Hybrid solution for privacy-preserving data mining on the cloud computing

2Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The continuous evolution of the cloud has attracted many enterprises to outsource their data to the cloud to accomplish data mining tasks and other services. So that data owners can enjoy the benefits of the cloud without fear from violations of data privacy, PPDM approaches came to protect the privacy of data while preserving the usefulness of data. This article reviews the most popular models of PPDM over the cloud along with their strengths and the weaknesses to conclude the research gap. Some of the current PPDM models still vulnerable to various types of attacks like the K-anonymity model whereby surface from background knowledge attack, homogeneity attack, similarity attack and probabilistic inference attack, others of them consume great computational complexity, for example, the methods which depended on cryptography. The hybrid solution was proposed to protect the data privacy and overcome the current problems of PPDM include identify and attributes disclosures whereby preservation the privacy of data before to outsourced on the cloud is the main focus. K-Anonymization is combined with homomorphic encryption to rid from their limitations and take their advantage together to enhance data privacy-preserving and maintain the data utility of outsourced data.

Cite

CITATION STYLE

APA

Osman, H., Maarof, M. A., & Siraj, M. M. (2020). Hybrid solution for privacy-preserving data mining on the cloud computing. In Advances in Intelligent Systems and Computing (Vol. 1073, pp. 748–758). Springer. https://doi.org/10.1007/978-3-030-33582-3_70

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free