Asian Journal of Information Technology

Year: 2016
Volume: 15
Issue: 10
Page No. 1531 - 1538

Privacy Preserving K-Anonymization Clustering Approach for Reducing Information Loss

Authors : G. Chitra Ganabathi and P.Uma Maheswari

References

Bhaduri, K., M.D. Stefanski and A.N. Srivastava, 2011. Privacy-preserving outlier detection through random nonlinear data distortion. Syst. Man Cybern. Part B Cybern. IEEE. Trans., 41: 260-272.
CrossRef  |  PubMed  |  Direct Link  |  

Blanton, M., 2011. Achieving full security in privacy-preserving data mining. Proceedings of the 2011 IEEE Third Inernational Conference on Social Computing, Privacy, Security, Risk and Trust (PASSAT), October 9-11, 2011, IEEE, Boston, Massachusetts, USA., ISBN: 978-1-4577-1931-8, pp: 925-934.

Dung, L.T., H.T. Bao, N.T. Binh and T.H. Hoang, 2010. Privacy preserving classification in two-dimension distributed data. Proceedings of the 2010 Second International Conference on Knowledge and Systems Engineering (KSE), October 7-9, 2010, IEEE, Hanoi, Vietnam, ISBN: 978-1-4244-8334-1, pp: 96-103.

Dunning, L.A. and R. Kresman, 2013. Privacy preserving data sharing with anonymous ID assignment. Inf. Forensics Secur. IEEE. Trans., 8: 402-413.
CrossRef  |  Direct Link  |  

Kargupta, H., S. Datta, Q. Wang and K. Sivakumar, 2005. Random-data perturbation techniques and privacy-preserving data mining. Knowl. Inf. Syst., 7: 387-414.
CrossRef  |  Direct Link  |  

Lakshmi, N.M. and H.R. KS, 2012. Privacy preserving association rule mining in horizontally partitioned databases using cryptography techniques. Int. J. Comput. Sci. Inf. Technol., 3: 3176-3182.
Direct Link  |  

Li, T., N. Li, J. Zhang and I. Molloy, 2012. Slicing: A new approach for privacy preserving data publishing. Knowl. Data Eng. IEEE. Trans., 24: 561-574.
CrossRef  |  Direct Link  |  

Li, Y., M. Chen, Q. Li and W. Zhang, 2012. Enabling multilevel trust in privacy preserving data mining. Knowl. Data Eng. IEEE. Trans., 24: 1598-1612.
CrossRef  |  Direct Link  |  

Malik, M.B., M.A. Ghazi and R. Ali, 2012. Privacy preserving data mining techniques: current scenario and future prospects. Proceedings of the 2012 Third International Conference on Computer and Communication Technology (ICCCT), November 23-25, 2012, IEEE, Allahabad, India, ISBN: 978-1-4673-3149-4, pp: 26-32.

Mandapati, S., R.B. Bhogapathi and R.B. Chekka, 2013. A hybrid algorithm for privacy preserving in data mining. Int. J. Intell. Syst. Appl., 5: 47-53.
CrossRef  |  Direct Link  |  

Peng, B., X. Geng and J. Zhang, 2010. Combined data distortion strategies for privacy-preserving data mining. Proceedings of the 2010 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE), August 20-22, 2010, IEEE, Chengdu, China, ISBN: 978-1-4244-6539-2, pp: 572-576.

Vassilios, S.V., B. Elisa, N.F. Igor, P.P. Loredana, S. Yucel and T. Yannis, 2004. State-of-the-art in privacy preserving data mining. SIGMOD Record, 33: 50-57.
Direct Link  |  

Vijayarani, S., A. Tamilarasi and R. SeethaLakshmi, 2010. Privacy preserving data mining based on association rule-a survey. Proceedings of the 2010 International Conference on Communication and Computational Intelligence (INCOCCI), December 27-29, 2010, IEEE, Erode, India, ISBN: 978-81-8371-369-6, pp: 99-103.

Wang, J., Y. Luo, Y. Zhao and J. Le, 2009. A survey on privacy preserving data mining. Proceedings of the 2009 First International Workshop on Database Technology and Applications, April 25-26, 2009, IEEE, Wuhan, China, ISBN: 978-0-7695-3604-0, pp: 111-114.

Wang, S., L. Cui, J. Que, D.H. Choi and X. Jiang et al., 2012. A randomized response model for privacy preserving smart metering. Smart Grid IEEE. Trans., 3: 1317-1324.
CrossRef  |  PubMed  |  Direct Link  |  

Wang, W., B. Deng and Z. Li, 2007. Application of oblivious transfer protocol in distributed data mining with privacy-preserving. Proceedings of the First International Symposium on Data, Privacy and E-Commerce ISDPE, November 1-3, 2007, IEEE, Chengdu, China, ISBN: 978-0-7695-3016-1, pp: 283-285.

Wu, C.W., 2005. Privacy preserving data mining with unidirectional interaction. Proceedings of the IEEE International Symposium on Circuits and Systems ISCAS, May 23-26, 2005, IEEE, Yorktown Heights, New York, USA., ISBN: 0-7803-8834-8, pp: 5521-5524.

Yang, P., X. Gui, F. Tian, J. Yao and J. Lin, 2013. A privacy-preserving data obfuscation scheme used in data statistics and data mining. Proceedings of the 2013 IEEE 10th International Conference on High Performance Computing and Communications, Embedded and Ubiquitous Computing (HPCC_EUC), November13-15, 2013, IEEE, Zhangjiajie, China, pp: 881-887.

Yun, L., L.X. Cheng and Z. Feng, 2010. Application of data mining in intrusion detection. Proceedings of the 2010 International Conference on Computer Application and System Modeling (ICCASM), October 22-24, 2010, IEEE, Taiyuan, China, ISBN: 978-1-4244-7235-2, pp: 153-155.

Zhang, X. and H. Bi, 2010. Research on privacy preserving classification data mining based on random perturbation. Proceedings of the 2010 International Conference on Information Networking and Automation (ICINA), October 18-19, 2010, IEEE, Kunming, China, ISBN: 978-1-4244-8104-0, pp: 173-178.

Zhang, X., C. Liu, S. Nepal and J. Chen, 2013. An efficient quasi-identifier index based approach for privacy preservation over incremental data sets on cloud. J. Comput. Syst. Sci., 79: 542-555.
CrossRef  |  Direct Link  |  

Zhu, Y., L. Huang, W. Yang, D. Li, Y. Luo and F. Dong, 2009. Three new approaches to privacy-preserving add to multiply protocol and its application. Proceedings of the Second International Workshop on Knowledge Discovery and Data Mining WKDD, January 23-25, 2009, IEEE, Moscow, Russia, ISBN: 978-0-7695-3543-2, pp: 554-558.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved