A Survey : Privacy Preservation Data Mining Techniques and Geometric Transformation
Keywords:
Data Mining, Privacy Preserving, Privacy Preserving Data Mining Techniques.Abstract
What is Privacy Preserving Data Mining is the process of hiding and protecting sensitive data of individuals. In the recent era, we use many applications which require personal sensitive data of individuals. Thus, people are more concern about sharing their personal sensitive information due to increase of privacy intrusions. Since last two decades many Privacy Preserving Data Mining techniques are used today. In this paper, we present a detail comparative study of various Privacy Preserving Data mining techniques and their pros and cons.
References
- J. Han and M. Kamber, “Data Mining: Concepts and Techniques”, 2nd edition.
- M. B. Malik, M. A. Ghazi and R. Ali, “Privacy Preserving Data Mining Techniques: Current Scenario and Future Prospects”, in proceedings of Third International Conference on Computer and Communication Technology, IEEE 2012.
- H. Kargupta and S. Datta, Q. Wang and K.
- Sivakumar, “The Privacy Preserving Properties of Random Data Perturbation Techniques”, in proceedings of the Third International Conference on Data Mining, IEEE 2003.
- T. Jahan, G.Narsimha and C.V Guru Rao, “Data Perturbation and Features Selection in Preserving Privacy” in proceedings of 978-1-4673-1989-8/12, IEEE 2012.
- Y. Lindell, B.Pinkas, “Privacy Preserving Data mining”, in proceedings of Journal of Cryptology, 5(3), 2000.
- A. Parmar, U. P. Rao, D. R. Patel, “Blocking-Based Approach for Classification Rule hiding to Preserve the Privacy in Database”, in proceedings of International Symposium on Computer Science and Society, IEEE 2011.
- C. Aggarwal , P.S. Yu, “A Condensation Approach to Privacy Preserving Data mining”, in proceedings of International Conference on Extending Database Technology (EDBT), pp. 183–199, 2004.
- S. Lohiya and L. Ragha, “Privacy Preserving in Data Mining using Hybrid Approach”, in proceedings of Fourth International Conference on Computational Intelligence and Communication Networks, IEEE 2012.
- P.Deivanai, J. J. Nayahi and V.Kavitha,” A Hybrid Data Anonymization integrated with Suppression for Preserving Privacy in mining Multi-Party Data” in proceedings of International Conference on Recent Trends in Information Tech
Downloads
Published
Issue
Section
License
Copyright (c) IJSRSET
This work is licensed under a Creative Commons Attribution 4.0 International License.