IMPLEMENTATION OF PRIVACY PRESERVING TECHNIQUE IN DISTRIBUTED DATA ANALYSIS IN DATA MINING
Journal: JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (JCET) (Vol.9, No. 3)Publication Date: 2018-06-28
Authors : SRIKANTH BETHU R ARUNA FLARENCE; SURESH MAMIDISETTI;
Page : 76-85
Keywords : Data Analysis; Distributed Data; Protocols; Privacy and securit.;
Abstract
Information and Communication Technology has a challenging issues like Privacy and Security in maintaining confidentiality of a given data. The communicating and sharing of data has many benefits, and it provides great value to research in building accurate data analysis models. In this paper we discuss on sharing of data and participating parties which provide truthful inputs. The assumption of fact finding is based on the protocol that builds data analysis models which provides results from all participating parties. The participants who are not interested can be negotiated from producing results for analysis. In this paper credit card application is taken as example and analyzed deeply how distributed data analysis is taken place.
Other Latest Articles
- Effect of the Energy of Consciousness (The Trivedi Effect®) on Physicochemical, Thermal, Structural, and Behavioral Properties of Magnesium Gluconate
- AUTHENTICATED AND AUTOMATED MUSEUM USING RFID AND IOT
- Impact of Consciousness Energy Healing Treatment (The Trivedi Effect®) on Physical, Spectroscopic, and Thermal Properties of Withania somnifera (Ashwagandha) Root Extract
- RECONSTRUCTION OF HUMAN FACE IMAGE FROM VIDEOS
- Structural and Natural Isotopic Abundance Analysis of Magnesium Gluconate Treated with Energy of Consciousness (The Trivedi Effect®) Using LC-MS and NMR
Last modified: 2018-09-15 19:11:00