Privacy preserving technique in data mining by using Chinease remainder theorem

4Citations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Human users are facing lots of problems, when they are transmitting sensitive data and confidential data. The sensitive data is intended to share between only authorized persons, not for all. The collection and sharing of person specific sensitive data for data mining raise serious concerns about the privacy of individuals. Privacy preserving data mining also concentrate on sensitive knowledge pattern that can be exposed when mining the data. Therefore, researchers, for a long time period, have been investigating paths to provide privacy for sensitive data in data mining analysis task process. So, many techniques have been introduced on privacy preserving issues in data mining by using equivalence operator. In this paper we proposed an effective and efficient approach based on Chinease remainder theorem (CRT) that uses congruence operator to provide privacy of sensitive data in the transformation of extracted data mining analysis from servers to clients. © 2012 Springer-Verlag.

Cite

CITATION STYLE

APA

Rajesh, P., Narasimha, G., & Rupa, C. (2012). Privacy preserving technique in data mining by using Chinease remainder theorem. In Communications in Computer and Information Science (Vol. 305 CCIS, pp. 434–442). https://doi.org/10.1007/978-3-642-32112-2_50

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free