Skip to main content

Realization of the Cryptographic Processes in Privacy Preserving

  • Conference paper
Proceedings of International Conference on Advances in Computing

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 174))

  • 1422 Accesses

Abstract

Several data mining processes include privacy preservation in order to avoid disclosure of sensitive information while discovering knowledge. Data mining algorithms uses numerous modification techniques to construct models or patterns from private data. It is essential to evaluate the quality of the data resulting from the alteration applied by each algorithm, as well as the performance of the algorithms. Hence it is required to identify a broad set of decisive factors with respect to which to assess the existing algorithms and determine which algorithm meets specific requirements. This paper discusses the working of the cryptographical techniques and its usage in privacy preserving data mining. The performances of these procedures are analyzed indicating their level of privacy maintained.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bertino, E., Lin, D., Jiang, W.: A Survey of Quantification of Privacy Preserving Data Mining Algorithms. Scientific Commons (2008)

    Google Scholar 

  2. Aggarwal, C.C., Yu, P.S.: Privacy Preserving Data Mining: Models and Algorithms. Springer (2007)

    Google Scholar 

  3. Lindell, Y., Pinkas, B.: Secure Multiparty Computation for Privacy-Preserving Data Mining. Israel Science Foundation (grant number 860/06) (2008)

    Google Scholar 

  4. Hussein, M., El-Sisi, A., Ismail, N.: Fast Cryptographic Privacy Preserving Association Rules Mining on Distributed Homogenous Data Base, pp. 607–616. Springer, Heidelberg (2008)

    Google Scholar 

  5. Clifton, C., Kantarcioglu, M., Vaidya, J.: Tools for Privacy Preserving Distributed Data Mining. SIGKDD Explorations 4(2) (2004)

    Google Scholar 

  6. Shrikant Vaidya, J.: Privacy Preserving Data Mining Over Vertically Partitioned Data. A Thesis Submitted to Purdue University for the Degree of Doctor of Philosophy (August 2004)

    Google Scholar 

  7. Kenthapadi, K.: Models and Algorithms for Data Privacy. A Dissertation Submitted To The Department Of Computer Science for the Degree of Doctor of Philosophy (September 2006)

    Google Scholar 

  8. Du, W., Zhan, Z.: Building decision tree classifier on private data. In: IEEE International Conference on Data Mining Workshop on Privacy, Security, and Data Mining, Maebashi City, Japan, December 9, vol. 14, pp. 1–8. Australian Computer Society (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to M. Sumana .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer India

About this paper

Cite this paper

Sumana, M., Hareesh, K.S. (2013). Realization of the Cryptographic Processes in Privacy Preserving. In: Kumar M., A., R., S., Kumar, T. (eds) Proceedings of International Conference on Advances in Computing. Advances in Intelligent Systems and Computing, vol 174. Springer, New Delhi. https://doi.org/10.1007/978-81-322-0740-5_80

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-0740-5_80

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-0739-9

  • Online ISBN: 978-81-322-0740-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics