PRIVACY PRESERVATION TECHNIQUE: CLUSTER BASED CRYPTOGRAPHIC TECHNIQUES FOR PRIVATE DATA PROTECTION
Main Article Content
Article Sidebar
Abstract
Data mining is the process of automatically discovering useful information from large data repositories. Data mining techniques are applied to wide variety of applications in order to find novel and useful patterns that might otherwise remain unknown. The private and sensitive details can also be extracted with these techniques. So a number of privacy preserving techniques have been developed to provide privacy for private and sensitive information of the individuals. The major drawback with these existing techniques is their over anonymity property. As a result the tradeoff between accuracy of data mining results and privacy is not maintained properly. To overcome this drawback in this paper a cluster based cryptographic technique is described which could provide better privacy for private information of individuals.
Article Details
COPYRIGHT AGREEMENT AND AUTHORSHIP RESPONSIBILITY
 All paper submissions must carry the following duly signed by all the authors:
“I certify that I have participated sufficiently in the conception and design of this work and the analysis of the data (wherever applicable), as well as the writing of the manuscript, to take public responsibility for it. I believe the manuscript represents valid work. I have reviewed the final version of the manuscript and approve it for publication. Neither has the manuscript nor one with substantially similar content under my authorship been published nor is being considered for publication elsewhere, except as described in an attachment. Furthermore I attest that I shall produce the data upon which the manuscript is based for examination by the editors or their assignees, if requested.â€