Keying represents the simulation results of binary digital modulation schemes. Here for BASK and BPSK modulation techniques use FPGA algorithm. If multiplier block is used for multiplication bit stream...