2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12) 2012
DOI: 10.1109/icccnt.2012.6396017
|View full text |Cite
|
Sign up to set email alerts
|

A new model for privacy preserving sensitive Data Mining

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 14 publications
(4 citation statements)
references
References 4 publications
0
4
0
Order By: Relevance
“…The fourth phase is concerned with data hiding; whether it is the raw or aggregate data that need to be hid. Data hiding refers to the cases where the sensitive data from original database like identity, name, and address that can be linked, directly or indirectly, to an individual person are hided [14][15][16]. The last phase is the privacy preservation techniques.…”
Section: The Privacy Frameworkmentioning
confidence: 99%
“…The fourth phase is concerned with data hiding; whether it is the raw or aggregate data that need to be hid. Data hiding refers to the cases where the sensitive data from original database like identity, name, and address that can be linked, directly or indirectly, to an individual person are hided [14][15][16]. The last phase is the privacy preservation techniques.…”
Section: The Privacy Frameworkmentioning
confidence: 99%
“…One of the major threats people face today is Cyber Crime [4]. Since most of our information is stored on electronic media and a lot of data is also available on internet or networks.…”
Section: A Cyber Terrorism Insider Threats and External Attacksmentioning
confidence: 99%
“…Another area which requires attention is detecting frauds and thefts. Frauds may be credit card frauds [4]. These can be detected by identifying purchases made of enormous amounts.…”
Section: B Credit Card Fraud and Identity Theftmentioning
confidence: 99%
“…A lot of excellent works [1][2][3][4][5] have been conducted to protect users' privacy in statistic data. Among all these works, the state-of-the-art privacy model is differential privacy [5], which can provide rigorous privacy guarantees.…”
Section: Introductionmentioning
confidence: 99%