Asian Journal of Information Technology

Year: 2016
Volume: 15
Issue: 19
Page No. 3708 - 3711

Model Framework for Sensitive Data Preservation Using Fuzzy

Authors : S. Dhanalakshmi, J. Abdul Samath and M.S. Irfan Ahmed

References

Agrawal, D. and C.C. Aggarwal, 2001. On the design and quantification of privacy preserving data mining algorithms. Proceedings of the 20th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, May 21-24, 2001, ACM, Santa Barbara, California, ISBN: 1-58113-361-8, pp: 247-255.

Bai, Y. and D. Wang, 2006. Fundamentals of Fuzzy Logic Control-Fuzzy Sets Fuzzy Rules and Defuzzifications. In: Advanced Fuzzy Logic Technologies in Industrial Applications. Ying, B., Z. Hanqi and D. Wang (Eds.). Springer, London, England, ISBN: 978-1-84628-468-7, pp: 17-36.

Cano, I., S. Ladra and V. Torra, 2010. Evaluation of information loss for privacy preserving data mining through comparison of fuzzy partitions. Proceedings of the 2010 IEEE International Conference on Fuzzy Systems (FUZZ), July 18-23, 2010, IEEE, Barcelona, Spain, ISBN: 978-1-4244-6919-2, pp: 1-8.

Du, W. and Z. Zhan, 2003. Using randomized response techniques for privacy-preserving data mining. Proceedings of the 9th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, August 24-27, 2003, Washington, DC, USA, pp: 505-510.

Kumar, P., K.I. Varma and A. Sureka, 2011. Fuzzy based clustering algorithm for privacy preserving data mining. Int. J. Bus. Inf. Syst., 7: 27-40.
Direct Link  |  

Li, G. and Y. Wang, 2012. A privacy-preserving classification method based on singular value decomposition. Int. Arab J. Inf. Technol., 9: 529-534.
Direct Link  |  

Li, N., T. Li and S. Venkatasubramanian, 2007. T-closeness: Privacy beyond k-anonymity and l-diversity. Proceedings of the IEEE 23rd International Conference on Data Engineering ICDE 2007, April 15-20, 2007, IEEE, Istanbul, Turkey, ISBN: 1-4244-0802-4, pp: 106-115.

Lindell, Y. and B. Pinkas, 2000. Privacy Preserving Data Mining. In: Advances in Cryptology-CRYPTO 2000. Mihir, B. (Ed.). Springer Berlin Heidelberg, Berlin, Germany, ISBN: 978-3-540-67907-3, pp: 36-54.

Lindell, Y. and B. Pinkas, 2009. Secure multiparty computation for privacy-preserving data mining. J. Privacy Confidentiality, 1: 59-98.

Liu, L., M. Kantarcioglu and B. Thuraisingham, 2008. The applicability of the perturbation based privacy preserving data mining for real-world data. Data Knowl. Eng., 65: 5-21.
CrossRef  |  

Sweeney, L., 2002. k-Anonymity: A model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl. Based Syst., 10: 557-570.
CrossRef  |  

Wang, K., B.C. Fung and G. Dong, 2005. Integrating Private Databases for Data Analysis In: Intelligence and Security Informatics. Paul, K., M. Gheorghe, F. Roberts, D.Z. Daniel and F.Y. Wang et al. (Eds.). Springer Berlin Heidelberg, Berlin, Germany, ISBN: 978-3-540-25999-2, pp: 171-182.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved