Joint Perturbed Copies Verification Using Data Mining Techniques (Correlation)

Download Now
Provided by: International Journal of Computer & Organization Trends(IJCOT)
Topic: Data Management
Format: PDF
In this paper the authors address the issue of privacy preserving data mining. Specifically, they consider a scenario in which two parties owning confidential databases wish to run a data mining algorithm on the union of their databases, without revealing any unnecessary information. Their paper is motivated by the need both to protect privileged information and to enable its use for research or other purposes. The increasing ability to track and collect large amounts of data with the use of current hardware technology has lead to an interest in the development of data mining algorithms which preserve user privacy.
Download Now

Find By Topic