Privacy preserving technique ECC for secure transmission in field of Data Mining
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2015, Vol 3, Issue 3
Abstract
This paper aims at bring forward Technique on distributed Data Mining as Data mining is used for retrieving intelligent information from enormous databases. Presently these databases are spread across the world. Tried to make a view that preserves the privacy in distributed mining. Approached with distributed data clustering algorithm. Mining algorithms methods and trends in order to discover knowledge from distributed data in accurate way. PPDM research usually uses: data hiding, in which sensitive raw data like identifiers, name, addresses, etc. were altered, blocked, or trimmed out from the original database, at the same time the users of the data not to be able to compromise with other person’s confidentiality; and anther rule hiding, in which sensitive knowledge extracted from the data mining process be excluded for use, because confidential information may be Derived from the released knowledge. This problem is also commonly called the “database inference problem;” and lastly Secure Multiparty Computation (SMC), where distributed data are encrypted before released or shared for computations, Data encryption techniques that used in security.
Authors and Affiliations
M. Mohanrao, Dr. S. Karthik
Information Security in WSN’s using AES
Wireless sensor networks simplify the collection and analysis of data from multiple locations. The selforganization capabilities of wireless sensor networks enable rapid deployment of target tracking and intrusion detect...
Review on Automation Tools in Software Testing
Testing is major component of any software engineering process meant to produce high quality applications. Software Testing can be conducted manually as well as automated. Manual Testing has many drawbacks such as consu...
Factors Influencing Safety in Construction Project and Behavior Based Safety Management Approach
Construction works all over the world pose serious threat to workers and non-workers. This study investigates the current scenario of labor’s working in construction industry in terms of Health, Safety and Environmental...
Efficient Multiplier Design for DWT through Lifting Scheme
For having loss less data transmission in the communication world, with the aid of lifting based algorithm we go for wavelet transform technique. A single signal (speech, image or audio) is converted into high frequenc...
Corrosion Inhibition of Copper Metal by Prosopis Cineraria Leaves as Green Corrosion Inhibitor in Acidic Medium
Ethanolic extract of Prosopis cineraria leaves(EEPcL) behaves as a green corrosion inhibitor to replace toxic chemicals. The corrosion inhibition of copper in 0.5 N HCl by Prosopis cineraria leaves has been studied by m...