[go: up one dir, main page]

Sachan et al., 2013 - Google Patents

An analysis of privacy preservation techniques in data mining

Sachan et al., 2013

Document ID
15057333595282717355
Author
Sachan A
Roy D
Arun P
Publication year
Publication venue
Advances in Computing and Information Technology: Proceedings of the Second International Conference on Advances in Computing and Information Technology (ACITY) July 13-15, 2012, Chennai, India-Volume 3

External Links

Snippet

Data mining techniques are used extensively for deducting the implicit, previously unknown, and potentially useful information from large data sets by using statistical and intelligent methodologies. The deduction of patterns or conclusions may uncover the information that …
Continue reading at link.springer.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6254Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • G06F17/30386Retrieval requests
    • G06F17/30424Query processing
    • G06F17/30533Other types of queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • G06F17/30386Retrieval requests
    • G06F17/30424Query processing
    • G06F17/30477Query execution
    • G06F17/30507Applying rules; deductive queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • G06F17/30587Details of specialised database models
    • G06F17/30595Relational databases
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • G06F17/30289Database design, administration or maintenance
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30943Information retrieval; Database structures therefor; File system structures therefor details of database functions independent of the retrieved data type
    • G06F17/30946Information retrieval; Database structures therefor; File system structures therefor details of database functions independent of the retrieved data type indexing structures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled

Similar Documents

Publication Publication Date Title
Kabir et al. Efficient systematic clustering method for k-anonymization
Sachan et al. An analysis of privacy preservation techniques in data mining
Jayabalan et al. Anonymizing healthcare records: a study of privacy preserving data publishing techniques
Liu et al. SMC: A practical schema for privacy-preserved data sharing over distributed data streams
Sharma et al. An efficient approach for privacy preserving in data mining
Ghate et al. Clustering based Anonymization for privacy preservation
Suresh et al. Kloakdb: A platform for analyzing sensitive data with $ k $-anonymous query processing
Liao et al. Data privacy protection based on sensitive attributes dynamic update
Logeswari et al. A cost effective clustering based anonymization approach for storing PHR's in cloud
Sowmyarani et al. Survey on recent developments in privacy preserving models
Chidambaram et al. A combined random noise perturbation approach for multi level privacy preservation in data mining
Sheela et al. Partition based perturbation for privacy preserving distributed data mining
Raj et al. Big data anonymization in cloud using k-anonymity algorithm using map reduce framework
Dhivakar et al. A survey on privacy preservation recent approaches and techniques
Abad et al. A novel approach for privacy preserving in medical data mining using sensitivity based anonymity
Sharma A Survey on Maintaining Privacy in Data Mining
Mohammed et al. A novel technique of privacy preserving association rule mining
Jadhav Distributed bottom up approach for data anonymization using mapreduce framework on cloud
Sei et al. (l1,..., lq)-diversity for Anonymizing Sensitive Quasi-Identifiers
Raut et al. An approach to mining association rules in horizontally distributed databases with anonymous ID assignment
Gachanga et al. Sensitivity based data anonymization model with mixed generalization
Wahida et al. Coordination Approach to Mitigate Composition Attack
Raju et al. An optimal dynamic KCi-slice model for privacy preserving data publishing of multiple sensitive attributes adopting various sensitivity thresholds
Scientific THE SCALABLE REVERSIBLE RANDOMIZATION ALGORITHM (SRRA) FOR BETTER PRIVACY PRESERVATION, IMPROVED FEATURE SELECTION STABILITY, AND HIGHER ACCURACY IN BIG DATA ANALYTICS
Indhumathi et al. Data preserving techniques for collaborative data publishing