A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Classification of Privacy-preserving Distributed Data Mining protocols
2011
2011 Sixth International Conference on Digital Information Management
We studied and revealed an elaborate taxonomy for classifying privacy-preserving distributed data mining algorithms. ...
Such a classification scheme is built on several dimensions, including secure communication model, data distribution model, data mining algorithms and privacy-preservation techniques. ...
Low
N/A
N/A
High
Association Rule
Low
N/A
N/A
High
Clustering
High
N/A
N/A
Low
Privacy Preserving
Technique:
Homomorphic
encryption
Low
Medium
N/A
High
Oblivious transfer High ...
doi:10.1109/icdim.2011.6093356
dblp:conf/icdim/XuY11
fatcat:3i7gvn3s5fcrxhzftb2i32y7ni
Secure Two Party Privacy Preserving Classification Using Encryption
2016
International Journal of Information and Electronics Engineering
We propose a privacy preserving two-party Naive Bayes classifier for horizontally partitioned distributed data. ...
While training, as the parties that collaborate are concerned about the privacy of their data, the concept of privacy preservation should be extended in data mining classifiers. ...
Other form of privacy includes changing the results of data mining applications to preserve privacy. An example of this approach is association rule hiding methods [4] . ...
doi:10.18178/ijiee.2016.6.2.597
fatcat:yjbh7y4x3zfjzcyyie2pmz2f2e
Implementation of Client Controlled Privacy Preserving Data Model for Mining Decision Rules using Decision Tree and Association Rules
2019
VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE
In this paper, a PPDM technique for generating the privacy-preserving decision rules is proposed and implemented. ...
The privacy-preserving data mining (PPDM) is one of the techniques which are used for mining data dynamically with preserving privacy of the end data owner. ...
keeping up the privacy of destinations during information mining in cloud-based homomorphic encryption. ...
doi:10.35940/ijitee.a4614.119119
fatcat:wphufqeyxvfthpyeqtfxxzjvn4
A Secure Encryption-Based Malware Detection System
2018
KSII Transactions on Internet and Information Systems
encryption technique are used to construct a privacy-preserving Naive Bayes classifier (PP-NBC). ...
.: A Secure Encryption-Based Malware Detection System ...
As such, the information gain associated with , , is defined as
Paillier Homomorphic Encryption In order to construct a PP-NBC, we use the well-known Paillier homomorphic encryption [30] , which is ...
doi:10.3837/tiis.2018.04.022
fatcat:3fjs5bz6wfavzhgu2pnww6hnsy
Big data privacy: a technological perspective and review
2016
Journal of Big Data
On the premise of this definition, the properties of big Abstract Big data is a term used for very large data sets that have more varied and complex structure. ...
day by day. ...
Hiding a needle in a haystack [46] is one such example in which privacy preserving is used by association rule mining. ...
doi:10.1186/s40537-016-0059-y
fatcat:hol5lhemzvawzc6yyxe4paa7zu
Privacy-Preserving Machine Learning: Methods, Challenges and Directions
[article]
2021
arXiv
pre-print
various PPML solutions by decomposing their privacy-preserving functionalities. ...
Hence, well-designed privacy-preserving ML (PPML) solutions are critically needed for many emerging applications. ...
Full Privacy-Preserving Pipeline The notion of a full privacy-preserving pipeline is rarely mentioned in PPML proposals. ...
arXiv:2108.04417v2
fatcat:pmxmsbs2gvh6nd4jadcz4dnsrq
Ensuring Confidentiality in Process Mining
2018
International Symposium on Data-Driven Process Discovery and Analysis
We provide a sample solution for process discovery and evaluate it by applying a case study on a real-life event log. ...
Surprisingly, little research has been done toward security methods and encryption techniques for process mining. ...
In computer science, privacy-preserving algorithms and methods in differential privacy have the closest similarity to confidentiality in process mining. ...
dblp:conf/simpda/RafieiWA18
fatcat:yozmb3srqnhnzohtr5orpvaa4a
APHID: An architecture for private, high-performance integrated data mining
2010
Future generations computer systems
The privacy-preserving PNN is the first such PNN in the literature, and provides not only a practical algorithm ready for use in privacy-preserving applications, but also a template for other data intensive ...
This dissertation discusses the development of an architecture and associated techniques to support Privacy Preserving and Distributed Data Mining. ...
Acknowledgments This work was supported in part by a National Science Foundation Graduate Research Fellowship as well as National Science Foundation grants: 0341601, 0647018, 0717674, 0717680, 0647120, ...
doi:10.1016/j.future.2010.02.017
fatcat:mgt2hbemorb5nhxsbas3ftt4yi
Precision Health Data: Requirements, Challenges and Existing Techniques for Data Security and Privacy
[article]
2020
arXiv
pre-print
Secondly, this paper investigates secure and privacy-preserving machine learning methods suitable for the computation of precision health data along with their usage in relevant health projects. ...
Finally, it illustrates the best available techniques for precision health data security and privacy with a conceptual system model that enables compliance, ethics clearance, consent management, medical ...
In another work, a privacy-preserving international collaboration framework for analyzing rare disease genetic data is introduced [107] . ...
arXiv:2008.10733v1
fatcat:oj2neoftf5hcbpatnfn7ntyhzy
PPCD: Privacy-preserving clinical decision with cloud support
2019
PLoS ONE
In this paper, based on single-layer perceptron, we propose a scheme of privacy-preserving clinical decision with cloud support (PPCD), which securely conducts disease model training and prediction for ...
With the prosperity of machine learning and cloud computing, meaningful information can be mined from mass electronic medical data which help physicians make proper disease diagnosis for patients. ...
Acknowledgments The authors would like to thank the Editor and the anonymous reviewers for their constructive comments that greatly improved the quality of this manuscript. ...
doi:10.1371/journal.pone.0217349
pmid:31141561
pmcid:PMC6541381
fatcat:zhz6a7uwvfg6rj5qgc6aewaocq
Federated Learning Approach to Protect Healthcare Data over Big Data Scenario
2022
Sustainability
Finally, acceptable ideas are put forward from the management level as a result of the general privacy protection concerns that exist throughout the life cycle of medical big data throughout the industry ...
To ensure the confidentiality and integrity of the information stored, encryption and auditing procedures are frequently used. ...
Acknowledgments: This work was financially supported by the Malaysian Ministry of Higher Education through an FRGS grant: FRGS/1/2020/TK0/UM/02/33. ...
doi:10.3390/su14052500
doaj:4fb6a1d0daa04f3d9af6c283794b038e
fatcat:osoiyq4hongfzkllidk26jcg7y
Privacy Preserving Unsupervised Clustering over Vertically Partitioned Data
[chapter]
2006
Lecture Notes in Computer Science
This paper proposes a clustering algorithmic scheme that ensures privacy and confidentiality of the data without compromising the effectiveness of the clustering algorithm nor imposing high communication ...
This task is hindered by the security concerns that arise, due to the confidentiality of the data records, and the reluctance of the organizations to disclose their data. ...
Clustering can conform with privacy preserving requirements by satisfying two conditions. ...
doi:10.1007/11751649_70
fatcat:p6l2y4hdpjdnlere5ngnrflsme
PPDC: A Privacy-Preserving Distinct Counting Scheme for Mobile Sensing
2019
Applied Sciences
In this paper, we propose a Privacy-Preserving Distinct Counting scheme (PPDC) for mobile sensing. ...
Besides, the privacy protection of users is also a critical issue for aggregation security. ...
XOR Homomorphic Encryption We choose the bitwise XOR homomorphic encryption as the encryption algorithm in this paper, of which the main idea is very similar to that of an additively homomorphic encryption ...
doi:10.3390/app9183695
fatcat:wfe4mwcnpjdspjdqqqbdpwmjjq
Secure Construction of Contingency Tables from Distributed Data
[chapter]
2008
Lecture Notes in Computer Science
Contingency tables are widely used in many fields to analyze the relationship or infer the association between two or more variables. ...
Typically, the construction of contingency tables from source data is considered straightforward since all data is supposed to be aggregated at a single party. ...
In this regard, privacy-preserving data mining is a very closely related area, and the work in this area is quite relevant. ...
doi:10.1007/978-3-540-70567-3_11
fatcat:fudfcaxupfeuveh4i2mybkag5a
Privacy Preservation in Artificial Intelligence and Extended Reality (AI-XR) Metaverses: A Survey
[article]
2023
arXiv
pre-print
Moreover, we thoroughly analyze technical solutions such as differential privacy, Homomorphic Encryption (HE), and Federated Learning (FL) and discuss related sociotechnical issues regarding privacy. ...
In this paper, we explore various privacy challenges that future metaverses are expected to face, given their reliance on AI for tracking users, creating XR and MR experiences, and facilitating interactions ...
Fig. 7 : 7 Fig. 7: Metaverse with and without privacy-preserving using Homomorphic Encryption (HE)
Fig. 8 : 8 Fig. 8: Fully Homomorphic Encryption. ...
arXiv:2310.10665v1
fatcat:bivdsg6w6racnaxuirqx5jua4q
« Previous
Showing results 1 — 15 out of 354 results