A Survey on Privacy-Preserving Data Mining using Random Decision Tree
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 11, November 2014

A Survey on Privacy-Preserving Data Mining using Random Decision Tree

Komal N. Chouragade, Trupti H. Gurav

Distributed data is widely spread in advanced information driven applications. With various sources of data, main problem is to decide how to collaborate adequately crosswise over collaborate limits while maximizing the utility of gathered information. Since utilizing local data provides suboptimal utility, methods for privacy-preserving collaborative knowledge detection must be produced. Past cryptography-based work privacy-preserving data mining is still excessively slower to be powerful for huge scale data sets to handle today's huge data problem. Past work on Random Decision Trees (RDT) demonstrates that it is conceivable to produce proportionate and exact models with much more modest cost. The fact can be utilized fully that RDTs can characteristically fit into a parallel and completely distributed framework, and generate protocols to develop privacy-preserving RDTs that allow general and effective distributed privacy-preserving knowledge discovery.

Keywords: Distributed data, Privacy-Preserving Data Mining, Random Decision Trees, Knowledge Detection, Protocol

Edition: Volume 3 Issue 11, November 2014

Pages: 2891 - 2894

Share this Article

How to Cite this Article?

Komal N. Chouragade, Trupti H. Gurav, "A Survey on Privacy-Preserving Data Mining using Random Decision Tree", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB1449, Volume 3 Issue 11, November 2014, 2891 - 2894

122 PDF Views | 95 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Distributed data'

Research Paper, Computer Science & Engineering, Congo, Volume 10 Issue 3, March 2021

Pages: 61 - 70

Contribution of an Embedded and Biometric System in a Replicated Database for Access Control in a Multi-Entry Institution

Bopatriciat Boluma Mangata, Eugene Mbuyi Mukendi, Jean-Didier Batubenga

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1757 - 1758

A Review of Privacy Clustered Mining of Association Rules in Distributed Databases

Vanita Babane, Shital K.Somawar

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 2058 - 2061

Privacy Preserved Public Auditing for Distributed Data

Anes P. A., Neethu Francis

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 2084 - 2088

Implementation of Efficient Privacy Preserving Data Analysis for Secure Data Transmission

Shital Gawahale, Rekha Jadhav

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2891 - 2894

A Survey on Privacy-Preserving Data Mining using Random Decision Tree

Komal N. Chouragade, Trupti H. Gurav

Share this Article

Similar Articles with Keyword 'Privacy-Preserving Data Mining'

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2891 - 2894

A Survey on Privacy-Preserving Data Mining using Random Decision Tree

Komal N. Chouragade, Trupti H. Gurav

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1758 - 1762

Privacy-Preserving Data Mining using RDT Framework and C4.5

Komal N. Chouragade, Trupti H. Gurav

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 700 - 702

Privacy-Preserving Two-Party Distributed Association Rules Mining on Horizontally Partitioned Data

Patil Suraj Kakaso, Gadage Shriniwas

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 2068 - 2071

Bottom-Up Generalization: A Data Mining Solution to Privacy Protection

Vishakha B. Dalvi, Ranjit R. Keole

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 11, November 2013

Pages: 306 - 309

Survey on Privacy-Preservation in Data Mining Using Slicing Strategy

Neha Jamdar, Vanita Babane

Share this Article

Similar Articles with Keyword 'Random Decision Trees'

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2891 - 2894

A Survey on Privacy-Preserving Data Mining using Random Decision Tree

Komal N. Chouragade, Trupti H. Gurav

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 911 - 913

A Survey on Security of Association Rules Using RDT in Distributed Network

Anand Bhabat, R. A. Satao

Share this Article

Similar Articles with Keyword 'Protocol'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1751 - 1754

Joining Delay; Packet Delivery and Limitations of EGMP

G. Anandhi, Dr. S. K. Srivatsa

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 2450 - 2452

A Review of Random Based Mobility Model for AODV and DSDV MANETs Routing Protocols

Sunita, Sunil Makkar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 530 - 533

QoS Provisioning Using Latency for IPV6

T. Vengatesh, Dr. S. Thabasu Kannan

Share this Article
Top