Cluster Computing

, Volume 22, Supplement 1, pp 57–63 | Cite as

Upkeeping secrecy in information extraction using ‘k’ division graph based postulates

  • B. Santhosh KumarEmail author
  • S. Karthik
  • V. P. Arunachalam


The prevailing mechanisms for extracting useful information might offer enhanced results in extraction of useful data for creating classification policies. The goal is to administer the disputes prevailing within the categorization for supervised data. Moreover several schemes conceal the individuality of the schemes employed which attempts to conceal the location of information which might become a serious issue during conserving privacy of the data stored. The aim is to address the disputes by making use of a graph and hypothetical based scheme termed as k-segmentation of graphs which delivers the creation of difficult choice based tree classification organized into a priority based hierarchy. The analysis depicts that the designed scheme offers accuracy and effectiveness.


Information mining Precision Effectiveness Violation and segmentation 


  1. 1.
    Niewolny, D.: How the Internet of Things is revolutionizing healthcare. Tech. Rep, FreeScale Technologies (Whitepaper) (2010)Google Scholar
  2. 2.
    Kim, J.T.: Privacy and security issues for healthcare system with embedded RFID system on Internet of Things. Adv. Sci. Technol. Lett. 72, 109–112 (2014)CrossRefGoogle Scholar
  3. 3.
    Will the Internet of Things Analytics Revolutionize the Healthcare Industry? Tech. Rep. Saviance Technologies (2009)Google Scholar
  4. 4.
    Agrawal, R., Srikant, R.: Privacy preserving data mining. In: ACM SIGMOD International Conference on Management of data (2000)Google Scholar
  5. 5.
    Vaidya, J., Clifton, C.: Privacy-preserving data mining: why, how, and when. IEEE Secur. Priv. 2(6), 19–27 (2007)CrossRefGoogle Scholar
  6. 6.
    Quinlan, J.R.: Induction of Decision Trees. Mach. Learn. 1, 569–571 (1986)Google Scholar
  7. 7.
    Smys, S., Bala, GJ., Raj, JS.: Construction of virtual backbone to support mobility in MANET—a less overhead approach. In: Application of Information and Communication Technologies, AICT 2009. International Conference on 2009, pp. 1–4. IEEE (2009)Google Scholar
  8. 8.
    Aggarwal, C.C., Yu, P.S.: A course in number theory. Privacy Preserving Data Mining: Models and Algorithms. Springer, New York (2010)Google Scholar
  9. 9.
    Wang, P.: Survey on privacy preserving data mining. Int. J. Digit. Content. Technol. Appl. 4(9) (2010)Google Scholar
  10. 10.
    Kou, G., Peng, Y., Shi, Y., Chen, Z.: Privacy-preserving data mining of medical fata using data separation based techniques. Data Sci. J 6, S429–S434 (2007)CrossRefGoogle Scholar
  11. 11.
    Abad, B., Kinariwala, S.A.: A novel approach for privacy preserving in medical data mining using sensitivity based anonymity. Int. J. Comput. Appl. 42(4), 13–16 (2012)Google Scholar
  12. 12.
    Wong, R., Li, J., Fu, A., Wang, K.: (, k)-Anonymity: an enhanced k-anonymity model for privacy preserving data publishing, pp. 754–759. KDD, Japan (2006)Google Scholar
  13. 13.
    Wu, X.: Information security in big data: privacy and data mining. IEEE Access 2, 1149–1176 (2011)Google Scholar
  14. 14.
    Paryasto, M., Alamsyah, A., Rahardjo, B., Kuspriyanto : Big-data security management issues. In: 2nd International Conference on Information and Communication Technology (2014)Google Scholar
  15. 15.
    Tripathy, A., Pradhan, M.: A novel framework for preserving privacy of data using correlation analysis. In: International Conference on Advances in Computing Communications and Informatics–ICACCI 12, (2012)Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  • B. Santhosh Kumar
    • 1
    Email author
  • S. Karthik
    • 1
  • V. P. Arunachalam
    • 1
  1. 1.Department of Computer Science and EngineeringSNS College of TechnologyCoimbatoreIndia

Personalised recommendations