Research Journal of Applied Sciences

Year: 2016
Volume: 11
Issue: 2
Page No. 27 - 34

A Technique of Data Privacy Preservation in Deploying Third Party Mining Tools over the Cloud Using SVD and LSA

Authors : Yousra Abdul Alsahib S. Aldeen, Mazleena Salleh and Mohammad Abdur Razzaque

References

Asuncion, A. and D.J. Newman, 2007. UCI machine learning repository. University of California, Department of Information and Computer Science, Irvine, CA., USA. http://www.ics.uci.edu/~mlearn/MLRepository.html.

Balouchestani, M., L. Sugavaneswaran and S. Krishnan, 2014. Advanced K-means clustering algorithm for large ECG data sets based on K-SVD approach. Proceedings of the 9th International Symposium on Communication Systems, Networks and Digital Signal Processing, July 23-25, 2014, Manchester, pp: 177-182.

Cacheda, F., V. Carneiro, D. Fernandez and V. Formoso, 2011. Comparison of collaborative filtering algorithms: Limitations of current techniques and proposals for scalable, high-performance recommender systems. ACM Trans. Web, 5: 2-33.
CrossRef  |  Direct Link  |  

Elsalamony, H.A., 2014. Bank direct marketing analysis of data mining techniques. Int. J. Comput. Applic., 85: 12-22.

Fung, B.C.M., K. Wang, R. Chen and P.S. Yu, 2010. Privacy-preserving data publishing: A survey of recent developments. ACM Comput. Surv., Vol. 42. 10.1145/1749603.1749605

Han, J.W., M. Kamber and J. Pei, 2012. Data Mining Concepts and Techniques. 3rd Edn., China Machine Press, Beijing, China, pp: 327-390.

He, X., H.H. Chen, Y. Chen, Y. Dong, P. Wang and Z. Huang, 2012. Clustering-Based k -Anonymity. In: Advances in Knowledge Discovery and Data Mining, Tan, P.N., S. Chawla, C.K. Ho and J. Bailey (Eds.). Springer, Heidelberg, Germany, ISBN-13: 978-3-642-30217-6, pp: 405-417.

Jain, P., N. Pathak, P. Tapashetti and A.S. Umesh, 2013. Privacy preserving processing of data decision tree based on sample selection and singular value decomposition. Proceedings of the 9th International Conference on Information Assurance and Security, December 4-6, 2013, Gammarth, pp: 91-95.

Jain, P., P. Tapashetti, A.S. Umesh and S. Sharma, 2013. Privacy preserving processing of high dimensional data classification based on sample selection and singular value decomposition. Proceedings of the International Conference on Control, Automation, Robotics and Embedded Systems, December 16-18, 2013, Jabalpur, pp: 1-5.

Landauer, T.K., P.W. Foltz and D. Laham, 1998. An introduction to latent semantic analysis. Discourse Process., 25: 259-284.
CrossRef  |  

Loukides, G. and A. Gkoulalas-Divanis, 2012. Utility-preserving transaction data anonymization with low information loss. Expert Syst. Applic., 39: 9764-9777.
CrossRef  |  Direct Link  |  

Monreale, A. and D. Pedreschi, R.G. Pensa and F. Pinelli, 2014. Anonymity preserving sequential pattern mining. Artif. Intell. Law, 22: 141-173.
CrossRef  |  Direct Link  |  

Moro, S., P. Cortez and R. Laureano, 2011. Using data mining for bank direct marketing: An application of the CRISP-DM methodology. Proceedings of the European Simulation and Modelling Conference, October 24-26, 2011, Guimaraes, Portugal -.

Pan, Y. and T. Chen, 2012. Research on privacy preserving on K-anonymity. J. Software, 7: 1649-1656.

Soodejani, A.T., M.A. Hadavi and R. Jalili, 2012. K-Anonymity-Based Horizontal Fragmentation to Preserve Privacy in Data Outsourcing. In: Data and Applications Security and Privacy XXVI: 26th Annual IFIP WG 11.3 Conference, DBSec 2012, Paris, France, July 11-13, 2012. Proceedings, Cuppens-Boulahia, N., F. Cuppens and J. Garcia-Alfaro (Eds.). Springer, Heidelberg, Germany, ISBN-13: 978-3-642-31540-4, pp: 263-273.

Sweeney, L., 2002. k-Anonymity: A model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl. Based Syst., 10: 557-570.
CrossRef  |  

Weiss, G.M., 2009. Data Mining in the Real World: Experiences, Challenges and Recommendations. CSREA Press, Nevada, USA., pp: 124-130.

Wu, X., 2004. Data mining: Artificial intelligence in data analysis. Proceedings of the IEEE/WIC/ACM International Conference on Intelligent Agent Technology, September 20-24, 2004, Beijing, China -.

Xu, Y., T. Ma, M. Tang and W. Tian, 2014. A survey of privacy preserving data publishing using generalization and suppression. Applied Math. Inform. Sci., 8: 1103-1116.
Direct Link  |  

Yang, Y. and M. Ma, 2013. Proceedings of the 2nd International Conference on Green Communications and Networks 2012 (GCN 2012): Volume 3. Springer Science and Business Media, New York, USA., ISBN-13: 9783642354700, pp: 79-84.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved