Securing Personal Information in Data Mining
Journal Title: International Journal of Modern Engineering Research (IJMER) - Year 2014, Vol 4, Issue 1
Abstract
This paper presents few of the frequent authentication and security mechanisms and mechanisms used in several securing personal information in data mining techniques. The paper describes an overview of some of the well known securing personal information (privacy preserve) in data mining , - ID3 for decision tree, association rule mining, EM clustering, frequency mining and Naïve Bayes. Most of these algorithms are usually a modification of a well known data mining algorithm along with some privacy preserving techniques. The paper finally describes the problem of using a model without knowing the model rules on context of passenger classification at the airlines security checkpoint by homeland security. This paper is intended to be a summary and a high level overview of PPDM.
Authors and Affiliations
B. Sreenivasulu
Integration of Wired and Wireless Networks through a Personal Communication network (PCN)
Abstract: The Personal Communication Network (PCN) is known as the personal communication services (PCS) and is the result of the evolution of a mobile phone system. The PCN aims to support the services provided by...
Investigation of Barreling Radius and Top Surface Area for Cold Upsetting Ofaluminum Specimens
In this work cold upset forging experiments have been conducted on aluminum 6063 specimens without constraints and without use of lubricants. Strain behavior, barreling radius and top surface area characteristics ha...
Mobile Radiation Measuring System using Small Linux box and GPS sensor
The effect of radiation and the measuring the radiation dose rate amount has become as important research topics among the researcher, after the nuclear accident happened in Japan. Several commercial equipments...
Efficient Implementation of Low Power 2-D DCT Architecture
This Research paper includes designing a area efficient and low error Discrete Cosine Transform. This area efficient and low error DCT is obtained by using shifters and adders in place of multipliers. The main tech...
A Novel Method for Privacy Preserving Micro data Publishing using Slicing
Data anonymization techniques for privacy-preserving data publishing have received a lot of attention in recent years. Microdata or detailed data contains information about a person, a household or an organization....