{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T12:01:46Z","timestamp":1747224106626,"version":"3.40.5"},"reference-count":34,"publisher":"IGI Global","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,7]]},"abstract":"<jats:p>Classifying data is to automatically assign predefined classes to data. It is one of the main applications of data mining. Having complete access to all data is critical for building accurate models. Data can be highly sensitive, such as biomedical data, which cannot be disclosed or shared with third party, because it can harm individuals and organizations. The challenge is how to preserve privacy and usefulness of data. Privacy preserving classification addresses this problem. Collaborative models are constructed over networks without violating the data owners' privacy. In this article, the authors address two problems: privacy records deduplication of the same records and privacy-preserving classification. They propose a randomized hash technic for deduplication and an enhanced privacy preserving classification of biomedical data over horizontally distributed data based on two homomorphic encryptions. No private, intermediate or final results are disclosed. Experimentations show that their solution is efficient and secure without loss of accuracy.<\/jats:p>","DOI":"10.4018\/ijoci.2018070104","type":"journal-article","created":{"date-parts":[[2018,7,30]],"date-time":"2018-07-30T17:18:46Z","timestamp":1532971126000},"page":"41-58","source":"Crossref","is-referenced-by-count":0,"title":["Privacy Preserving Classification of Biomedical Data With Secure Removing of Duplicate Records"],"prefix":"10.4018","volume":"8","author":[{"given":"Boudheb","family":"Tarik","sequence":"first","affiliation":[{"name":"EEDIS Laboratory, Djillali Liabes University, Sidi Bel-Abbes, Algeria"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3391-6280","authenticated-orcid":true,"given":"Elberrichi","family":"Zakaria","sequence":"additional","affiliation":[{"name":"EEDIS Laboratory, Djillali Liabes University, Sidi Bel-Abbes, Algeria"}]}],"member":"2432","reference":[{"key":"IJOCI.2018070104-0","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-4996-z"},{"key":"IJOCI.2018070104-1","doi-asserted-by":"crossref","unstructured":"Aoki, K., Guo, J., Matusiewicz, K., Sasaki, Y., & Wang, L. (2009, December). Preimages for step-reduced SHA-2. In International Conference on the Theory and Application of Cryptology and Information Security (pp. 578-597). Springer Berlin Heidelberg.","DOI":"10.1007\/978-3-642-10366-7_34"},{"key":"IJOCI.2018070104-2","unstructured":"Babu, V. R., & Samanthula, A. R. (2015). Tenet production with apriori and genetic algorithms."},{"key":"IJOCI.2018070104-3","doi-asserted-by":"crossref","unstructured":"Bellare, M., Canetti, R., & Krawczyk, H. (1996, August). Keying hash functions for message authentication. In Annual International Cryptology Conference (pp. 1-15). Springer Berlin Heidelberg.","DOI":"10.1007\/3-540-68697-5_1"},{"key":"IJOCI.2018070104-4","doi-asserted-by":"publisher","DOI":"10.4018\/IJOCI.2017010102"},{"key":"IJOCI.2018070104-5","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2015.2491281"},{"key":"IJOCI.2018070104-6","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2007.250581"},{"issue":"4","key":"IJOCI.2018070104-7","first-page":"246","article-title":"A survey of record deduplication techniques.","volume":"2","author":"P. P.Gujar","year":"2013","journal-title":"IJLTET"},{"key":"IJOCI.2018070104-8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17373-8_4"},{"issue":"5","key":"IJOCI.2018070104-9","first-page":"56","article-title":"An overview of methods maintaining diversity in genetic algorithms.","volume":"2","author":"D.Gupta","year":"2012","journal-title":"International Journal of Emerging Technology and Advanced Engineering"},{"key":"IJOCI.2018070104-10","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2004.45"},{"key":"IJOCI.2018070104-11","unstructured":"Kantarc\u0131oglu, M., Vaidya, J., & Clifton, C. (2003). Privacy preserving naive bayes classifier for horizontally partitioned data. In IEEE ICDM workshop on privacy preserving data mining (pp. 3-9)."},{"key":"IJOCI.2018070104-12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34047-5_15"},{"key":"IJOCI.2018070104-13","unstructured":"Ko\u0142cz, A., Chowdhury, A., & Alspector, J. (2003). Data duplication: An imbalance problem?"},{"key":"IJOCI.2018070104-14","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTGRID.2010.5622064"},{"key":"IJOCI.2018070104-15","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2015.2407157"},{"key":"IJOCI.2018070104-16","unstructured":"Mangasarian, O.L. & Wolberg, W.H. (1990). Cancer diagnosis via linear programming. SIAM News, 23(5), 1, 18."},{"key":"IJOCI.2018070104-17","doi-asserted-by":"publisher","DOI":"10.1109\/ICoAC.2014.7229702"},{"key":"IJOCI.2018070104-18","first-page":"178","article-title":"New attacks on the RSA cryptosystem.","author":"A.Nitaj","year":"2014","journal-title":"International Conference on Cryptology in Africa"},{"key":"IJOCI.2018070104-19","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2011.110417"},{"issue":"1","key":"IJOCI.2018070104-20","first-page":"69","article-title":"An efficient approach for detecting approximately duplicate database records.","volume":"24","author":"Y. F.Qiu","year":"2001","journal-title":"Chinese Journal Of Computers-Chinese Edition"},{"key":"IJOCI.2018070104-21","doi-asserted-by":"publisher","DOI":"10.4028\/www.scientific.net\/AMM.713-715.1863"},{"key":"IJOCI.2018070104-22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-25937-4_24"},{"key":"IJOCI.2018070104-23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89754-5_8"},{"key":"IJOCI.2018070104-24","doi-asserted-by":"crossref","unstructured":"Sulak, F., Ko\u00e7ak, O., Saygi, E., \u00d6g\u00fcn\u00e7, M., & Bozdemir, B. (2017). A second pre-image attack and a collision attack to cryptographic hash function LUX. Communications Faculty Of Sciences University Of Ankara-Series A1 Mathematics And Statistics, 66(1), 254-266.","DOI":"10.1501\/Commua1_0000000794"},{"key":"IJOCI.2018070104-25","doi-asserted-by":"publisher","DOI":"10.5121\/ijnsa.2014.6602"},{"key":"IJOCI.2018070104-26","doi-asserted-by":"publisher","DOI":"10.1007\/s007990100044"},{"key":"IJOCI.2018070104-27","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2013.43"},{"key":"IJOCI.2018070104-28","doi-asserted-by":"publisher","DOI":"10.1145\/191177.191231"},{"issue":"1","key":"IJOCI.2018070104-29","article-title":"A survey paper on deduplication by using genetic algorithm along with hash-based algorithm.","volume":"4","author":"J. R.Waykole","year":"2014","journal-title":"International Journal of Engineering Research and Applications"},{"key":"IJOCI.2018070104-30","doi-asserted-by":"publisher","DOI":"10.1145\/2000824.2000825"},{"key":"IJOCI.2018070104-31","doi-asserted-by":"publisher","DOI":"10.1109\/GCC.2006.73"},{"key":"IJOCI.2018070104-32","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.02.005"},{"key":"IJOCI.2018070104-33","doi-asserted-by":"publisher","DOI":"10.1186\/s12911-016-0389-x"}],"container-title":["International Journal of Organizational and Collective Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=210540","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T00:01:54Z","timestamp":1651795314000},"score":1,"resource":{"primary":{"URL":"http:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJOCI.2018070104"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2018,7]]},"references-count":34,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.4018\/ijoci.2018070104","relation":{},"ISSN":["1947-9344","1947-9352"],"issn-type":[{"type":"print","value":"1947-9344"},{"type":"electronic","value":"1947-9352"}],"subject":[],"published":{"date-parts":[[2018,7]]}}}