Privacy preserving data mining by cyptography

1Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

It is obvious that if a data mining algorithm is run against the union of the databases, and its output becomes known to one or more of the parties, it reveals something about the contents of the other databases. Research in secure distributed computation, which was done as part of a larger body of research in the theory of cryptography, has achieved remarkable results. These results were shown using generic constructions that can be applied to any function that has an efficient representation as a circuit. We describe these results, discuss their efficiency, and demonstrate their relevance to privacy preserving computation of data mining algorithms. Note that we consider here a distributed computing scenario, rather than a scenario where all data is gathered in a central server, which then runs the algorithm against all data. (The central server scenario introduces interesting privacy issues, too, but they are outside the scope of this paper.) © 2010 Springer-Verlag Berlin Heidelberg.

Cite

CITATION STYLE

APA

Sharma, A., & Ojha, V. (2010). Privacy preserving data mining by cyptography. In Communications in Computer and Information Science (Vol. 89 CCIS, pp. 576–582). https://doi.org/10.1007/978-3-642-14478-3_58

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free