Privacy Preserving Using Randomization and Encryption Methods

Journal Title: Scholars Journal of Engineering and Technology - Year 2013, Vol 1, Issue 3

Abstract

The technology of data mining is used in extraction of useful knowledge from large data sets. The process of data collection and data dissemination may, however, result in an inherent risk of privacy threats. Before publishing or sharing private information about individuals, businesses and organizations have to be suppressed. Privacy-preserving data mining has thus become an important issue in current years. This paper has review of evolutionary privacy-preserving data mining technology to find appropriate method to perform secure transactions into a database.

Authors and Affiliations

Mohnish Patel, Prashant Richariya, Anurag Shrivastava

Keywords

Related Articles

Image Encryption and Compression Using Scalable Coding Techniques

Abstract: The security becomes an important issue of communication and storage of image due to the growth of multimedia application. Encryption is one of the ways to ensure high security. Images are used in many fields s...

Modelling natural gas pressure reducing stations for power generation using expansion turbines

Natural gas has a high pressure before consumption in industries and cities. This pressure is reduced using relief valves in urban gas pressure reducing stations. Pressure drop results in great energy loss and accordingl...

Automated Controllers Functioning Criteria in Content Distribution Systems

This paper describes content distribution systems (CDS) used in telecommunication datacenters. First or last, the CDS becomes large, and its detailed engineering can not be performed during reasonable time span. Therefor...

The Impact of Clustering Mechanism in Dense Wireless Sensor Network

Abstract: A sensor is a miniature component which gauges physical parameters from the environment. A sensor measures the physical parameters and transmits them either by wired or wireless means. In wireless medium the se...

Simulating Calculation of Oilfield Water Injection System

The text introduces the base theory of pipeline network hydraulic calculation, analyzes how to set up the mathematical model solving the node pressure by the continuous equation and pressure drop equation and discusses t...

Download PDF file
  • EP ID EP384380
  • DOI -
  • Views 90
  • Downloads 0

How To Cite

Mohnish Patel, Prashant Richariya, Anurag Shrivastava (2013). Privacy Preserving Using Randomization and Encryption Methods. Scholars Journal of Engineering and Technology, 1(3), 117-121. https://europub.co.uk/articles/-A-384380