Privacy-preserving data mining
SIGMOD '00 Proceedings of the 2000 ACM SIGMOD international conference on Management of data
Data mining: concepts and techniques
Data mining: concepts and techniques
Privacy Preserving Data Mining
CRYPTO '00 Proceedings of the 20th Annual International Cryptology Conference on Advances in Cryptology
Limiting privacy breaches in privacy preserving data mining
Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
k-anonymity: a model for protecting privacy
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
Privacy-preserving k-means clustering over vertically partitioned data
Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining
Using randomized response techniques for privacy-preserving data mining
Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining
Maintaining data privacy in association rule mining
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
Protocols for secure computations
SFCS '82 Proceedings of the 23rd Annual Symposium on Foundations of Computer Science
Distributed clustering based on sampling local density estimates
IJCAI'03 Proceedings of the 18th international joint conference on Artificial intelligence
Hi-index | 0.00 |
The proliferation of mobile computing and cloud services is driving a revolutionary change in today's information society. We are moving into the Ubiquitous computing age in which a user utilizes, at the same time, several electronic platforms through which one can access all the required information whenever and wherever needed. Mobile users can use their cellular phone to check e-mail, browse internet; travelers with portable computers can surf the internet from airports, railway stations etc. The mobile capabilities can be integrated with cloud computing services to give more secure and advanced services to the subscribers. At the same time privacy is an important issue in the collaborative ubiquitous computing since privacy concerns may prevent the parties from directly sharing the data and some types of information about the data. The main challenge arises as to how multiple parties collaboratively conduct information exchange without breaching data privacy. This paper seeks to investigate solutions for secure Mobile cloud architecture by using a privacy preserving K-Medoids clustering which is one of data mining tasks.