A comprehensive survey on secure outsourced computation and its applications

Y Yang, X Huang, X Liu, H Cheng, J Weng, X Luo… - IEEE …, 2019 - ieeexplore.ieee.org
With the ever-increasing requirement of storage and computation resources, it is unrealistic
for local devices (with limited sources) to implement large-scale data processing. Therefore …

Research perspectives on fully homomorphic encryption models for cloud sector

S Mittal, KR Ramkumar - Journal of Computer Security, 2021 - content.iospress.com
As there is a continuous delivery of big data, the researchers are showing interest in the
applications of cloud computing concerning privacy, and security. On the other hand, many …

Design and implementation of a secure cloud-based billing model for smart meters as an Internet of things using homomorphic cryptography

V Mai, I Khalil - Future Generation Computer Systems, 2017 - Elsevier
Smart grids introduce many outstanding security and privacy issues, especially when smart
meters are connected to public networks, creating an Internet of things in which customer …

[PDF][PDF] Privacy preserving data mining: techniques and algorithms

R Ratra, P Gulia - International Journal of Engineering Trends and …, 2020 - researchgate.net
There is incredible volume of data that is generated at exponential rate by various
organizations such as hospitals, insurance companies, banks, stock market etc. It is done by …

Grammar-based multi-objective algorithms for mining association rules

JM Luna, JR Romero, S Ventura - Data & Knowledge Engineering, 2013 - Elsevier
In association rule mining, the process of extracting relations from a dataset often requires
the application of more than one quality measure and, in many cases, such measures …

[HTML][HTML] Secure and flexible cloud-assisted association rule mining over horizontally partitioned databases

C Huang, R Lu, KKR Choo - Journal of Computer and System Sciences, 2017 - Elsevier
With recent trends in big data and cloud computing, data mining has also attracted
considerable interest due to its potential to deal with distributed data in the cloud. However …

Privacy-Preserving Rule Induction using CKKS

J Choi, J Choi, Y Lee, JS Hong - IEEE Access, 2024 - ieeexplore.ieee.org
Rule-based learning involves using specific rules to categorize or identify datasets. This
study introduces a newapproach called homomorphic encryption-based rule induction …

[PDF][PDF] Classification of privacy preserving data mining algorithms: a review

D Gunawan - Jurnal Elektronika dan Telekomunikasi, 2020 - academia.edu
Nowadays, data from various sources are gathered and stored in databases. The collection
of the data does not give a significant impact unless the database owner conducts certain …

[HTML][HTML] A partition enhanced mining algorithm for distributed association rule mining systems

AO Ogunde, O Folorunso, AS Sodiya - Egyptian Informatics Journal, 2015 - Elsevier
The extraction of patterns and rules from large distributed databases through existing
Distributed Association Rule Mining (DARM) systems is still faced with enormous challenges …

[HTML][HTML] A brief overview and an experimental evaluation of data confidentiality measures on the cloud

H Aljafer, Z Malik, M Alodib, A Rezgui - journal of innovation in digital …, 2014 - Elsevier
Due to the many advantages offered by the cloud computing paradigm, it is fast becoming
an enabling technology for many organizations, and even individual users. Flexibility and …