Privacy Preserving Techniques For Storage Privacy Attacks:A Survey

被引:0
|
作者
Pawar, Tejaswini [1 ]
Kamalapur, Snehal [1 ]
机构
[1] KKWIEE & R, Dept Comp Engn, Nasik, India
关键词
Anonymization Method; Data Mining; Data Perturbation; Randomization Method; K-ANONYMITY;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Data mining is a process of extracting knowledge from large amount of data. In recent year privacy preserving data mining has been developed by research community working on knowledge modification and security. The collected data sample may be leaked while residing in storage or stolen anytime during the storing process. Hence protections of such data samples become increasingly important. In this paper we provide a review of preventing such attacks on third parties for the whole lifetime of the samples. We discuss different techniques like randomization method, anonymization method for preserving the privacy of storage data.
引用
收藏
页码:283 / 287
页数:5
相关论文
共 50 条
  • [1] Survey of Anonymity Techniques for Privacy Preserving
    Luo Yongcheng
    Le Jiajin
    Wang Jian
    [J]. COMPUTING, COMMUNICATION, AND CONTROL, 2011, 1 : 248 - 252
  • [2] Techniques for Privacy Preserving Data Sharing: A Survey
    Nivetha, P. R.
    Selvi, Thamarai K.
    [J]. 2014 INTERNATIONAL CONFERENCE ON GREEN COMPUTING COMMUNICATION AND ELECTRICAL ENGINEERING (ICGCCEE), 2014,
  • [3] Privacy Preserving Techniques for Big Data: A Survey
    Patel, Kajol
    Jethava, G. B.
    [J]. PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 194 - 199
  • [4] Survey on Privacy Preserving Techniques for Machine Learning
    Tan, Zuo-Wen
    Zhang, Lian-Fu
    [J]. Ruan Jian Xue Bao/Journal of Software, 2020, 31 (07): : 2127 - 2156
  • [5] A Survey on Privacy Preserving Mining Implementing Techniques
    Vishwakarma, Bhavna
    Gupta, Huma
    Manoria, Manish
    [J]. 2016 SYMPOSIUM ON COLOSSAL DATA ANALYSIS AND NETWORKING (CDAN), 2016,
  • [6] Privacy Preserving Data Mining Techniques-Survey
    Dhanalakshmi, M.
    Sankari, Siva E.
    [J]. 2014 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2014,
  • [7] Survey on Privacy-Preserving Techniques for Microdata Publication
    Carvalho, Tania
    Moniz, Nuno
    Faria, Pedro
    Antunes, Luis
    [J]. ACM COMPUTING SURVEYS, 2023, 55 (14S)
  • [8] A Survey on Privacy Preserving Data Mining Approaches and Techniques
    Siraj, Maheyzah Md
    Rahmat, Nurul Adibah
    Din, Mazura Mat
    [J]. 2019 8TH INTERNATIONAL CONFERENCE ON SOFTWARE AND COMPUTER APPLICATIONS (ICSCA 2019), 2019, : 65 - 69
  • [9] Salting as a Countermeasure against Attacks on Privacy Preserving Record Linkage Techniques
    Chen, Yanling
    Schnell, Rainer
    Armknecht, Frederik
    Heng, Youzhe
    [J]. HEALTHINF: PROCEEDINGS OF THE 15TH INTERNATIONAL JOINT CONFERENCE ON BIOMEDICAL ENGINEERING SYSTEMS AND TECHNOLOGIES - VOL 5: HEALTHINF, 2021, : 353 - 360
  • [10] A survey on privacy-preserving federated learning against poisoning attacks
    Xia, Feng
    Cheng, Wenhao
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (10): : 13565 - 13582