Proceedings of the Third Annual ACM Bangalore Conference 2010
DOI: 10.1145/1754288.1754302
|View full text |Cite
|
Sign up to set email alerts
|

A cryptography based privacy preserving solution to mine cloud data

Abstract: Due to increased adoption of cloud computing, there is a growing need of addressing the data privacy during mining. On the other hand, knowledge sharing is a key to survive many business organizations. Several attempts have been made to mine the data in distributed environment however, maintaining the privacy while mining the data over cloud is a challenging task. In this paper, we present an efficient and practical cryptographic based scheme that preserves privacy and mine the cloud data which is distributed … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2010
2010
2021
2021

Publication Types

Select...
5
3
1

Relationship

1
8

Authors

Journals

citations
Cited by 25 publications
(5 citation statements)
references
References 9 publications
0
5
0
Order By: Relevance
“…Step (iii): location of each observation's k − 1 nearest neighbours This step of the method locates the k −1 nearest neighbours of each observation, for which we use the so-called k-NN (k nearest neighbours) algorithm. This procedure is based on a technique in machine learning and is widely used in several disciplines such as computational geometry [21], diagnostic medicine [22], cryptography [23], data mining [24], and as here, in solutions for data privacy [25].…”
Section: Anonymisation Proceduresmentioning
confidence: 99%
“…Step (iii): location of each observation's k − 1 nearest neighbours This step of the method locates the k −1 nearest neighbours of each observation, for which we use the so-called k-NN (k nearest neighbours) algorithm. This procedure is based on a technique in machine learning and is widely used in several disciplines such as computational geometry [21], diagnostic medicine [22], cryptography [23], data mining [24], and as here, in solutions for data privacy [25].…”
Section: Anonymisation Proceduresmentioning
confidence: 99%
“…The fact that personal data are examined is considered as a privacy violation if it's not done properly. This kind of procedures should provide basic anonymization through the data analysis in order for the client's privacy to be ensured [19].…”
Section: Privacy Preserving Data Miningmentioning
confidence: 99%
“…Ling et al [15] have proposed solution based on bloom filter to protect organizations data repurposed for business intelligence and customer private data. A weighted k-NN classification approach has been suggested by Meena et al [16], for mining data in the cloud environment. Synthetic data generation, which is not the same as original data, has been proposed by Vishal et al [17], especially for organizations who have chosen to outsource data mining tasks, as in KPO.…”
Section: Preserving Data Privacymentioning
confidence: 99%