An Efficient Approach for Privacy Preserving in Data Mining

被引:0
|
作者
Sharma, Manish [1 ]
Chaudhary, Atul [2 ]
Mathuria, Manish [2 ]
Chaudhary, Shalini [1 ]
Kumar, Santosh [2 ]
机构
[1] Govt Engn Coll Ajmer, Dept Comp Engn, Ajmer, Rajasthan, India
[2] Govt Engn Coll Ajmer, Dept Informat Technol, Ajmer, Rajasthan, India
关键词
Data mining; Privacy preserving; Sensitive data; Randomization; K-; anonymity; Quasi-identifier;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In many organizations large amount of data are collected. These data are sometimes used by the organizations for data mining tasks. However, the data collected may contain private or sensitive information which should be protected. Privacy protection is an important issue if we release data for the mining or sharing purpose. Privacy preserving data mining techniques allow publishing data for the mining purpose while at the same time preserve the private information of the individuals. Many techniques have been proposed for privacy preservation but they suffer from various types of attacks and information loss. In this paper we proposed an efficient approach for privacy preservation in data mining. Our technique protects the sensitive data with less information loss which increase data usability and also prevent the sensitive data for various types of attack. Data can also be reconstructed using our proposed technique.
引用
收藏
页码:244 / 249
页数:6
相关论文
共 50 条
  • [1] Condensation approach to privacy preserving data mining
    Aggarwal, CC
    Yu, PS
    [J]. ADVANCES IN DATABASE TECHNOLOGY - EDBT 2004, PROCEEDINGS, 2004, 2992 : 183 - 199
  • [2] A DCT-based privacy-preserving approach for efficient data mining
    Tian, Feng
    Gui, Xiaolin
    An, Jian
    Yang, Pan
    Zhang, Xuejun
    Zhao, Jianqiang
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 3641 - 3652
  • [3] Efficient method in association rule hiding for privacy preserving with data mining approach
    Praveena, Kurapati
    Sirisha, Gudla
    Babu, Satukumati Suresh
    Rao, Panchala Sambasiva
    [J]. Ingenierie des Systemes d'Information, 2019, 24 (01): : 47 - 50
  • [4] A proposed hybrid approach for Privacy Preserving Data Mining
    Kaur, Arshveer
    Sofat, Sanjeev
    [J]. 2016 INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT), VOL 1, 2016, : 280 - 285
  • [5] A Novel Approach for Horizontal Privacy Preserving Data Mining
    Jalla, Hanumantha Rao
    Girija, P. N.
    [J]. INFORMATION SYSTEMS DESIGN AND INTELLIGENT APPLICATIONS, VOL 2, INDIA 2016, 2016, 434 : 101 - 111
  • [6] Efficient data perturbation for privacy preserving and accurate data stream mining
    Chamikara, M. A. P.
    Bertok, P.
    Liu, D.
    Camtepe, S.
    Khalil, I
    [J]. PERVASIVE AND MOBILE COMPUTING, 2018, 48 : 1 - 19
  • [7] Efficient paillier cryptoprocessor for privacy-preserving data mining
    San, Ismail
    At, Nuray
    Yakut, Ibrahim
    Polat, Huseyin
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (11) : 1535 - 1546
  • [8] Privacy preserving data mining
    Lindell, Y
    Pinkas, B
    [J]. JOURNAL OF CRYPTOLOGY, 2002, 15 (03) : 177 - 206
  • [9] Privacy Preserving Data Mining
    [J]. Journal of Cryptology, 2002, 15 : 177 - 206
  • [10] Efficient Privacy-Preserving Data Mining in Malicious Model
    Emura, Keita
    Miyaji, Atsuko
    Rahman, Mohammad Shahriar
    [J]. ADVANCED DATA MINING AND APPLICATIONS, ADMA 2010, PT I, 2010, 6440 : 370 - 382