A Survey on Privacy Preserving Mining Implementing Techniques

被引:0
|
作者
Vishwakarma, Bhavna [1 ]
Gupta, Huma [1 ]
Manoria, Manish [1 ]
机构
[1] TRUBA Inst Engg & IT, Dept Comp Sci & Engn, Bhopal, India
关键词
Aggregation; Association Rule Mining; Data Perturbation; Data Swapping; Privacy Preserving Mining;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The large aggregated data to be extracted is stored on the various servers for the effortless and rapid access. Information retrieval from this huge amount of competent data plays crucial role in data mining. But this excerption leads to harm individual privacy of the users, community, etc. So it is required to provide privacy for the sensitive records from the data miners. This paper focus on various approaches implement by the miners for preserving of information at individual level, class level, etc. A detail description with limitation and strength of different techniques of privacy preserving is explained. This paper explicates different evaluation parameters for the analysis of the preserved dataset.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] Privacy Preserving Data Mining Techniques-Survey
    Dhanalakshmi, M.
    Sankari, Siva E.
    [J]. 2014 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2014,
  • [2] A Survey on Privacy Preserving Data Mining Approaches and Techniques
    Siraj, Maheyzah Md
    Rahmat, Nurul Adibah
    Din, Mazura Mat
    [J]. 2019 8TH INTERNATIONAL CONFERENCE ON SOFTWARE AND COMPUTER APPLICATIONS (ICSCA 2019), 2019, : 65 - 69
  • [3] Survey on privacy preserving data mining techniques in health care databases
    Gal, Tamas Zoltan
    Kovacs, Gabor
    Kardkovacs, Zsolt T.
    [J]. ACTA UNIVERSITATIS SAPIENTIAE INFORMATICA, 2014, 6 (01) : 33 - 55
  • [4] Privacy Preserving Utility Mining: A Survey
    Gan, Wensheng
    Chun-Wei, Jerry
    Chao, Han-Chieh
    Wang, Shyue-Liang
    Yu, Philip S.
    [J]. 2018 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2018, : 2617 - 2626
  • [5] A Survey on Privacy Preserving Data Mining
    Wang, Jian
    Luo, Yongcheng
    Zhao, Yan
    Le, Jianjin
    [J]. FIRST INTERNATIONAL WORKSHOP ON DATABASE TECHNOLOGY AND APPLICATIONS, PROCEEDINGS, 2009, : 111 - 114
  • [6] A Survey on Privacy Preserving Data Mining
    Saranya, K.
    Premalatha, K.
    Rajasekar, S. S.
    [J]. 2015 2ND INTERNATIONAL CONFERENCE ON ELECTRONICS AND COMMUNICATION SYSTEMS (ICECS), 2015, : 1740 - U2102
  • [7] Survey of Anonymity Techniques for Privacy Preserving
    Luo Yongcheng
    Le Jiajin
    Wang Jian
    [J]. COMPUTING, COMMUNICATION, AND CONTROL, 2011, 1 : 248 - 252
  • [8] Privacy Preserving Techniques For Storage Privacy Attacks:A Survey
    Pawar, Tejaswini
    Kamalapur, Snehal
    [J]. 2012 12TH INTERNATIONAL CONFERENCE ON HYBRID INTELLIGENT SYSTEMS (HIS), 2012, : 283 - 287
  • [9] Privacy Preserving Data Mining Survey of Classifications
    Aghasi, Mahdi
    Oskouei, Rozita Jamili
    [J]. SOFT COMPUTING APPLICATIONS, (SOFA 2014), VOL 1, 2016, 356 : 637 - 649
  • [10] A Survey on Privacy Preserving Association Rule Mining
    Zhang, Lili
    Niu, Danmei
    Li, Yuxiang
    Zhang, Zhiyong
    [J]. 2018 5TH INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND CONTROL ENGINEERING (ICISCE 2018), 2018, : 93 - 97