Skip to main content
Top
Published in: Cluster Computing 1/2019

10-01-2018

Upkeeping secrecy in information extraction using ‘k’ division graph based postulates

Authors: B. Santhosh Kumar, S. Karthik, V. P. Arunachalam

Published in: Cluster Computing | Special Issue 1/2019

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The prevailing mechanisms for extracting useful information might offer enhanced results in extraction of useful data for creating classification policies. The goal is to administer the disputes prevailing within the categorization for supervised data. Moreover several schemes conceal the individuality of the schemes employed which attempts to conceal the location of information which might become a serious issue during conserving privacy of the data stored. The aim is to address the disputes by making use of a graph and hypothetical based scheme termed as k-segmentation of graphs which delivers the creation of difficult choice based tree classification organized into a priority based hierarchy. The analysis depicts that the designed scheme offers accuracy and effectiveness.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Niewolny, D.: How the Internet of Things is revolutionizing healthcare. Tech. Rep, FreeScale Technologies (Whitepaper) (2010) Niewolny, D.: How the Internet of Things is revolutionizing healthcare. Tech. Rep, FreeScale Technologies (Whitepaper) (2010)
2.
go back to reference Kim, J.T.: Privacy and security issues for healthcare system with embedded RFID system on Internet of Things. Adv. Sci. Technol. Lett. 72, 109–112 (2014)CrossRef Kim, J.T.: Privacy and security issues for healthcare system with embedded RFID system on Internet of Things. Adv. Sci. Technol. Lett. 72, 109–112 (2014)CrossRef
3.
go back to reference Will the Internet of Things Analytics Revolutionize the Healthcare Industry? Tech. Rep. Saviance Technologies (2009) Will the Internet of Things Analytics Revolutionize the Healthcare Industry? Tech. Rep. Saviance Technologies (2009)
4.
go back to reference Agrawal, R., Srikant, R.: Privacy preserving data mining. In: ACM SIGMOD International Conference on Management of data (2000) Agrawal, R., Srikant, R.: Privacy preserving data mining. In: ACM SIGMOD International Conference on Management of data (2000)
5.
go back to reference Vaidya, J., Clifton, C.: Privacy-preserving data mining: why, how, and when. IEEE Secur. Priv. 2(6), 19–27 (2007)CrossRef Vaidya, J., Clifton, C.: Privacy-preserving data mining: why, how, and when. IEEE Secur. Priv. 2(6), 19–27 (2007)CrossRef
6.
go back to reference Quinlan, J.R.: Induction of Decision Trees. Mach. Learn. 1, 569–571 (1986) Quinlan, J.R.: Induction of Decision Trees. Mach. Learn. 1, 569–571 (1986)
7.
go back to reference Smys, S., Bala, GJ., Raj, JS.: Construction of virtual backbone to support mobility in MANET—a less overhead approach. In: Application of Information and Communication Technologies, AICT 2009. International Conference on 2009, pp. 1–4. IEEE (2009) Smys, S., Bala, GJ., Raj, JS.: Construction of virtual backbone to support mobility in MANET—a less overhead approach. In: Application of Information and Communication Technologies, AICT 2009. International Conference on 2009, pp. 1–4. IEEE (2009)
8.
go back to reference Aggarwal, C.C., Yu, P.S.: A course in number theory. Privacy Preserving Data Mining: Models and Algorithms. Springer, New York (2010) Aggarwal, C.C., Yu, P.S.: A course in number theory. Privacy Preserving Data Mining: Models and Algorithms. Springer, New York (2010)
9.
go back to reference Wang, P.: Survey on privacy preserving data mining. Int. J. Digit. Content. Technol. Appl. 4(9) (2010) Wang, P.: Survey on privacy preserving data mining. Int. J. Digit. Content. Technol. Appl. 4(9) (2010)
10.
go back to reference Kou, G., Peng, Y., Shi, Y., Chen, Z.: Privacy-preserving data mining of medical fata using data separation based techniques. Data Sci. J 6, S429–S434 (2007)CrossRef Kou, G., Peng, Y., Shi, Y., Chen, Z.: Privacy-preserving data mining of medical fata using data separation based techniques. Data Sci. J 6, S429–S434 (2007)CrossRef
11.
go back to reference Abad, B., Kinariwala, S.A.: A novel approach for privacy preserving in medical data mining using sensitivity based anonymity. Int. J. Comput. Appl. 42(4), 13–16 (2012) Abad, B., Kinariwala, S.A.: A novel approach for privacy preserving in medical data mining using sensitivity based anonymity. Int. J. Comput. Appl. 42(4), 13–16 (2012)
12.
go back to reference Wong, R., Li, J., Fu, A., Wang, K.: (, k)-Anonymity: an enhanced k-anonymity model for privacy preserving data publishing, pp. 754–759. KDD, Japan (2006) Wong, R., Li, J., Fu, A., Wang, K.: (, k)-Anonymity: an enhanced k-anonymity model for privacy preserving data publishing, pp. 754–759. KDD, Japan (2006)
13.
go back to reference Wu, X.: Information security in big data: privacy and data mining. IEEE Access 2, 1149–1176 (2011) Wu, X.: Information security in big data: privacy and data mining. IEEE Access 2, 1149–1176 (2011)
14.
go back to reference Paryasto, M., Alamsyah, A., Rahardjo, B., Kuspriyanto : Big-data security management issues. In: 2nd International Conference on Information and Communication Technology (2014) Paryasto, M., Alamsyah, A., Rahardjo, B., Kuspriyanto : Big-data security management issues. In: 2nd International Conference on Information and Communication Technology (2014)
15.
go back to reference Tripathy, A., Pradhan, M.: A novel framework for preserving privacy of data using correlation analysis. In: International Conference on Advances in Computing Communications and Informatics–ICACCI 12, (2012) Tripathy, A., Pradhan, M.: A novel framework for preserving privacy of data using correlation analysis. In: International Conference on Advances in Computing Communications and Informatics–ICACCI 12, (2012)
Metadata
Title
Upkeeping secrecy in information extraction using ‘k’ division graph based postulates
Authors
B. Santhosh Kumar
S. Karthik
V. P. Arunachalam
Publication date
10-01-2018
Publisher
Springer US
Published in
Cluster Computing / Issue Special Issue 1/2019
Print ISSN: 1386-7857
Electronic ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-018-1705-2

Other articles of this Special Issue 1/2019

Cluster Computing 1/2019 Go to the issue

Premium Partner