Presents a secure method of data mining techniques taking into account the privacy and security of the data. Even in the disturbed environment, this approach can keep up the validity and authenticity of the data to produce the data after computation.
This era of information technology has a distinctive features of enormous amount of data being produced and stored by all forms human activities. Computers are used to store a huge portion of this database called computer databases, making the data accessible by the computer technology. However, enormous amount of data creates a problem of extraction of valuable knowledge from the database. This books gives a secure method of data mining techniques taking into account the privacy and security of the data. Even in the disturbed environment, this approach can keep up the validity and authenticity of the data to produce the data after computation.