A reconstruction algorithm using binary transform for privacy-preserving data mining

3Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.

Abstract

Background/Objectives: In the cloud computing environment, since information owner's stress over private data in their information being revealed without authorization, they attempt to hold the learning inside of the information, while applying security saving strategies to the information. Methods/Statistical Analysis: Before, an information bother methodology was ordinarily used to adjust the first information content; however it likewise brings about information twisting, and henceforth prompts noteworthy loss of learning inside of the information. To protect the user privacy, a convertible a randomization scheme is required. It allows the specific recipient to retrieve a perturbed data and that into the original signature so that it achieves enough privacy verifiability for the user. Findings: In this paper, we propose a novel and secure reconstruction scheme with privacy measure. To take care of this issue, this study presented the idea of reversible whole number change in the picture handling area and added to a Reconstruction algorithm calculation that can disturb and restore information. In this paper we developed an extended block cipher mode method that effectively masks the sensitive information of health care systems database. Application/Improvements: In the final section, we analyze the privacy performance with various parameter values.

Cite

CITATION STYLE

APA

Aruna Kumari, D., & Gunasekhar, T. (2016). A reconstruction algorithm using binary transform for privacy-preserving data mining. Indian Journal of Science and Technology, 9(17). https://doi.org/10.17485/ijst/2016/v9i17/93122

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free