Realization of the cryptographic processes in privacy preserving

M. Sumana, K. S. Hareesh

Research output: Chapter in Book/Report/Conference proceedingConference contribution


Several data mining processes include privacy preservation in order to avoid disclosure of sensitive information while discovering knowledge. Data mining algorithms uses numerous modification techniques to construct models or patterns from private data. It is essential to evaluate the quality of the data resulting from the alteration applied by each algorithm, as well as the performance of the algorithms. Hence it is required to identify a broad set of decisive factors with respect to which to assess the existing algorithms and determine which algorithm meets specific requirements. This paper discusses the working of the cryptographical techniques and its usage in privacy preserving data mining. The performances of these procedures are analyzed indicating their level of privacy maintained.

Original languageEnglish
Title of host publicationProceedings of International Conference on Advances in Computing
PublisherSpringer Verlag
Number of pages6
ISBN (Print)9788132207399
Publication statusPublished - 01-01-2013
EventInternational Conference on Advances in Computing, ICAdC 2012 - Bangalore, Karnataka, India
Duration: 04-07-201206-07-2012

Publication series

NameAdvances in Intelligent Systems and Computing
Volume174 AISC
ISSN (Print)2194-5357


ConferenceInternational Conference on Advances in Computing, ICAdC 2012
CityBangalore, Karnataka

All Science Journal Classification (ASJC) codes

  • Control and Systems Engineering
  • Computer Science(all)


Dive into the research topics of 'Realization of the cryptographic processes in privacy preserving'. Together they form a unique fingerprint.

Cite this