A Review on Privacy Preservation in Data Mining

Authors

  • Mahesh Dumbere  Department of Computer Science and Engineering, TGPCET, Nagpur, Maharashtra, India
  • Roshani Talmale  Department of Computer Science and Engineering, TGPCET, Nagpur, Maharashtra, India

Keywords:

Data Mining, Privacy Preserving, Anonymization

Abstract

The main focus of privacy preserving data publishing was to enhance traditional data mining techniques for masking sensitive information through data modification. The major issues were how to modify the data and how to recover the data mining result from the altered data. The reports were often tightly coupled with the data mining algorithms under consideration. Privacy preserving data publishing focuses on techniques for publishing data, not techniques for data mining. In case, it is expected that standard data mining techniques are applied on the published data. Anonymization of the data is done by hiding the identity of record owners, whereas privacy preserving data mining seeks to directly belie the sensitive data. This survey carries out the various privacy preservation techniques and algorithms.

References

  1. Tamir Tassa and Dror J. Cohen”Anonymization Of Centralized And Distributed Social Networks By Sequential Clustering”, IEEE Transactions On Knowledge And Data Engineering, Vol. 25, No. 2, February 2013.
  2. Keng-Pei Lin and Ming-Syan Chen, “On The Design And Analysis Of The Privacy-Preserving SVM Classifier”, IEEE Transactions On Knowledge And Data Engineering, Vol. 23, No. 11, November 2011.
  3. Haoliang Lou, Yunlong Ma, Feng Zhang, Min Liu, Weiming Shen “Data Mining For Privacy Preserving Association Rules Based On Improved Mask Algorithm” ,Proceedings Of The 2014 IEEE 18th International Conference On Computer Supported Cooperative Work In Design.
  4. Shuguo Han, Wee Keong Ng, Li Wan, and Vincent C.S. Lee “Privacy-Preserving Gradient-Descent Methods” IEEE Transactions On Knowledge And Data Engineering, Vol. 22, No. 6, June 2010.
  5. Sai Wu, Xiaoli Wang, Sheng Wang, Zhenjie Zhang, And Anthony K.H. Tung “K-Anonymity For Crowdsourcing Database”, IEEE Transactions On Knowledge And Data Engineering, Vol. 26, No. 9, September 2014.
  6. Pui K. Fong And Jens H. Weber-Jahnke, “Privacy Preserving Decision Tree Learningusing Unrealized Data Sets”, IEEE Transactions On Knowledge And Data Engineering, Vol. 24, No. 2, February 2012.
  7. Stylianos Gisdakis, Vasileios Manolopoulos, Sha Tao, Ana Rusu, And Panagiotis Papadimitratos, “Secure And Privacy-Preserving Smartphone-Based Traffic Information Systems”,IEEE Transactions On Intelligent Transportation Systems, Vol. 16, No. 3, June 2015.
  8. Kinjal Parmar1, Vinita Shah2, “A Review On Data Anonymization In Privacy Preserving Data Mining”, International Journal Of Advanced Research In Computer And Communication Engineering, Vol. 5, Issue 2, February 2016.
  9. Kumaraswamy S?, Manjula S H?, K R Venugopal? And L M Patnaik? “A Data Mining Perspective In Privacy Preserving Data Mining Systems”,International Journal Of Current Engineering And
  10. Technology India ,Accepted 20 March 2014, Available Online 01 April 2014, Vol.4, No.2 (April 2014)
  11. Jordi Soria-Comas, Josep Domingo-Ferrer, David Sanchez And Sergio Mart?nez “T-Closeness Through Microaggregation: Strict Privacy With Enhanced Utility Preservation “,IEEE Transactions On Knowledge And Data Engineering, Vol. 27, No. 11, November 2015 .
  12. Jung Yeon Hwang, Liqun Chen, Hyun Sook Cho, And Daehun Nyang”Short Dynamic Group Signature Scheme Supporting Controllable Linkability “,IEEE Transactions On Information Forensics And Security, Vol. 10, No. 6, June 2015.
  13. Murat Kantarcioglu and Wei Jiang“Incentive Compatible Privacy-Preserving Data Analysis”, IEEE Transactions On Knowledge And Data Engineering, Vol. 25, No. 6, June 2013.
  14. Lei Xu, Chunxiao Jiang, Yan Chen, Yong Ren, And K. J. Ray Liu, “Privacy Or Utility In Data Collection?A Contract Theoretic Approach” ,IEEE Journal Of Selected Topics In Signal Processing, Vol. 9, No. 7, October 2015. 
  15. Huang Lin and Yuguang Fang “Privacy-Aware Profiling And Statistical Data Extraction For Smart Sustainable Energy Systems”, IEEE Transactions On Smart Grid, Vol. 4, No. 1, March 2013. 
  16. Depeng Li, Zeyar Aung, John Williams, and Abel Sanchez “P3: Privacy Preservation Protocol For Automatic appliance Control Application In Smart Grid”, IEEE Internet Of Things Journal, Vol. 1, No. 5, October 2014.
  17. Fudong Qi, Ieee, Fan Wu, Guihai Chen, “Privacy And Quality Preserving Multimedia Data Aggregation For Participatory Sensing Systems”,IEEE Internet Of Things Journal, Vol. 1, No. 5, October 2014.
  18. Günther Eibl, And Dominik Engel, “Influence Of Data Granularity On Smart Meter Privacy”, IEEE Transactions On Smart Grid, Vol. 6, No. 2, March 2015. 
  19. Fosca Giannotti, Laks V. S. Lakshmanan, Anna Monreale, Dino Pedreschi, And Hui (Wendy) Wang “Privacy-Preserving Mining Of Association Rules From Outsourced Transaction Databases”, IEEE Systems Journal, Vol. 7, No. 3, September 2013. 
  20. Siyuan Liu, Qiang Qu, Lei Chen, And Lionel M. Ni, “SMC: A Practical Schema For PrivacyPreserved Data Sharing Over Distributed Data Streams”, IEEE Transactions On Big Data, Vol. 1, No. 2, April-June 2015. 
  21. Kanishka Bhaduri, Mark D. Stefanski, and Ashok N. Srivastava, “Privacy-Preserving Outlier Detection Through Random Nonlinear Data Distortion”, IEEE Transactions On Systems, Man, And Cybernetics—Part B: Cybernetics, Vol. 41, No. 1, February 2011

Downloads

Published

2018-02-28

Issue

Section

Research Articles

How to Cite

[1]
Mahesh Dumbere, Roshani Talmale, " A Review on Privacy Preservation in Data Mining, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 4, Issue 6, pp.215 -221, January-February-2018.