A Survey on Privacy Preserving Mining Implementing Techniques

被引:0
|
作者
Vishwakarma, Bhavna [1 ]
Gupta, Huma [1 ]
Manoria, Manish [1 ]
机构
[1] TRUBA Inst Engg & IT, Dept Comp Sci & Engn, Bhopal, India
关键词
Aggregation; Association Rule Mining; Data Perturbation; Data Swapping; Privacy Preserving Mining;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The large aggregated data to be extracted is stored on the various servers for the effortless and rapid access. Information retrieval from this huge amount of competent data plays crucial role in data mining. But this excerption leads to harm individual privacy of the users, community, etc. So it is required to provide privacy for the sensitive records from the data miners. This paper focus on various approaches implement by the miners for preserving of information at individual level, class level, etc. A detail description with limitation and strength of different techniques of privacy preserving is explained. This paper explicates different evaluation parameters for the analysis of the preserved dataset.
引用
收藏
页数:5
相关论文
共 50 条
  • [41] Multiple-Published Tables Privacy-Preserving Data Mining: A Survey for Multiple-Published Tables Techniques
    Hussein, Abou El Ela Abdo
    Darwish, Nagy Ramadan
    Hefny, Hesham A.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2015, 6 (06) : 80 - 85
  • [42] A survey of graph-modification techniques for privacy-preserving on networks
    Jordi Casas-Roma
    Jordi Herrera-Joancomartí
    Vicenç Torra
    Artificial Intelligence Review, 2017, 47 : 341 - 366
  • [43] An Exploration to Location Based Service and Its Privacy Preserving Techniques: A Survey
    Gupta, Ruchika
    Rao, Udai Pratap
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 96 (02) : 1973 - 2007
  • [44] An Exploration to Location Based Service and Its Privacy Preserving Techniques: A Survey
    Ruchika Gupta
    Udai Pratap Rao
    Wireless Personal Communications, 2017, 96 : 1973 - 2007
  • [45] Privacy-Preserving Techniques in Social Distancing Applications: A Comprehensive Survey
    Alrawais, Arwa
    Alharbi, Fatemah
    Almoteri, Moteeb
    Altamimi, Beshayr
    Alnafisah, Hessa
    Aljumeiah, Nourah
    JOURNAL OF ADVANCED COMPUTATIONAL INTELLIGENCE AND INTELLIGENT INFORMATICS, 2022, 26 (03) : 325 - 341
  • [46] A Comprehensive Survey on Privacy-Preserving Techniques in Federated Recommendation Systems
    Asad, Muhammad
    Shaukat, Saima
    Javanmardi, Ehsan
    Nakazato, Jin
    Tsukada, Manabu
    APPLIED SCIENCES-BASEL, 2023, 13 (10):
  • [47] A Survey on Auditing Techniques Used for Preserving Privacy of Data Stored on Cloud
    Sawant, N. M.
    Mane, N. S.
    Pottigar, V. V.
    2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, AND OPTIMIZATION TECHNIQUES (ICEEOT), 2016, : 1320 - 1323
  • [48] A survey of graph-modification techniques for privacy-preserving on networks
    Casas-Roma, Jordi
    Herrera-Joancomarti, Jordi
    Torra, Vicenc
    ARTIFICIAL INTELLIGENCE REVIEW, 2017, 47 (03) : 341 - 366
  • [49] Random-data perturbation techniques and privacy-preserving data mining
    Kargupta, H
    Datta, S
    Wang, Q
    Sivakumar, K
    KNOWLEDGE AND INFORMATION SYSTEMS, 2005, 7 (04) : 387 - 414
  • [50] Data transformation techniques for preserving privacy in distance-based mining algorithms
    Kadampur, Mohammad Ali
    Somayajulu, D. V. L. N.
    INTERNATIONAL JOURNAL OF DATA MINING MODELLING AND MANAGEMENT, 2014, 6 (03) : 285 - 311