Realization of the cryptographic processes in privacy preserving

M. Sumana, K. S. Hareesh

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Several data mining processes include privacy preservation in order to avoid disclosure of sensitive information while discovering knowledge. Data mining algorithms uses numerous modification techniques to construct models or patterns from private data. It is essential to evaluate the quality of the data resulting from the alteration applied by each algorithm, as well as the performance of the algorithms. Hence it is required to identify a broad set of decisive factors with respect to which to assess the existing algorithms and determine which algorithm meets specific requirements. This paper discusses the working of the cryptographical techniques and its usage in privacy preserving data mining. The performances of these procedures are analyzed indicating their level of privacy maintained.

Original languageEnglish
Title of host publicationProceedings of International Conference on Advances in Computing
PublisherSpringer Verlag
Pages673-678
Number of pages6
ISBN (Print)9788132207399
DOIs
Publication statusPublished - 01-01-2013
EventInternational Conference on Advances in Computing, ICAdC 2012 - Bangalore, Karnataka, India
Duration: 04-07-201206-07-2012

Publication series

NameAdvances in Intelligent Systems and Computing
Volume174 AISC
ISSN (Print)2194-5357

Conference

ConferenceInternational Conference on Advances in Computing, ICAdC 2012
CountryIndia
CityBangalore, Karnataka
Period04-07-1206-07-12

Fingerprint

Data mining

All Science Journal Classification (ASJC) codes

  • Control and Systems Engineering
  • Computer Science(all)

Cite this

Sumana, M., & Hareesh, K. S. (2013). Realization of the cryptographic processes in privacy preserving. In Proceedings of International Conference on Advances in Computing (pp. 673-678). (Advances in Intelligent Systems and Computing; Vol. 174 AISC). Springer Verlag. https://doi.org/10.1007/978-81-322-0740-5_80
Sumana, M. ; Hareesh, K. S. / Realization of the cryptographic processes in privacy preserving. Proceedings of International Conference on Advances in Computing. Springer Verlag, 2013. pp. 673-678 (Advances in Intelligent Systems and Computing).
@inproceedings{c4a4e9519708456c841d19781b9161c3,
title = "Realization of the cryptographic processes in privacy preserving",
abstract = "Several data mining processes include privacy preservation in order to avoid disclosure of sensitive information while discovering knowledge. Data mining algorithms uses numerous modification techniques to construct models or patterns from private data. It is essential to evaluate the quality of the data resulting from the alteration applied by each algorithm, as well as the performance of the algorithms. Hence it is required to identify a broad set of decisive factors with respect to which to assess the existing algorithms and determine which algorithm meets specific requirements. This paper discusses the working of the cryptographical techniques and its usage in privacy preserving data mining. The performances of these procedures are analyzed indicating their level of privacy maintained.",
author = "M. Sumana and Hareesh, {K. S.}",
year = "2013",
month = "1",
day = "1",
doi = "10.1007/978-81-322-0740-5_80",
language = "English",
isbn = "9788132207399",
series = "Advances in Intelligent Systems and Computing",
publisher = "Springer Verlag",
pages = "673--678",
booktitle = "Proceedings of International Conference on Advances in Computing",
address = "Germany",

}

Sumana, M & Hareesh, KS 2013, Realization of the cryptographic processes in privacy preserving. in Proceedings of International Conference on Advances in Computing. Advances in Intelligent Systems and Computing, vol. 174 AISC, Springer Verlag, pp. 673-678, International Conference on Advances in Computing, ICAdC 2012, Bangalore, Karnataka, India, 04-07-12. https://doi.org/10.1007/978-81-322-0740-5_80

Realization of the cryptographic processes in privacy preserving. / Sumana, M.; Hareesh, K. S.

Proceedings of International Conference on Advances in Computing. Springer Verlag, 2013. p. 673-678 (Advances in Intelligent Systems and Computing; Vol. 174 AISC).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - Realization of the cryptographic processes in privacy preserving

AU - Sumana, M.

AU - Hareesh, K. S.

PY - 2013/1/1

Y1 - 2013/1/1

N2 - Several data mining processes include privacy preservation in order to avoid disclosure of sensitive information while discovering knowledge. Data mining algorithms uses numerous modification techniques to construct models or patterns from private data. It is essential to evaluate the quality of the data resulting from the alteration applied by each algorithm, as well as the performance of the algorithms. Hence it is required to identify a broad set of decisive factors with respect to which to assess the existing algorithms and determine which algorithm meets specific requirements. This paper discusses the working of the cryptographical techniques and its usage in privacy preserving data mining. The performances of these procedures are analyzed indicating their level of privacy maintained.

AB - Several data mining processes include privacy preservation in order to avoid disclosure of sensitive information while discovering knowledge. Data mining algorithms uses numerous modification techniques to construct models or patterns from private data. It is essential to evaluate the quality of the data resulting from the alteration applied by each algorithm, as well as the performance of the algorithms. Hence it is required to identify a broad set of decisive factors with respect to which to assess the existing algorithms and determine which algorithm meets specific requirements. This paper discusses the working of the cryptographical techniques and its usage in privacy preserving data mining. The performances of these procedures are analyzed indicating their level of privacy maintained.

UR - http://www.scopus.com/inward/record.url?scp=84871334732&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84871334732&partnerID=8YFLogxK

U2 - 10.1007/978-81-322-0740-5_80

DO - 10.1007/978-81-322-0740-5_80

M3 - Conference contribution

AN - SCOPUS:84871334732

SN - 9788132207399

T3 - Advances in Intelligent Systems and Computing

SP - 673

EP - 678

BT - Proceedings of International Conference on Advances in Computing

PB - Springer Verlag

ER -

Sumana M, Hareesh KS. Realization of the cryptographic processes in privacy preserving. In Proceedings of International Conference on Advances in Computing. Springer Verlag. 2013. p. 673-678. (Advances in Intelligent Systems and Computing). https://doi.org/10.1007/978-81-322-0740-5_80