A Survey of Cryptographic and Non-cryptographic Techniques for Privacy Preservation

  • Singh B
  • Singh A
  • Singh D
N/ACitations
Citations of this article
9Readers
Mendeley users who have this article in their library.

Abstract

Cryptographyis to become familiar with the requirement of large, complex, information rich data sets for it’sprivacy preservation. The privacy preserving data mining has been generated; to go through the concept of privacy in data mining is hard. Several algorithms and approaches are being generated theoretically, but practically it is hard. Privacy in data mining can be achieved through several techniques such as Perturbation, Anonymization and Cryptographic. Here in this paper tries to reiterate several Privacy Preserving Data Mining (PPDM) techniques presently developed to cope up with the privacy issues in the process of data mining. In this paper there is a survey of various cryptographic & non-cryptographic techniques too.

Cite

CITATION STYLE

APA

Singh, B., Singh, A., & Singh, D. (2015). A Survey of Cryptographic and Non-cryptographic Techniques for Privacy Preservation. International Journal of Computer Applications, 130(13), 7–10. https://doi.org/10.5120/ijca2015907146

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free