Realization of the cryptographic processes in privacy preserving

0Citations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Several data mining processes include privacy preservation in order to avoid disclosure of sensitive information while discovering knowledge. Data mining algorithms uses numerous modification techniques to construct models or patterns from private data. It is essential to evaluate the quality of the data resulting from the alteration applied by each algorithm, as well as the performance of the algorithms. Hence it is required to identify a broad set of decisive factors with respect to which to assess the existing algorithms and determine which algorithm meets specific requirements. This paper discusses the working of the cryptographical techniques and its usage in privacy preserving data mining. The performances of these procedures are analyzed indicating their level of privacy maintained. © 2013 Springer.

Cite

CITATION STYLE

APA

Sumana, M., & Hareesh, K. S. (2013). Realization of the cryptographic processes in privacy preserving. In Advances in Intelligent Systems and Computing (Vol. 174 AISC, pp. 673–678). Springer Verlag. https://doi.org/10.1007/978-81-322-0740-5_80

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free