On Secure Cloud Computing for Genomic Data: From Storage to Analysis

Z Huang - 2018 - infoscience.epfl.ch
Although privacy is generally considered to be the right of an individual or group to control
information about themselves, such a right has become challenging to protect in the digital …

Policy Driven Data Sharing with Provable Privacy Guarantees

X He - 2018 - search.proquest.com
Companies such as Google or Facebook collect a substantial amount of data about their
users to provide useful services. The release of these datasets for general use can enable …

Design of a Secure Computation Protocols for Distributed Association Rule Mining on Partitioned Data

S Shivaprasad, P Challa, AR Reddy… - … of Engineering and …, 2017 - indianjournals.com
In several applications, data mining play vital role in a distributed database scheme. In this
scenario misuse of data may exist. But sometimes, data owners may be related to such …

Future directions and conclusion

T Zhu, G Li, W Zhou, PS Yu, T Zhu, G Li, W Zhou… - Differential Privacy and …, 2017 - Springer
While previous chapters provide a thorough description on differential privacy and presents
several applications in reality, many interesting and promising issues remain unexplored …

Privacy-Preserving Trajectory Data Publishing via Differential Privacy

I Dwivedi - 2017 - scholarworks.boisestate.edu
Over the past decade, the collection of data by individuals, businesses and government
agencies has increased tremendously. Due to the widespread of mobile computing and the …

[PDF][PDF] SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT

MP Anitha, A Sathyapriya, T Balasubramaniam - academia.edu
Security and privacy methods are used to protect the data values. Private data values are
secured with confidentiality and integrity methods. Privacy model hides the individual …

[PDF][PDF] A Survey and Taxonomy of Distributed Data Mining Research Studies: A Systematic

FA Rafrastara, Q Deyu - International Journal of Computer Science …, 2016 - academia.edu
Context: Data Mining (DM) method has been evolving year by year and as of today there is
also the enhancement of DM technique that can be run several times faster than the …

[PDF][PDF] Efficient and Private Approximations of Distributed Databases Calculations

PDSDE Gudes, JD Ullman - arXiv preprint arXiv:1605.06143, 2016 - academia.edu
In recent years, an increasing amount of data is collected in different and often, not
cooperative, databases. The problem of privacy-preserving, distributed calculations over …

[PDF][PDF] Survey of secure two parties confidential information release in vertical partitioned data

MN Rajkumar, A Vijayalakshmi… - World Scientific News, 2016 - bibliotekanauki.pl
To securely give person-exact fragile data from two data providers, whereby the mutual data
maintains the necessary information for behind data mining tasks. Secured information …

[PDF][PDF] INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY

G Sumathi, M Indumathi - Citeseer
Data mining is the process of extracting hidden predictive information from large databases
to support decision making process. There may be a chance of revealing sensitive …