Chapter 16 Mining Encrypted Data

نویسنده

  • G. C. Meletiou
چکیده

Business and scientific organizations, nowadays, own databases containing confidential information that needs to be analyzed, through data mining techniques, in order to support their planning activities. The need for privacy is imposed due to, either legal restrictions (for medical and socio-economic databases), or the unwillingness of business organizations to share their data which are considered as a valuable asset. Despite the diffusion of data mining techniques, the key problem of confidentiality has not been considered until very recently. In this chapter we address the issue of mining encrypted data, in order to both protect confidential information and to allow knowledge discovery. More specifically, we consider a scenario where a company having private databases negotiates a deal with a consultant. The company wishes the consultant to analyze its databases through data mining techniques. Yet the

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Data Mining Over Encrypted Data on Cloud

Data Mining has wide applications in many areas such as medicine, scientific, banking, research and among government agencies. For the past decade, due to the rise of various privacy issues, many theoretical and practical solutions to the classification problem have been proposed under different security models. Classification is one of the commonly used tasks in data mining applications Howeve...

متن کامل

k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data

Data Mining has wide applications in many areas such as banking, medicine, scientific research and among government agencies. Classification is one of the commonly used tasks in data mining applications. For the past decade, due to the rise of various privacy issues, many theoretical and practical solutions to the classification problem have been proposed under different security models. Howeve...

متن کامل

Improvisation of K-nn Classifier on Semantically Secure Encrypted Relational Data

By the rapid improvement in web help and their popularity, web customers are developing day by day. Hence, there is large and various data. Data Mining has a wide use for the fields of business, medicine, experimental research and among government offices. One of the generally used tasks in data mining applications is Classification. Various professional and possible solutions to the classifica...

متن کامل

Chapter 11 PRIVACY PROTECTION IN COLLABORATIVE FILTERING BY ENCRYPTED COMPUTATION

We present a method to protect users’ privacy in collaborative filtering by performing the computations on encrypted data. We focus on the commonly-used memory-based approach, and show that the two main steps in collaborative filtering, being the determination of similarities and the prediction of ratings, can be performed on encrypted profiles. We discuss both user-based and item-based collabo...

متن کامل

Private Key based query on encrypted data

Nowadays, users of information systems have inclination to use a central server to decrease data transferring and maintenance costs. Since such a system is not so trustworthy, users' data usually upkeeps encrypted. However, encryption is not a nostrum for security problems and cannot guarantee the data security. In other words, there are some techniques that can endanger security of encrypted d...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006