Mining privacy-preserving association rules using transaction hewer allocator and facile hash algorithm in multi-cloud environments
In this era of data-driven decision-making, it is important to securely and efficiently extract knowledge from distributed datasets. However, in outsourced data for tasks like frequent itemset mining, privacy is an important issue. The difficulty is to secure sensitive data while delivering the insi...
Saved in:
Main Authors: | D. Dhinakaran, S. Gopalakrishnan, D. Selvaraj, M.S. Girija, G. Prabaharan |
---|---|
Format: | Article |
Language: | English |
Published: |
Elsevier
2025-06-01
|
Series: | MethodsX |
Subjects: | |
Online Access: | http://www.sciencedirect.com/science/article/pii/S2215016125001633 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Theory and Applications of Quantum Hashing
by: Farid Ablayev, et al.
Published: (2025-05-01) -
Symmetric Cryptography With Shift 2<sup>n-1</sup>, Hash Transformation, Optimization-Based Controller for Medical Image Infosecurity: Case Study in Mammographic Image
by: Pi-Yun Chen, et al.
Published: (2020-01-01) -
Atomic and privacy-preserving cyclic cross-chain protocol based on chameleon hash function
by: Mengyan Li, et al.
Published: (2025-06-01) -
Analysis of the amplitude form of the quantum hash function
by: M. F. Ablayev, et al.
Published: (2023-11-01) -
Redactable Blockchain from Accountable Weight Threshold Chameleon Hash
by: Qiang Ma, et al.
Published: (2025-09-01)