A Survey on Privacy Preserving Mining Implementing Techniques

被引:0
|
作者
Vishwakarma, Bhavna [1 ]
Gupta, Huma [1 ]
Manoria, Manish [1 ]
机构
[1] TRUBA Inst Engg & IT, Dept Comp Sci & Engn, Bhopal, India
关键词
Aggregation; Association Rule Mining; Data Perturbation; Data Swapping; Privacy Preserving Mining;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The large aggregated data to be extracted is stored on the various servers for the effortless and rapid access. Information retrieval from this huge amount of competent data plays crucial role in data mining. But this excerption leads to harm individual privacy of the users, community, etc. So it is required to provide privacy for the sensitive records from the data miners. This paper focus on various approaches implement by the miners for preserving of information at individual level, class level, etc. A detail description with limitation and strength of different techniques of privacy preserving is explained. This paper explicates different evaluation parameters for the analysis of the preserved dataset.
引用
收藏
页数:5
相关论文
共 50 条
  • [31] Privacy Preserving Data Mining Techniques: Current Scenario and Future Prospects
    Malik, Majid Bashir
    Ghazi, M. Asger
    Ali, Rashid
    2012 THIRD INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION TECHNOLOGY (ICCCT), 2012, : 26 - 32
  • [32] Association Rule Hiding Techniques for Privacy Preserving Data Mining: A Study
    Gayathiri, P.
    Poorna, B.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2015, 6 (12) : 236 - 242
  • [33] A model for Privacy Preserving in Data Mining using Soft Computing Techniques
    Malik, Majid Bashir
    Asger, M.
    Ali, Rashid
    Sarvar, Abid
    2015 2ND INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2015, : 181 - 186
  • [34] Contemporary Trends in Privacy Preserving Collaborative Data Mining- A Survey
    Shah, Alpa
    Gulati, Ravi
    2015 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, SIGNALS, COMMUNICATION AND OPTIMIZATION (EESCO), 2015,
  • [35] Survey on Privacy-Preserving and Other Security Issues in Data Mining
    Karthika, K.
    Priya, R. Devi
    Sathishkumar, S.
    INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES, ICICCT 2019, 2020, 89 : 849 - 858
  • [36] Privacy preserving data mining
    Lindell, Y
    Pinkas, B
    JOURNAL OF CRYPTOLOGY, 2002, 15 (03) : 177 - 206
  • [37] Privacy Preserving Data Mining
    Journal of Cryptology, 2002, 15 : 177 - 206
  • [38] Privacy preserving classification mining
    Department of Computing and Information Technology, Fudan University, Shanghai 200433, China
    Jisuanji Yanjiu yu Fazhan, 2006, 1 (39-45):
  • [39] Privacy preserving data mining
    Lindell, Y
    Pinkas, B
    ADVANCES IN CRYPTOLOGY-CRYPTO 2000, PROCEEDINGS, 2000, 1880 : 36 - 54
  • [40] Quantifying privacy for privacy preserving data mining
    Zhan, Justin
    2007 IEEE SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DATA MINING, VOLS 1 AND 2, 2007, : 630 - 636