Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








354 Hits in 6.1 sec

Classification of Privacy-preserving Distributed Data Mining protocols

Zhuojia Xu, Xun Yi
2011 2011 Sixth International Conference on Digital Information Management  
We studied and revealed an elaborate taxonomy for classifying privacy-preserving distributed data mining algorithms.  ...  Such a classification scheme is built on several dimensions, including secure communication model, data distribution model, data mining algorithms and privacy-preservation techniques.  ...  Low N/A N/A High Association Rule Low N/A N/A High Clustering High N/A N/A Low Privacy Preserving Technique: Homomorphic encryption Low Medium N/A High Oblivious transfer High  ... 
doi:10.1109/icdim.2011.6093356 dblp:conf/icdim/XuY11 fatcat:3i7gvn3s5fcrxhzftb2i32y7ni

Secure Two Party Privacy Preserving Classification Using Encryption

K. S. Hareesha, M. Sumana
2016 International Journal of Information and Electronics Engineering  
We propose a privacy preserving two-party Naive Bayes classifier for horizontally partitioned distributed data.  ...  While training, as the parties that collaborate are concerned about the privacy of their data, the concept of privacy preservation should be extended in data mining classifiers.  ...  Other form of privacy includes changing the results of data mining applications to preserve privacy. An example of this approach is association rule hiding methods [4] .  ... 
doi:10.18178/ijiee.2016.6.2.597 fatcat:yjbh7y4x3zfjzcyyie2pmz2f2e

Implementation of Client Controlled Privacy Preserving Data Model for Mining Decision Rules using Decision Tree and Association Rules

2019 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
In this paper, a PPDM technique for generating the privacy-preserving decision rules is proposed and implemented.  ...  The privacy-preserving data mining (PPDM) is one of the techniques which are used for mining data dynamically with preserving privacy of the end data owner.  ...  keeping up the privacy of destinations during information mining in cloud-based homomorphic encryption.  ... 
doi:10.35940/ijitee.a4614.119119 fatcat:wphufqeyxvfthpyeqtfxxzjvn4

A Secure Encryption-Based Malware Detection System

2018 KSII Transactions on Internet and Information Systems  
encryption technique are used to construct a privacy-preserving Naive Bayes classifier (PP-NBC).  ...  .: A Secure Encryption-Based Malware Detection System  ...  As such, the information gain associated with , , is defined as Paillier Homomorphic Encryption In order to construct a PP-NBC, we use the well-known Paillier homomorphic encryption [30] , which is  ... 
doi:10.3837/tiis.2018.04.022 fatcat:3fjs5bz6wfavzhgu2pnww6hnsy

Big data privacy: a technological perspective and review

Priyank Jain, Manasi Gyanchandani, Nilay Khare
2016 Journal of Big Data  
On the premise of this definition, the properties of big Abstract Big data is a term used for very large data sets that have more varied and complex structure.  ...  day by day.  ...  Hiding a needle in a haystack [46] is one such example in which privacy preserving is used by association rule mining.  ... 
doi:10.1186/s40537-016-0059-y fatcat:hol5lhemzvawzc6yyxe4paa7zu

Privacy-Preserving Machine Learning: Methods, Challenges and Directions [article]

Runhua Xu, Nathalie Baracaldo, James Joshi
2021 arXiv   pre-print
various PPML solutions by decomposing their privacy-preserving functionalities.  ...  Hence, well-designed privacy-preserving ML (PPML) solutions are critically needed for many emerging applications.  ...  Full Privacy-Preserving Pipeline The notion of a full privacy-preserving pipeline is rarely mentioned in PPML proposals.  ... 
arXiv:2108.04417v2 fatcat:pmxmsbs2gvh6nd4jadcz4dnsrq

Ensuring Confidentiality in Process Mining

Majid Rafiei, Leopold von Waldthausen, Wil M. P. van der Aalst
2018 International Symposium on Data-Driven Process Discovery and Analysis  
We provide a sample solution for process discovery and evaluate it by applying a case study on a real-life event log.  ...  Surprisingly, little research has been done toward security methods and encryption techniques for process mining.  ...  In computer science, privacy-preserving algorithms and methods in differential privacy have the closest similarity to confidentiality in process mining.  ... 
dblp:conf/simpda/RafieiWA18 fatcat:yozmb3srqnhnzohtr5orpvaa4a

APHID: An architecture for private, high-performance integrated data mining

Jimmy Secretan, Michael Georgiopoulos, Anna Koufakou, Kel Cardona
2010 Future generations computer systems  
The privacy-preserving PNN is the first such PNN in the literature, and provides not only a practical algorithm ready for use in privacy-preserving applications, but also a template for other data intensive  ...  This dissertation discusses the development of an architecture and associated techniques to support Privacy Preserving and Distributed Data Mining.  ...  Acknowledgments This work was supported in part by a National Science Foundation Graduate Research Fellowship as well as National Science Foundation grants: 0341601, 0647018, 0717674, 0717680, 0647120,  ... 
doi:10.1016/j.future.2010.02.017 fatcat:mgt2hbemorb5nhxsbas3ftt4yi

Precision Health Data: Requirements, Challenges and Existing Techniques for Data Security and Privacy [article]

Chandra Thapa, Seyit Camtepe
2020 arXiv   pre-print
Secondly, this paper investigates secure and privacy-preserving machine learning methods suitable for the computation of precision health data along with their usage in relevant health projects.  ...  Finally, it illustrates the best available techniques for precision health data security and privacy with a conceptual system model that enables compliance, ethics clearance, consent management, medical  ...  In another work, a privacy-preserving international collaboration framework for analyzing rare disease genetic data is introduced [107] .  ... 
arXiv:2008.10733v1 fatcat:oj2neoftf5hcbpatnfn7ntyhzy

PPCD: Privacy-preserving clinical decision with cloud support

Hui Ma, Xuyang Guo, Yuan Ping, Baocang Wang, Yuehua Yang, Zhili Zhang, Jingxian Zhou, Lixiang Li
2019 PLoS ONE  
In this paper, based on single-layer perceptron, we propose a scheme of privacy-preserving clinical decision with cloud support (PPCD), which securely conducts disease model training and prediction for  ...  With the prosperity of machine learning and cloud computing, meaningful information can be mined from mass electronic medical data which help physicians make proper disease diagnosis for patients.  ...  Acknowledgments The authors would like to thank the Editor and the anonymous reviewers for their constructive comments that greatly improved the quality of this manuscript.  ... 
doi:10.1371/journal.pone.0217349 pmid:31141561 pmcid:PMC6541381 fatcat:zhz6a7uwvfg6rj5qgc6aewaocq

Federated Learning Approach to Protect Healthcare Data over Big Data Scenario

Gaurav Dhiman, Sapna Juneja, Hamidreza Mohafez, Ibrahim El-Bayoumy, Lokesh Kumar Sharma, Maryam Hadizadeh, Mohammad Aminul Islam, Wattana Viriyasitavat, Mayeen Uddin Khandaker
2022 Sustainability  
Finally, acceptable ideas are put forward from the management level as a result of the general privacy protection concerns that exist throughout the life cycle of medical big data throughout the industry  ...  To ensure the confidentiality and integrity of the information stored, encryption and auditing procedures are frequently used.  ...  Acknowledgments: This work was financially supported by the Malaysian Ministry of Higher Education through an FRGS grant: FRGS/1/2020/TK0/UM/02/33.  ... 
doi:10.3390/su14052500 doaj:4fb6a1d0daa04f3d9af6c283794b038e fatcat:osoiyq4hongfzkllidk26jcg7y

Privacy Preserving Unsupervised Clustering over Vertically Partitioned Data [chapter]

D. K. Tasoulis, E. C. Laskari, G. C. Meletiou, M. N. Vrahatis
2006 Lecture Notes in Computer Science  
This paper proposes a clustering algorithmic scheme that ensures privacy and confidentiality of the data without compromising the effectiveness of the clustering algorithm nor imposing high communication  ...  This task is hindered by the security concerns that arise, due to the confidentiality of the data records, and the reluctance of the organizations to disclose their data.  ...  Clustering can conform with privacy preserving requirements by satisfying two conditions.  ... 
doi:10.1007/11751649_70 fatcat:p6l2y4hdpjdnlere5ngnrflsme

PPDC: A Privacy-Preserving Distinct Counting Scheme for Mobile Sensing

Xiaochen Yang, Ming Xu, Shaojing Fu, Yuchuan Luo
2019 Applied Sciences  
In this paper, we propose a Privacy-Preserving Distinct Counting scheme (PPDC) for mobile sensing.  ...  Besides, the privacy protection of users is also a critical issue for aggregation security.  ...  XOR Homomorphic Encryption We choose the bitwise XOR homomorphic encryption as the encryption algorithm in this paper, of which the main idea is very similar to that of an additively homomorphic encryption  ... 
doi:10.3390/app9183695 fatcat:wfe4mwcnpjdspjdqqqbdpwmjjq

Secure Construction of Contingency Tables from Distributed Data [chapter]

Haibing Lu, Xiaoyun He, Jaideep Vaidya, Nabil Adam
2008 Lecture Notes in Computer Science  
Contingency tables are widely used in many fields to analyze the relationship or infer the association between two or more variables.  ...  Typically, the construction of contingency tables from source data is considered straightforward since all data is supposed to be aggregated at a single party.  ...  In this regard, privacy-preserving data mining is a very closely related area, and the work in this area is quite relevant.  ... 
doi:10.1007/978-3-540-70567-3_11 fatcat:fudfcaxupfeuveh4i2mybkag5a

Privacy Preservation in Artificial Intelligence and Extended Reality (AI-XR) Metaverses: A Survey [article]

Mahdi Alkaeed, Adnan Qayyum, Junaid Qadir
2023 arXiv   pre-print
Moreover, we thoroughly analyze technical solutions such as differential privacy, Homomorphic Encryption (HE), and Federated Learning (FL) and discuss related sociotechnical issues regarding privacy.  ...  In this paper, we explore various privacy challenges that future metaverses are expected to face, given their reliance on AI for tracking users, creating XR and MR experiences, and facilitating interactions  ...  Fig. 7 : 7 Fig. 7: Metaverse with and without privacy-preserving using Homomorphic Encryption (HE) Fig. 8 : 8 Fig. 8: Fully Homomorphic Encryption.  ... 
arXiv:2310.10665v1 fatcat:bivdsg6w6racnaxuirqx5jua4q
« Previous Showing results 1 — 15 out of 354 results