2015
DOI: 10.1016/j.compeleceng.2015.01.016
|View full text |Cite
|
Sign up to set email alerts
|

An approach for prevention of privacy breach and information leakage in sensitive data mining

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
18
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
6
4

Relationship

0
10

Authors

Journals

citations
Cited by 39 publications
(18 citation statements)
references
References 21 publications
0
18
0
Order By: Relevance
“…As discussed earlier, several third-party CC services provide data support, computing Privacy in data mining during distribution implies the protection of personal information or sensitive data [36].…”
Section: Motivation Modelmentioning
confidence: 99%
“…As discussed earlier, several third-party CC services provide data support, computing Privacy in data mining during distribution implies the protection of personal information or sensitive data [36].…”
Section: Motivation Modelmentioning
confidence: 99%
“…The four main streams of Data Breaches are Ransomware, Malware, Phishing and Denial-of-Service (DoS). Even data breaches are occurring prior to 2005, many biggest data breaches reported in history in 2005 or beyond it [4]. As every data are being recorded in cloud the volume of Data across the world are keep on increasing day after day which gives cyber criminals bigger opportunity to expose a big volume of data in a single data breaches attempt.…”
Section: Introductionmentioning
confidence: 99%
“…The experimental analysis is presented at the end; it shows this approach performs better over the distinct l-diversity measure, probabilistic l-diversity measure and k-anonymity with t-closeness measure [4]. The [5] proposes a singular, extra flexible generalization scheme.…”
Section: Literature Reviewmentioning
confidence: 99%