{"id":"https://openalex.org/W2009642503","doi":"https://doi.org/10.1109/wocn.2012.6335528","title":"Shared and secured data partitioning for privacy preserving of collaborative file transfer in multi path computational mining","display_name":"Shared and secured data partitioning for privacy preserving of collaborative file transfer in multi path computational mining","publication_year":2012,"publication_date":"2012-09-01","ids":{"openalex":"https://openalex.org/W2009642503","doi":"https://doi.org/10.1109/wocn.2012.6335528","mag":"2009642503"},"language":"en","primary_location":{"id":"doi:10.1109/wocn.2012.6335528","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wocn.2012.6335528","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 Ninth International Conference on Wireless and Optical Communications Networks (WOCN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5023840075","display_name":"M. Balamurugan","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"M Balamurugan","raw_affiliation_strings":["Department of IT, Selvam College of Technology, India"],"affiliations":[{"raw_affiliation_string":"Department of IT, Selvam College of Technology, India","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103045904","display_name":"J Bhuvana","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"J. Bhuvana","raw_affiliation_strings":["Department of Computer Application, Selvam College of Technology, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Application, Selvam College of Technology, India","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5039462137","display_name":"S. ChenthurPandian","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"S. ChenthurPandian","raw_affiliation_strings":["College of Engineering and Technology, India","Dr. Mahalingam College of Engineering and Technology, India"],"affiliations":[{"raw_affiliation_string":"College of Engineering and Technology, India","institution_ids":[]},{"raw_affiliation_string":"Dr. Mahalingam College of Engineering and Technology, India","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5023840075"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.08240591,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"8","issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9950000047683716,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.95660001039505,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8760277032852173},{"id":"https://openalex.org/keywords/ssh-file-transfer-protocol","display_name":"SSH File Transfer Protocol","score":0.684056282043457},{"id":"https://openalex.org/keywords/data-sharing","display_name":"Data sharing","score":0.6358963847160339},{"id":"https://openalex.org/keywords/file-sharing","display_name":"File sharing","score":0.6245610117912292},{"id":"https://openalex.org/keywords/session","display_name":"Session (web analytics)","score":0.5784811973571777},{"id":"https://openalex.org/keywords/torrent-file","display_name":"Torrent file","score":0.5682733058929443},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.46008753776550293},{"id":"https://openalex.org/keywords/file-transfer","display_name":"File transfer","score":0.4505133032798767},{"id":"https://openalex.org/keywords/secure-multi-party-computation","display_name":"Secure multi-party computation","score":0.4374489188194275},{"id":"https://openalex.org/keywords/path","display_name":"Path (computing)","score":0.4198702573776245},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4121946096420288},{"id":"https://openalex.org/keywords/self-certifying-file-system","display_name":"Self-certifying File System","score":0.39674314856529236},{"id":"https://openalex.org/keywords/computer-file","display_name":"Computer file","score":0.38252612948417664},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3416728079319},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.2823362648487091},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.2800370752811432},{"id":"https://openalex.org/keywords/device-file","display_name":"Device file","score":0.260944128036499},{"id":"https://openalex.org/keywords/transfer","display_name":"Transfer (computing)","score":0.2586250603199005},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.24544551968574524},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.1789812445640564},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.14123037457466125},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.14042586088180542}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8760277032852173},{"id":"https://openalex.org/C88520388","wikidata":"https://www.wikidata.org/wiki/Q1126823","display_name":"SSH File Transfer Protocol","level":4,"score":0.684056282043457},{"id":"https://openalex.org/C2779965156","wikidata":"https://www.wikidata.org/wiki/Q5227350","display_name":"Data sharing","level":3,"score":0.6358963847160339},{"id":"https://openalex.org/C551386961","wikidata":"https://www.wikidata.org/wiki/Q22666","display_name":"File sharing","level":3,"score":0.6245610117912292},{"id":"https://openalex.org/C2779182362","wikidata":"https://www.wikidata.org/wiki/Q17126187","display_name":"Session (web analytics)","level":2,"score":0.5784811973571777},{"id":"https://openalex.org/C40350719","wikidata":"https://www.wikidata.org/wiki/Q2451637","display_name":"Torrent file","level":4,"score":0.5682733058929443},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.46008753776550293},{"id":"https://openalex.org/C2776162994","wikidata":"https://www.wikidata.org/wiki/Q534400","display_name":"File transfer","level":3,"score":0.4505133032798767},{"id":"https://openalex.org/C18396474","wikidata":"https://www.wikidata.org/wiki/Q2465888","display_name":"Secure multi-party computation","level":3,"score":0.4374489188194275},{"id":"https://openalex.org/C2777735758","wikidata":"https://www.wikidata.org/wiki/Q817765","display_name":"Path (computing)","level":2,"score":0.4198702573776245},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4121946096420288},{"id":"https://openalex.org/C82820731","wikidata":"https://www.wikidata.org/wiki/Q2640620","display_name":"Self-certifying File System","level":3,"score":0.39674314856529236},{"id":"https://openalex.org/C95637964","wikidata":"https://www.wikidata.org/wiki/Q82753","display_name":"Computer file","level":2,"score":0.38252612948417664},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3416728079319},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.2823362648487091},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2800370752811432},{"id":"https://openalex.org/C193769178","wikidata":"https://www.wikidata.org/wiki/Q14679","display_name":"Device file","level":3,"score":0.260944128036499},{"id":"https://openalex.org/C2776175482","wikidata":"https://www.wikidata.org/wiki/Q1195816","display_name":"Transfer (computing)","level":2,"score":0.2586250603199005},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.24544551968574524},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.1789812445640564},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.14123037457466125},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.14042586088180542},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/wocn.2012.6335528","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wocn.2012.6335528","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 Ninth International Conference on Wireless and Optical Communications Networks (WOCN)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W1482263867","https://openalex.org/W1707548898","https://openalex.org/W1976101464","https://openalex.org/W2083588504","https://openalex.org/W2095576022","https://openalex.org/W2096688003","https://openalex.org/W2102405223","https://openalex.org/W2112022568","https://openalex.org/W2118944554","https://openalex.org/W2119672920","https://openalex.org/W6628964955","https://openalex.org/W6637552820"],"related_works":["https://openalex.org/W2342627122","https://openalex.org/W2069148770","https://openalex.org/W2622848439","https://openalex.org/W4320083224","https://openalex.org/W1572832495","https://openalex.org/W97853359","https://openalex.org/W1519208733","https://openalex.org/W4293083093","https://openalex.org/W2584121914","https://openalex.org/W2354260768"],"abstract_inverted_index":{"Many":[0],"techniques":[1],"have":[2],"been":[3,32],"presented":[4,90],"earlier":[5],"to":[6,61,126,149,255],"share":[7,180],"the":[8,15,19,39,85,101,119,122,147,159,163,195,199,204,223,226,233,238],"data":[9,23,30,40,183,189],"online":[10,69,80],"with":[11,141,177,190,202,209,244],"privacy":[12,20,102,187,196],"terms.":[13],"But":[14],"downside":[16],"is":[17,24,55,207],"that":[18,237],"preservation":[21],"of":[22,29,103,121,188,198,215,220,225,232],"unreliable":[25],"when":[26],"large":[27],"set":[28],"has":[31],"shared.":[33],"The":[34,167,230],"previous":[35],"work":[36,89],"describes":[37],"only":[38],"sharing":[41,66,78,93,129,173,242,252],"process":[42],"in":[43,70,81,87,131,171,175,213,250],"a":[44,71,76,82,132],"secure":[45,72],"manner":[46],"using":[47,96,138],"session":[48,164],"based":[49,117],"secured":[50,133],"multiparty":[51,139],"combination":[52],"and":[53,157,162,222],"there":[54],"none":[56],"other":[57],"reliable":[58,83],"approach":[59,79,174],"yet":[60],"be":[62,110,136,150],"defined":[63],"for":[64,113,152,228,259],"file":[65,77,92,114,128,172,227,241,251],"concepts":[67,253],"through":[68],"manner.":[73],"To":[74,193],"present":[75],"manner,":[84],"proposal":[86],"this":[88],"collaborative":[91,240,260],"(CFS)":[94],"mechanism":[95,130,246],"Anchor":[97,106],"technique":[98,107],"by":[99],"preserving":[100],"data.":[104,261],"An":[105],"(AT)":[108],"will":[109,135],"used":[111],"here":[112],"partitioning":[115],"schemes":[116],"on":[118],"location":[120],"file.":[123],"In":[124],"addition":[125],"this,":[127],"way":[134],"handled":[137],"computation":[140],"association":[142],"rule":[143],"mining":[144],"which":[145],"allows":[146],"files":[148],"shared":[151],"more":[153],"than":[154],"one":[155],"user":[156,211],"reduces":[158],"adversary":[160],"attack":[161],"overhead":[165],"problem.":[166],"parties":[168],"whoever":[169],"involved":[170],"CFS":[176,201],"AT":[178],"can":[179],"their":[181,186],"valid":[182],"without":[184],"disclosing":[185],"each":[191],"other.":[192],"evaluate":[194],"performance":[197],"proposed":[200,239],"AT,":[203],"experimental":[205],"evaluation":[206],"done":[208],"several":[210],"clients":[212],"terms":[214],"communication":[216],"key":[217],"round,":[218],"number":[219],"participants":[221],"size":[224],"exchange.":[229],"outcome":[231],"experiment":[234],"clearly":[235],"shows":[236],"(CFS":[243],"AT)":[245],"provides":[247],"better":[248],"improvement":[249],"contrast":[254],"an":[256],"existing":[257],"SMC":[258]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
