Hybrid solution for privacy preserving data mining on the cloud computing
The continuous evolution of the cloud has attracted many enterprises to outsource their data to the cloud to accomplish data mining tasks and other services. So that data owners can enjoy the benefits of the cloud without fear from violations of data privacy, PPDM approaches came to protect the priv...
Saved in:
Main Authors: | , , |
---|---|
Format: | Conference or Workshop Item |
Published: |
2020
|
Subjects: | |
Online Access: | http://eprints.utm.my/id/eprint/89882/ http://dx.doi.org/10.1007/978-3-030-33582-3_70 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.utm.89882 |
---|---|
record_format |
eprints |
spelling |
my.utm.898822021-03-31T06:31:43Z http://eprints.utm.my/id/eprint/89882/ Hybrid solution for privacy preserving data mining on the cloud computing Osman, Huda Maarof, Mohd. Aizaini Md. Siraj, Maheyzah QA75 Electronic computers. Computer science The continuous evolution of the cloud has attracted many enterprises to outsource their data to the cloud to accomplish data mining tasks and other services. So that data owners can enjoy the benefits of the cloud without fear from violations of data privacy, PPDM approaches came to protect the privacy of data while preserving the usefulness of data. This article reviews the most popular models of PPDM over the cloud along with their strengths and the weaknesses to conclude the research gap. Some of the current PPDM models still vulnerable to various types of attacks like the K-anonymity model whereby surface from background knowledge attack, homogeneity attack, similarity attack and probabilistic inference attack, others of them consume great computational complexity, for example, the methods which depended on cryptography. The hybrid solution was proposed to protect the data privacy and overcome the current problems of PPDM include identify and attributes disclosures whereby preservation the privacy of data before to outsourced on the cloud is the main focus. K-Anonymization is combined with homomorphic encryption to rid from their limitations and take their advantage together to enhance data privacy-preserving and maintain the data utility of outsourced data. 2020 Conference or Workshop Item PeerReviewed Osman, Huda and Maarof, Mohd. Aizaini and Md. Siraj, Maheyzah (2020) Hybrid solution for privacy preserving data mining on the cloud computing. In: 4th International Conference of Reliable Information and Communication Technology, IRICT 2019, 22 September 2019 - 23 September 2019, Johor Bahru, Malaysia. http://dx.doi.org/10.1007/978-3-030-33582-3_70 |
institution |
Universiti Teknologi Malaysia |
building |
UTM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Teknologi Malaysia |
content_source |
UTM Institutional Repository |
url_provider |
http://eprints.utm.my/ |
topic |
QA75 Electronic computers. Computer science |
spellingShingle |
QA75 Electronic computers. Computer science Osman, Huda Maarof, Mohd. Aizaini Md. Siraj, Maheyzah Hybrid solution for privacy preserving data mining on the cloud computing |
description |
The continuous evolution of the cloud has attracted many enterprises to outsource their data to the cloud to accomplish data mining tasks and other services. So that data owners can enjoy the benefits of the cloud without fear from violations of data privacy, PPDM approaches came to protect the privacy of data while preserving the usefulness of data. This article reviews the most popular models of PPDM over the cloud along with their strengths and the weaknesses to conclude the research gap. Some of the current PPDM models still vulnerable to various types of attacks like the K-anonymity model whereby surface from background knowledge attack, homogeneity attack, similarity attack and probabilistic inference attack, others of them consume great computational complexity, for example, the methods which depended on cryptography. The hybrid solution was proposed to protect the data privacy and overcome the current problems of PPDM include identify and attributes disclosures whereby preservation the privacy of data before to outsourced on the cloud is the main focus. K-Anonymization is combined with homomorphic encryption to rid from their limitations and take their advantage together to enhance data privacy-preserving and maintain the data utility of outsourced data. |
format |
Conference or Workshop Item |
author |
Osman, Huda Maarof, Mohd. Aizaini Md. Siraj, Maheyzah |
author_facet |
Osman, Huda Maarof, Mohd. Aizaini Md. Siraj, Maheyzah |
author_sort |
Osman, Huda |
title |
Hybrid solution for privacy preserving data mining on the cloud computing |
title_short |
Hybrid solution for privacy preserving data mining on the cloud computing |
title_full |
Hybrid solution for privacy preserving data mining on the cloud computing |
title_fullStr |
Hybrid solution for privacy preserving data mining on the cloud computing |
title_full_unstemmed |
Hybrid solution for privacy preserving data mining on the cloud computing |
title_sort |
hybrid solution for privacy preserving data mining on the cloud computing |
publishDate |
2020 |
url |
http://eprints.utm.my/id/eprint/89882/ http://dx.doi.org/10.1007/978-3-030-33582-3_70 |
_version_ |
1696976236516999168 |
score |
13.212979 |