B. Murugeshwari1,*, S. Rajalakshmi1, K. Sudharson2
Computer Systems Science and Engineering, Vol.44, No.3, pp. 2293-2307, 2023, DOI:10.32604/csse.2023.029074
- 01 August 2022
Abstract Imagine numerous clients, each with personal data; individual inputs are severely corrupt, and a server only concerns the collective, statistically essential facets of this data. In several data mining methods, privacy has become highly critical. As a result, various privacy-preserving data analysis technologies have emerged. Hence, we use the randomization process to reconstruct composite data attributes accurately. Also, we use privacy measures to estimate how much deception is required to guarantee privacy. There are several viable privacy protections; however, determining which one is the best is still a work in progress. This paper discusses the… More >