Privacy preserving data mining – past and present

被引:2
|
作者
Kumar G.S. [1 ]
Premalatha K. [2 ]
机构
[1] Department of Computer Science and Engineering, Sri Krishna College of Engineering and Technology, Tamil Nadu, Coimbatore
[2] Department of Computer Science and Engineering, Bannari Amman Institute of Technology, Tamil Nadu, Erode
关键词
data mining; PPDM; privacy preserving data mining; privacy preserving techniques; privacy threats; sensitive attributes;
D O I
10.1504/IJBIDM.2022.124844
中图分类号
学科分类号
摘要
Data mining is the process of discovering patterns and correlations within the huge volume of data to forecast the outcomes. There are serious challenges occurring in data mining techniques due to privacy violation and sensitive information disclosure while providing the dataset to third parties. It is necessary to protect user’s private and sensitive data from exposure without the authorisation of data holders or providers when extracting useful information and revealing patterns from the dataset. Also, internet phishing gives more threat over the web on extensive spread of private information. Privacy preserving data mining (PPDM) is an essential for exchanging confidential information in terms of data analysis, validation, and publishing. To achieve data privacy, a number of algorithms have been designed in the data mining sector. This article delivers a broad survey on privacy preserving data mining algorithms, different datasets used in the research and analyses the techniques based on certain parameters. The survey is highlighted by identifying the outcome of each research along with its advantages and disadvantages. This survey will guide the future research in PPDM to choose the appropriate techniques for their research. Copyright © 2022 Inderscience Enterprises Ltd.
引用
收藏
页码:149 / 170
页数:21
相关论文
共 50 条
  • [1] Privacy-preserving data mining: Past, present, and future
    Ashrafi, Mafruz Zaman
    Taniar, David
    [J]. IEEE INTELLIGENT SYSTEMS, 2007, 22 (04) : 86 - 87
  • [2] Privacy preserving data mining
    Lindell, Y
    Pinkas, B
    [J]. JOURNAL OF CRYPTOLOGY, 2002, 15 (03) : 177 - 206
  • [3] Privacy Preserving Data Mining
    [J]. Journal of Cryptology, 2002, 15 : 177 - 206
  • [4] Privacy preserving data mining
    Lindell, Y
    Pinkas, B
    [J]. ADVANCES IN CRYPTOLOGY-CRYPTO 2000, PROCEEDINGS, 2000, 1880 : 36 - 54
  • [5] Quantifying privacy for privacy preserving data mining
    Zhan, Justin
    [J]. 2007 IEEE SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DATA MINING, VOLS 1 AND 2, 2007, : 630 - 636
  • [6] Privacy-preserving data mining
    Agrawal, R
    Srikant, R
    [J]. SIGMOD RECORD, 2000, 29 (02) : 439 - 450
  • [7] Research on Privacy Preserving Data Mining
    Wang, Pingshui
    Wang, Jiandong
    Zhu, Xinfeng
    Jiang, Jian
    [J]. 2010 INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT (CCCM2010), VOL I, 2010, : 172 - 175
  • [8] Privacy Preserving Data Mining by Cyptography
    Sharma, Anand
    Ojha, Vibha
    [J]. RECENT TRENDS IN NETWORK SECURITY AND APPLICATIONS, 2010, 89 : 576 - +
  • [9] A Survey on Privacy Preserving Data Mining
    Wang, Jian
    Luo, Yongcheng
    Zhao, Yan
    Le, Jianjin
    [J]. FIRST INTERNATIONAL WORKSHOP ON DATABASE TECHNOLOGY AND APPLICATIONS, PROCEEDINGS, 2009, : 111 - 114
  • [10] On data distortion for privacy preserving data mining
    Kabir, Saif M. A.
    Youssef, Amr M.
    Elhakeem, Ahmed K.
    [J]. 2007 CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1-3, 2007, : 308 - 311