Skip to main content
Erschienen in: Cluster Computing 1/2019

10.01.2018

Upkeeping secrecy in information extraction using ‘k’ division graph based postulates

verfasst von: B. Santhosh Kumar, S. Karthik, V. P. Arunachalam

Erschienen in: Cluster Computing | Sonderheft 1/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The prevailing mechanisms for extracting useful information might offer enhanced results in extraction of useful data for creating classification policies. The goal is to administer the disputes prevailing within the categorization for supervised data. Moreover several schemes conceal the individuality of the schemes employed which attempts to conceal the location of information which might become a serious issue during conserving privacy of the data stored. The aim is to address the disputes by making use of a graph and hypothetical based scheme termed as k-segmentation of graphs which delivers the creation of difficult choice based tree classification organized into a priority based hierarchy. The analysis depicts that the designed scheme offers accuracy and effectiveness.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Niewolny, D.: How the Internet of Things is revolutionizing healthcare. Tech. Rep, FreeScale Technologies (Whitepaper) (2010) Niewolny, D.: How the Internet of Things is revolutionizing healthcare. Tech. Rep, FreeScale Technologies (Whitepaper) (2010)
2.
Zurück zum Zitat Kim, J.T.: Privacy and security issues for healthcare system with embedded RFID system on Internet of Things. Adv. Sci. Technol. Lett. 72, 109–112 (2014)CrossRef Kim, J.T.: Privacy and security issues for healthcare system with embedded RFID system on Internet of Things. Adv. Sci. Technol. Lett. 72, 109–112 (2014)CrossRef
3.
Zurück zum Zitat Will the Internet of Things Analytics Revolutionize the Healthcare Industry? Tech. Rep. Saviance Technologies (2009) Will the Internet of Things Analytics Revolutionize the Healthcare Industry? Tech. Rep. Saviance Technologies (2009)
4.
Zurück zum Zitat Agrawal, R., Srikant, R.: Privacy preserving data mining. In: ACM SIGMOD International Conference on Management of data (2000) Agrawal, R., Srikant, R.: Privacy preserving data mining. In: ACM SIGMOD International Conference on Management of data (2000)
5.
Zurück zum Zitat Vaidya, J., Clifton, C.: Privacy-preserving data mining: why, how, and when. IEEE Secur. Priv. 2(6), 19–27 (2007)CrossRef Vaidya, J., Clifton, C.: Privacy-preserving data mining: why, how, and when. IEEE Secur. Priv. 2(6), 19–27 (2007)CrossRef
6.
Zurück zum Zitat Quinlan, J.R.: Induction of Decision Trees. Mach. Learn. 1, 569–571 (1986) Quinlan, J.R.: Induction of Decision Trees. Mach. Learn. 1, 569–571 (1986)
7.
Zurück zum Zitat Smys, S., Bala, GJ., Raj, JS.: Construction of virtual backbone to support mobility in MANET—a less overhead approach. In: Application of Information and Communication Technologies, AICT 2009. International Conference on 2009, pp. 1–4. IEEE (2009) Smys, S., Bala, GJ., Raj, JS.: Construction of virtual backbone to support mobility in MANET—a less overhead approach. In: Application of Information and Communication Technologies, AICT 2009. International Conference on 2009, pp. 1–4. IEEE (2009)
8.
Zurück zum Zitat Aggarwal, C.C., Yu, P.S.: A course in number theory. Privacy Preserving Data Mining: Models and Algorithms. Springer, New York (2010) Aggarwal, C.C., Yu, P.S.: A course in number theory. Privacy Preserving Data Mining: Models and Algorithms. Springer, New York (2010)
9.
Zurück zum Zitat Wang, P.: Survey on privacy preserving data mining. Int. J. Digit. Content. Technol. Appl. 4(9) (2010) Wang, P.: Survey on privacy preserving data mining. Int. J. Digit. Content. Technol. Appl. 4(9) (2010)
10.
Zurück zum Zitat Kou, G., Peng, Y., Shi, Y., Chen, Z.: Privacy-preserving data mining of medical fata using data separation based techniques. Data Sci. J 6, S429–S434 (2007)CrossRef Kou, G., Peng, Y., Shi, Y., Chen, Z.: Privacy-preserving data mining of medical fata using data separation based techniques. Data Sci. J 6, S429–S434 (2007)CrossRef
11.
Zurück zum Zitat Abad, B., Kinariwala, S.A.: A novel approach for privacy preserving in medical data mining using sensitivity based anonymity. Int. J. Comput. Appl. 42(4), 13–16 (2012) Abad, B., Kinariwala, S.A.: A novel approach for privacy preserving in medical data mining using sensitivity based anonymity. Int. J. Comput. Appl. 42(4), 13–16 (2012)
12.
Zurück zum Zitat Wong, R., Li, J., Fu, A., Wang, K.: (, k)-Anonymity: an enhanced k-anonymity model for privacy preserving data publishing, pp. 754–759. KDD, Japan (2006) Wong, R., Li, J., Fu, A., Wang, K.: (, k)-Anonymity: an enhanced k-anonymity model for privacy preserving data publishing, pp. 754–759. KDD, Japan (2006)
13.
Zurück zum Zitat Wu, X.: Information security in big data: privacy and data mining. IEEE Access 2, 1149–1176 (2011) Wu, X.: Information security in big data: privacy and data mining. IEEE Access 2, 1149–1176 (2011)
14.
Zurück zum Zitat Paryasto, M., Alamsyah, A., Rahardjo, B., Kuspriyanto : Big-data security management issues. In: 2nd International Conference on Information and Communication Technology (2014) Paryasto, M., Alamsyah, A., Rahardjo, B., Kuspriyanto : Big-data security management issues. In: 2nd International Conference on Information and Communication Technology (2014)
15.
Zurück zum Zitat Tripathy, A., Pradhan, M.: A novel framework for preserving privacy of data using correlation analysis. In: International Conference on Advances in Computing Communications and Informatics–ICACCI 12, (2012) Tripathy, A., Pradhan, M.: A novel framework for preserving privacy of data using correlation analysis. In: International Conference on Advances in Computing Communications and Informatics–ICACCI 12, (2012)
Metadaten
Titel
Upkeeping secrecy in information extraction using ‘k’ division graph based postulates
verfasst von
B. Santhosh Kumar
S. Karthik
V. P. Arunachalam
Publikationsdatum
10.01.2018
Verlag
Springer US
Erschienen in
Cluster Computing / Ausgabe Sonderheft 1/2019
Print ISSN: 1386-7857
Elektronische ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-018-1705-2

Weitere Artikel der Sonderheft 1/2019

Cluster Computing 1/2019 Zur Ausgabe