2019
DOI: 10.1007/s12652-019-01335-w
|View full text |Cite
|
Sign up to set email alerts
|

A sanitization approach for privacy preserving data mining on social distributed environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
17
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 22 publications
(18 citation statements)
references
References 24 publications
0
17
0
Order By: Relevance
“…Consequently, other methods that allow for precise and targeted data to be analyzed while keeping the data encrypted ought to be utilized. For instance, techniques such as Fully Homomorphic Encryption (FHE) (El-Yahyaoui and El Kettani, 2017), Secure Function Evaluation (SFE) (Lekshmy and Rahiman, 2020), and Functional Encryption (FE) (Goodrich et al, 2014) are advisable for implementation. Moreover, the partitioning of data storage devices on non-communicating data centers can aid in lessening the problems that limit the execution of traditional security techniques.…”
Section: Proposed Security Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…Consequently, other methods that allow for precise and targeted data to be analyzed while keeping the data encrypted ought to be utilized. For instance, techniques such as Fully Homomorphic Encryption (FHE) (El-Yahyaoui and El Kettani, 2017), Secure Function Evaluation (SFE) (Lekshmy and Rahiman, 2020), and Functional Encryption (FE) (Goodrich et al, 2014) are advisable for implementation. Moreover, the partitioning of data storage devices on non-communicating data centers can aid in lessening the problems that limit the execution of traditional security techniques.…”
Section: Proposed Security Methodsmentioning
confidence: 99%
“…Data mining can also be defined as the process through which organizations turn the collected raw data into knowledge through identifying patterns. In the view of Lekshmy and Rahiman (2020), there is a growing problem with data mining and big data as mismanagement during transit or storage of data that is threatening social ethics. There is no guarantee that all organizations secure the data they have on their databases.…”
Section: Security Challenges and Privacy Issues Of Big Datamentioning
confidence: 99%
See 1 more Smart Citation
“…The notion of distributed databases is a way to solving this problem where several parties have vertical or horizontal data divisions. Cluster analysis is a regularly utilized data mining task aimed at degrading or splitting a normally multivariate group of data, to make the data items in one group more similar [35,15,17] dedicated to overcoming the challenge of data security for data mining systems distributed.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The distributed systems denote that distributed processing units are interconnected and organized via networks to subtend the need for large-scale or greatperformance computing, which has received significant attention in recent decades [1112]. peer-to-peer (P2P) systems, grids [13], ad-hoc networks [14], cloud computing systems [15], and social network systems have all received a lot of attention. Nowadays, distributed systems are used for a variety of purposes, including online services, file storage, and scientific computation [16].…”
Section: Introductionmentioning
confidence: 99%