Sachan et al., 2013 - Google Patents
An analysis of privacy preservation techniques in data miningSachan et al., 2013
- Document ID
- 15057333595282717355
- Author
- Sachan A
- Roy D
- Arun P
- Publication year
- Publication venue
- Advances in Computing and Information Technology: Proceedings of the Second International Conference on Advances in Computing and Information Technology (ACITY) July 13-15, 2012, Chennai, India-Volume 3
External Links
Snippet
Data mining techniques are used extensively for deducting the implicit, previously unknown, and potentially useful information from large data sets by using statistical and intelligent methodologies. The deduction of patterns or conclusions may uncover the information that …
- 238000007418 data mining 0 title abstract description 31
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6254—Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30386—Retrieval requests
- G06F17/30424—Query processing
- G06F17/30533—Other types of queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30386—Retrieval requests
- G06F17/30424—Query processing
- G06F17/30477—Query execution
- G06F17/30507—Applying rules; deductive queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6227—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30587—Details of specialised database models
- G06F17/30595—Relational databases
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30289—Database design, administration or maintenance
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30943—Information retrieval; Database structures therefor; File system structures therefor details of database functions independent of the retrieved data type
- G06F17/30946—Information retrieval; Database structures therefor; File system structures therefor details of database functions independent of the retrieved data type indexing structures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Kabir et al. | Efficient systematic clustering method for k-anonymization | |
Sachan et al. | An analysis of privacy preservation techniques in data mining | |
Jayabalan et al. | Anonymizing healthcare records: a study of privacy preserving data publishing techniques | |
Liu et al. | SMC: A practical schema for privacy-preserved data sharing over distributed data streams | |
Sharma et al. | An efficient approach for privacy preserving in data mining | |
Ghate et al. | Clustering based Anonymization for privacy preservation | |
Suresh et al. | Kloakdb: A platform for analyzing sensitive data with $ k $-anonymous query processing | |
Liao et al. | Data privacy protection based on sensitive attributes dynamic update | |
Logeswari et al. | A cost effective clustering based anonymization approach for storing PHR's in cloud | |
Sowmyarani et al. | Survey on recent developments in privacy preserving models | |
Chidambaram et al. | A combined random noise perturbation approach for multi level privacy preservation in data mining | |
Sheela et al. | Partition based perturbation for privacy preserving distributed data mining | |
Raj et al. | Big data anonymization in cloud using k-anonymity algorithm using map reduce framework | |
Dhivakar et al. | A survey on privacy preservation recent approaches and techniques | |
Abad et al. | A novel approach for privacy preserving in medical data mining using sensitivity based anonymity | |
Sharma | A Survey on Maintaining Privacy in Data Mining | |
Mohammed et al. | A novel technique of privacy preserving association rule mining | |
Jadhav | Distributed bottom up approach for data anonymization using mapreduce framework on cloud | |
Sei et al. | (l1,..., lq)-diversity for Anonymizing Sensitive Quasi-Identifiers | |
Raut et al. | An approach to mining association rules in horizontally distributed databases with anonymous ID assignment | |
Gachanga et al. | Sensitivity based data anonymization model with mixed generalization | |
Wahida et al. | Coordination Approach to Mitigate Composition Attack | |
Raju et al. | An optimal dynamic KCi-slice model for privacy preserving data publishing of multiple sensitive attributes adopting various sensitivity thresholds | |
Scientific | THE SCALABLE REVERSIBLE RANDOMIZATION ALGORITHM (SRRA) FOR BETTER PRIVACY PRESERVATION, IMPROVED FEATURE SELECTION STABILITY, AND HIGHER ACCURACY IN BIG DATA ANALYTICS | |
Indhumathi et al. | Data preserving techniques for collaborative data publishing |