Open Access Open Access  Restricted Access Subscription or Fee Access

Survey on Privacy Preserving Data Mining

N. Selvakumar, M.C.S Geetha

Abstract


Privacy preserving data mining deals with hiding a person’s sensitive identity without sacrificing the usability of data. It has become a very significant area of concern but still this branch of research is in its immaturity. People today have become conscious of the privacy intrusions of their sensitive data and are very disinclined to share their information. The major area of concern is that non-sensitive data even may deliver sensitive information, including personal information, facts or patterns. Several techniques of privacy preserving data mining have been anticipated in literature. In this paper, we have considered all these state of art techniques. A tabular relationship of work done by different authors is presented. In our future work we will work on a mixture of these techniques to preserve the privacy of sensitive data.


Keywords


Data Mining, Privacy Preserving Data Mining, Data Perturbation, Blocking Based Technique, Privacy Preserving Techniques.

Full Text:

PDF

References


J. Han and M. Kamber, “Data Mining: Concepts and Techniques”, 2nd ed.,The Morgan Kaufmann Series in Data Management Systems, Jim Gray, Series Editor 2006.

The free dictionary.Homepage on Privacy [Online].Available: http://www.thefreedictionary.com/privacy.

M. B. Malik, M. A. Ghazi and R. Ali, “Privacy Preserving Data Mining Techniques: Current Scenario and Future Prospects”, in proceedings of Third International Conference on Computer and Communication Technology, IEEE 2012.

M. Prakash, G. Singaravel, “A New Model for Privacy Preserving Sensitive Data Mining”, in proceedings of ICCCNT Coimbatore, India, IEEE 2012.

J. Liu, J. Luo and J. Z. Huang, “Rating: Privacy Preservation for Multiple Attributes with Different Sensitivity requirements”, in proceedings of 11th IEEE International Conference on Data Mining Workshops, IEEE 2011.

H. Kargupta and S. Datta, Q. Wang and K. Sivakumar, “On the Privacy Preserving Properties of Random Data Perturbation Techniques”, in proceedings of the Third IEEE International Conference on Data Mining, IEEE 2003.

S. Lohiya and L. Ragha, “Privacy Preserving in Data Mining Using Hybrid Approach”, in proceedings of 2012 Fourth International Conference on Computational Intelligence and Communication Networks, IEEE 2012.

R. Agrawal and A. Srikant, “Privacy-preserving data mining”, in proceedings of SIGMOD00, pp. 439-450.

Evfimievski, A.Srikant, R.Agrawal, and Gehrke , “Privacy preserving mining of association rules”, in proceedings of KDD02, pp. 217-228.

T. Jahan, G.Narsimha and C.V Guru Rao, “Data Perturbation and Features Selection in Preserving Privacy” in proceedings of 978- 1-4673-1989-8/12, IEEE 2012.

A. Parmar, U. P. Rao, D. R. Patel, “Blocking based approach for classification Rule hiding to Preserve the Privacy in Database” , in proceedings of International Symposium on Computer Science and Society, IEEE 2011.

Y. Lindell, B.Pinkas, “Privacy preserving data mining”, in proceedings of Journal of Cryptology, 5(3), 2000.

C. Aggarwal , P.S. Yu, “A condensation approach to privacy preserving data mining”, in proceedings of International Conference on Extending Database Technology (EDBT), pp.183–199, 2004. 746

Slava Kisilevich, Lior Rokach, Yuval Elovici, Bracha Shapira, “Efficient Multi-Dimensional Suppression for K-Anonymity”, in proceedings of IEEE Transactions on Knowledge and Data Engineering, Vol. 22, No. 3. (March 2010), pp. 334-347, IEEE 2010.

P.Deivanai, J. Jesu Vedha Nayahi and V.Kavitha,” A Hybrid Data Anonymization integrated with Suppression for Preserving Privacy in mining multi-party data” in proceedings of International Conference on Recent Trends in Information Technology, IEEE 2011.

G. Mathew, Z. Obradovic,” A Privacy-Preserving Framework for Distributed Clinical Decision Support”, in proceedings of 978-1-61284-852-5/11/$26.00 ©2011 IEEE.

H.C. Huang, W.C. Fang, “Integrity Preservation and Privacy Protection for Medical Images with Histogram-Based Reversible Data Hiding”, in proceedings of 978-1-4577-0422-2/11/$26.00_c,IEEE 2011.

D.Karthikeswarant, V.M.Sudha, V.M.Suresh and A.J. Sultan, “A Pattern based framework for privacy preservation through Association rule Mining” in proceedings of International Conference On Advances In Engineering, Science And Management (ICAESM -2012), IEEE 2012.

J. Vaidya and C. Clifton, “Privacy preserving association rule mining in vertically partitioned data”, in The Eighth ACM SIGKDD International conference on Knowledge Discovery and Data Mining, Edmonton, Alberta, CA, July 2002, IEEE 2002.

Martin Beck and Michael Marh¨ofer,” Privacy-Preserving Data Mining Demonstrator”, in proceedings of 16th International Conference on Intelligence in Next Generation Networks, IEEE 2012.

M. N. Kumbhar and R. Kharat, “Privacy Preserving Mining of Association Rules on horizontally and Vertically Partitioned Data: A Review Paper”, in proceedings of 978-1-4673-5116- 4/12/$31.00_c, IEEE 2012.

Lin KW, Lo Y-C (2013) Efficient algorithms for frequent pattern mining in many-task computing environments. Knowl Based Syst 49:10–21

Yi X, Zhang Y (2013) Equally contributory privacy-preserving k-means clustering over vertically partitioned data. Inf Syst 38(1):97–107

Nergiz ME, Gök MZ (2014) Hybrid k-anonymity. Computer Security 44:51– 63. http://doi.org/10.1016/j.cose.2014.03.006

Zhang X, Liu C, Nepal S, Yang C, Dou W, Chen J (2014a) A hybrid approach for scalable sub-tree anonymization over big data using MapReduce on cloud. J Comput Syst Sci 80(5):1008–1020.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.