ANONYMOUS ENCRYPTED DATA
1 Assignment
0 Petitions
Accused Products
Abstract
Techniques facilitating autonomously rendering an encrypted data anonymous in a non-trusted environment are provided. In one example, a computer-implemented method can comprise generating, by a system operatively coupled to a processor, a plurality of clusters of encrypted data from an encrypted dataset using a machine learning algorithm. The computer-implemented method can also comprise modifying, by the system, the plurality of clusters based on a defined criterion that can facilitate anonymity of the encrypted data.
-
Citations
20 Claims
-
1-10. -10. (canceled)
-
11. A system, comprising:
-
a memory that stores computer executable components; a processor, operably coupled to the memory, and that executes the computer executable components stored in the memory, wherein the computer executable components comprise; a clustering component that generates a plurality of clusters of encrypted data from an encrypted dataset using a machine learning algorithm; and a modifying component that modifies the plurality of clusters based on a defined criterion that facilitates anonymity of the encrypted data. - View Dependent Claims (12, 13, 14, 15, 16, 17)
-
-
18. A computer program product facilitating rendering an encrypted dataset anonymous, the computer program product comprising a computer readable storage medium having program instructions embodied therewith, the program instructions executable by a processor to cause the processor to:
-
generate a plurality of clusters of encrypted data from the encrypted dataset using a machine learning algorithm; and modify the plurality of clusters based on a defined criterion that facilitates anonymity of the encrypted data. - View Dependent Claims (19, 20)
-
Specification