Privacy Preserving Using Randomization and Encryption Methods

Journal Title: Scholars Journal of Engineering and Technology - Year 2013, Vol 1, Issue 3

Abstract

The technology of data mining is used in extraction of useful knowledge from large data sets. The process of data collection and data dissemination may, however, result in an inherent risk of privacy threats. Before publishing or sharing private information about individuals, businesses and organizations have to be suppressed. Privacy-preserving data mining has thus become an important issue in current years. This paper has review of evolutionary privacy-preserving data mining technology to find appropriate method to perform secure transactions into a database.

Authors and Affiliations

Mohnish Patel, Prashant Richariya, Anurag Shrivastava

Keywords

Related Articles

Flow-Based Model for Joint Routing and Request Routing in Hybrid Content Delivery Networks

Growing number of users, increasing popularity of large-scale multimedia content and high requirements for quality of delivery the content lead to integration of Content Delivery Networks (CDN) and Peer-to-Peer (P2P) net...

Parametric Study of Basic Items in the Desulfurization Process; Evaluation of Uncertainty Data

The subject of this experimental report is the application of nano particles in petroleum refinement. Sulfur removal from petroleum using mixed bed which contains nano molybdenum oxide and nano cobalt oxide, each of them...

Evaluation of Water Flooding Development Effect by Using Water Storage Rate and Water Flooding Index

Because the edge water is not active and natural energy field is not sufficient, it is quite difficult to develop the low permeability reservoir. The formation pressure can be supplied through water flooding which is the...

Classification and Blocking of Spam Users based on Review Using Expected Maximization Algorithm

An excellent source of collecting the reviews on specific product is various online shopping sites where people share their reviews on products and their shopping experience. People may come through the wrong opinions kn...

Numerical simulation analysis of cone angle effect on the de-sanding performance of hydrocyclone

First, the necessities of produced liquid sand removal in oil-field are introduced, in addition to the structure of the cyclone-desander to study and its basic separation principle are discussed. By using numerical simul...

Download PDF file
  • EP ID EP384380
  • DOI -
  • Views 86
  • Downloads 0

How To Cite

Mohnish Patel, Prashant Richariya, Anurag Shrivastava (2013). Privacy Preserving Using Randomization and Encryption Methods. Scholars Journal of Engineering and Technology, 1(3), 117-121. https://europub.co.uk/articles/-A-384380