Abstract
Several data mining processes include privacy preservation in order to avoid disclosure of sensitive information while discovering knowledge. Data mining algorithms uses numerous modification techniques to construct models or patterns from private data. It is essential to evaluate the quality of the data resulting from the alteration applied by each algorithm, as well as the performance of the algorithms. Hence it is required to identify a broad set of decisive factors with respect to which to assess the existing algorithms and determine which algorithm meets specific requirements. This paper discusses the working of the cryptographical techniques and its usage in privacy preserving data mining. The performances of these procedures are analyzed indicating their level of privacy maintained.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Bertino, E., Lin, D., Jiang, W.: A Survey of Quantification of Privacy Preserving Data Mining Algorithms. Scientific Commons (2008)
Aggarwal, C.C., Yu, P.S.: Privacy Preserving Data Mining: Models and Algorithms. Springer (2007)
Lindell, Y., Pinkas, B.: Secure Multiparty Computation for Privacy-Preserving Data Mining. Israel Science Foundation (grant number 860/06) (2008)
Hussein, M., El-Sisi, A., Ismail, N.: Fast Cryptographic Privacy Preserving Association Rules Mining on Distributed Homogenous Data Base, pp. 607–616. Springer, Heidelberg (2008)
Clifton, C., Kantarcioglu, M., Vaidya, J.: Tools for Privacy Preserving Distributed Data Mining. SIGKDD Explorations 4(2) (2004)
Shrikant Vaidya, J.: Privacy Preserving Data Mining Over Vertically Partitioned Data. A Thesis Submitted to Purdue University for the Degree of Doctor of Philosophy (August 2004)
Kenthapadi, K.: Models and Algorithms for Data Privacy. A Dissertation Submitted To The Department Of Computer Science for the Degree of Doctor of Philosophy (September 2006)
Du, W., Zhan, Z.: Building decision tree classifier on private data. In: IEEE International Conference on Data Mining Workshop on Privacy, Security, and Data Mining, Maebashi City, Japan, December 9, vol. 14, pp. 1–8. Australian Computer Society (2002)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer India
About this paper
Cite this paper
Sumana, M., Hareesh, K.S. (2013). Realization of the Cryptographic Processes in Privacy Preserving. In: Kumar M., A., R., S., Kumar, T. (eds) Proceedings of International Conference on Advances in Computing. Advances in Intelligent Systems and Computing, vol 174. Springer, New Delhi. https://doi.org/10.1007/978-81-322-0740-5_80
Download citation
DOI: https://doi.org/10.1007/978-81-322-0740-5_80
Publisher Name: Springer, New Delhi
Print ISBN: 978-81-322-0739-9
Online ISBN: 978-81-322-0740-5
eBook Packages: EngineeringEngineering (R0)