Realization of the cryptographic processes in privacy preserving

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Abstract

    Several data mining processes include privacy preservation in order to avoid disclosure of sensitive information while discovering knowledge. Data mining algorithms uses numerous modification techniques to construct models or patterns from private data. It is essential to evaluate the quality of the data resulting from the alteration applied by each algorithm, as well as the performance of the algorithms. Hence it is required to identify a broad set of decisive factors with respect to which to assess the existing algorithms and determine which algorithm meets specific requirements. This paper discusses the working of the cryptographical techniques and its usage in privacy preserving data mining. The performances of these procedures are analyzed indicating their level of privacy maintained.

    Original languageEnglish
    Title of host publicationProceedings of International Conference on Advances in Computing
    PublisherSpringer Verlag
    Pages673-678
    Number of pages6
    ISBN (Print)9788132207399
    DOIs
    Publication statusPublished - 01-01-2013
    EventInternational Conference on Advances in Computing, ICAdC 2012 - Bangalore, Karnataka, India
    Duration: 04-07-201206-07-2012

    Publication series

    NameAdvances in Intelligent Systems and Computing
    Volume174 AISC
    ISSN (Print)2194-5357

    Conference

    ConferenceInternational Conference on Advances in Computing, ICAdC 2012
    Country/TerritoryIndia
    CityBangalore, Karnataka
    Period04-07-1206-07-12

    All Science Journal Classification (ASJC) codes

    • Control and Systems Engineering
    • General Computer Science

    Fingerprint

    Dive into the research topics of 'Realization of the cryptographic processes in privacy preserving'. Together they form a unique fingerprint.

    Cite this