Realization of the cryptographic processes in privacy preserving

M. Sumana, K. S. Hareesh

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Several data mining processes include privacy preservation in order to avoid disclosure of sensitive information while discovering knowledge. Data mining algorithms uses numerous modification techniques to construct models or patterns from private data. It is essential to evaluate the quality of the data resulting from the alteration applied by each algorithm, as well as the performance of the algorithms. Hence it is required to identify a broad set of decisive factors with respect to which to assess the existing algorithms and determine which algorithm meets specific requirements. This paper discusses the working of the cryptographical techniques and its usage in privacy preserving data mining. The performances of these procedures are analyzed indicating their level of privacy maintained.

Original languageEnglish
Title of host publicationProceedings of International Conference on Advances in Computing
PublisherSpringer Verlag
Pages673-678
Number of pages6
ISBN (Print)9788132207399
DOIs
Publication statusPublished - 01-01-2013
EventInternational Conference on Advances in Computing, ICAdC 2012 - Bangalore, Karnataka, India
Duration: 04-07-201206-07-2012

Publication series

NameAdvances in Intelligent Systems and Computing
Volume174 AISC
ISSN (Print)2194-5357

Conference

ConferenceInternational Conference on Advances in Computing, ICAdC 2012
Country/TerritoryIndia
CityBangalore, Karnataka
Period04-07-1206-07-12

All Science Journal Classification (ASJC) codes

  • Control and Systems Engineering
  • Computer Science(all)

Fingerprint

Dive into the research topics of 'Realization of the cryptographic processes in privacy preserving'. Together they form a unique fingerprint.

Cite this