A comprehensive survey on secure outsourced computation and its applications
With the ever-increasing requirement of storage and computation resources, it is unrealistic
for local devices (with limited sources) to implement large-scale data processing. Therefore …
for local devices (with limited sources) to implement large-scale data processing. Therefore …
Research perspectives on fully homomorphic encryption models for cloud sector
S Mittal, KR Ramkumar - Journal of Computer Security, 2021 - content.iospress.com
As there is a continuous delivery of big data, the researchers are showing interest in the
applications of cloud computing concerning privacy, and security. On the other hand, many …
applications of cloud computing concerning privacy, and security. On the other hand, many …
Design and implementation of a secure cloud-based billing model for smart meters as an Internet of things using homomorphic cryptography
V Mai, I Khalil - Future Generation Computer Systems, 2017 - Elsevier
Smart grids introduce many outstanding security and privacy issues, especially when smart
meters are connected to public networks, creating an Internet of things in which customer …
meters are connected to public networks, creating an Internet of things in which customer …
[PDF][PDF] Privacy preserving data mining: techniques and algorithms
There is incredible volume of data that is generated at exponential rate by various
organizations such as hospitals, insurance companies, banks, stock market etc. It is done by …
organizations such as hospitals, insurance companies, banks, stock market etc. It is done by …
Grammar-based multi-objective algorithms for mining association rules
In association rule mining, the process of extracting relations from a dataset often requires
the application of more than one quality measure and, in many cases, such measures …
the application of more than one quality measure and, in many cases, such measures …
[HTML][HTML] Secure and flexible cloud-assisted association rule mining over horizontally partitioned databases
With recent trends in big data and cloud computing, data mining has also attracted
considerable interest due to its potential to deal with distributed data in the cloud. However …
considerable interest due to its potential to deal with distributed data in the cloud. However …
Privacy-Preserving Rule Induction using CKKS
Rule-based learning involves using specific rules to categorize or identify datasets. This
study introduces a newapproach called homomorphic encryption-based rule induction …
study introduces a newapproach called homomorphic encryption-based rule induction …
[PDF][PDF] Classification of privacy preserving data mining algorithms: a review
D Gunawan - Jurnal Elektronika dan Telekomunikasi, 2020 - academia.edu
Nowadays, data from various sources are gathered and stored in databases. The collection
of the data does not give a significant impact unless the database owner conducts certain …
of the data does not give a significant impact unless the database owner conducts certain …
[HTML][HTML] A partition enhanced mining algorithm for distributed association rule mining systems
The extraction of patterns and rules from large distributed databases through existing
Distributed Association Rule Mining (DARM) systems is still faced with enormous challenges …
Distributed Association Rule Mining (DARM) systems is still faced with enormous challenges …
[HTML][HTML] A brief overview and an experimental evaluation of data confidentiality measures on the cloud
Due to the many advantages offered by the cloud computing paradigm, it is fast becoming
an enabling technology for many organizations, and even individual users. Flexibility and …
an enabling technology for many organizations, and even individual users. Flexibility and …