Techniques for Privacy Preserving Data Sharing: A Survey

被引:0
|
作者
Nivetha, P. R. [1 ]
Selvi, Thamarai K. [1 ]
机构
[1] Dr NGP Inst Technol, Dept Comp Sci & Engn, Coimbatore, Tamil Nadu, India
关键词
Privacy preserving; Sequential pattern mining and hiding; Anonymity; Data perturbation; Secure multi-party computation;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Data mining is a technique where massive amounts of both sensitive and non-sensitive data are collected and examined. While distributing such private data, privacy preserving becomes an important issue. Various methods and techniques have been introduced in privacy preserving data mining to undertake this problem. The main intention of privacy preserving is to extract the knowledge without disclosing private data and it also concerns about the sequential release of data. Sequential data helps in predicting the next occurrence which leads to violating the privacy of individual data. In this paper, we briefly surveyed sequential pattern hiding, k-anonymity, data perturbation and secure sum computation techniques to address the issues of privacy preserving data sharing.
引用
收藏
页数:1
相关论文
共 50 条
  • [1] Privacy Preserving Techniques for Big Data: A Survey
    Patel, Kajol
    Jethava, G. B.
    [J]. PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 194 - 199
  • [2] Privacy Preserving Data Mining Techniques-Survey
    Dhanalakshmi, M.
    Sankari, Siva E.
    [J]. 2014 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2014,
  • [3] A Survey on Privacy Preserving Data Mining Approaches and Techniques
    Siraj, Maheyzah Md
    Rahmat, Nurul Adibah
    Din, Mazura Mat
    [J]. 2019 8TH INTERNATIONAL CONFERENCE ON SOFTWARE AND COMPUTER APPLICATIONS (ICSCA 2019), 2019, : 65 - 69
  • [4] Privacy-preserving techniques of genomic data-a survey
    Al Aziz, Md Momin
    Sadat, Md Nazmus
    Alhadidi, Dima
    Wang, Shuang
    Jiang, Xiaoqian
    Brown, Cheryl L.
    Mohammed, Noman
    [J]. BRIEFINGS IN BIOINFORMATICS, 2019, 20 (03) : 887 - 895
  • [5] Survey on privacy preserving techniques for publishing social network data
    School of Information Science and Engineering, Northeastern University, Shenyang 110819, China
    [J]. Ruan Jian Xue Bao, 3 (576-590):
  • [6] A survey on genomic data by privacy-preserving techniques perspective
    Abinaya, B.
    Santhi, S.
    [J]. COMPUTATIONAL BIOLOGY AND CHEMISTRY, 2021, 93
  • [7] Data Security and Privacy Preserving Techniques for Wearable Devices: A Survey
    Liu, Qiang
    Li, Tong
    Yu, Yang
    Cai, Zhiping
    Zhou, Tongqing
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2018, 55 (01): : 14 - 29
  • [8] Anonymization Techniques for Privacy Preserving Data Publishing: A Comprehensive Survey
    Majeed, Abdul
    Lee, Sungchang
    [J]. IEEE ACCESS, 2021, 9 : 8512 - 8545
  • [9] Preserving Privacy While Sharing Data
    Garfinkel, Simson L.
    Bowen, Claire McKay
    [J]. MIT SLOAN MANAGEMENT REVIEW, 2022, 63 (04) : 7 - +
  • [10] Survey of Anonymity Techniques for Privacy Preserving
    Luo Yongcheng
    Le Jiajin
    Wang Jian
    [J]. COMPUTING, COMMUNICATION, AND CONTROL, 2011, 1 : 248 - 252