Privacy Preserving Multiparty Collaborative Data Mining for Multiple Service Providers
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 3, Issue 8
Abstract
The emergence of Application Service Providers hosting Internet-based data mining services is being seen as available alternative for organisations that value their knowledge resources but are constrained by the high cost of data mining software in this paper, we present a new multiple service provider model of operation for the Internet delivery of data mining services. This model has several advantages over the currently predominant approach for delivering data mining, services such as providing clients with a wider variety of options, choice of service providers and the benefits of a more competitive marketplace. In the current modern business environment, its success is defined by collaboration, team efforts and partnership, rather than lonely spectacular individual efforts in isolation. So the collaboration becomes especially important because of the mutual benefit it brings. For this kind of collaboration, data's privacy becomes extremely important: all the parties of the collaboration promise to provide their private data to the collaboration, but neither of them wants each other or any third party to learn much about their private data. One of the major problems that accompany with the huge collection or repository of data is confidentiality. The need for privacy is sometimes due to law or can be motivated by business interests. Performance of privacy preserving collaborative data using secure multiparty computation is evaluated with attack resistance rate measured in terms of time, number of session and participants and memory for privacy preservation.
Authors and Affiliations
Shrishti Pawar
DESIGN AND ANALYSIS OF MEMS CAPACITIVE SHUNT TYPE SWITCH FOR RF APPLICATIONS
RF-MEMS is a promising technology that has the potential to revolutionize RF and microwave system implementation for next generation telecommunication applications [1]. In this paper, a MEMS capacitive shunt type s...
SIMULATION OF MODIFIED AGC AND PRE—SYNCHRONIZATION PROCESSOR IN LOW POWER SOFTWARE DEFINED RADIO RECEIVER
In this paper, we can conclude that there is a reduction of power consumption by modifying the existing system of software define radio receiver (SDR). From the existing module, the digital front end architecture...
Malware :RFID
This paper presents various approaches and analysis that describes the terminology for RFID malware. There are various approaches used for RFID malware analysis and still lot of work is going on in this direction....
A Review Survey on Deadlock Detection in Multithreading
Deadlock freedom is the major challenge in developing multithreading programs. To avoid the potential risk of blocking a program, prior monitoring of threads can be made during the execution process. The proper m...
Improved Adaptive Position Update for Geographic Routing in Mobile Ad Hoc Networks
In geographic routing, the nodes ought to maintain up-to-date positions of their immediate neighbors. Periodic broadcasting of beacon packets that contain the geographic location coordinates of the nodes may be a...