A comprehensive review on privacy preserving data mining

被引:59
|
作者
Aldeen, Yousra Abdul Alsahib S. [1 ,2 ]
Salleh, Mazleena [1 ]
Razzaque, Mohammad Abdur [1 ]
机构
[1] Univ Technol Malaysia, Fac Comp, Utm Skudai 81310, Johor, Malaysia
[2] Univ Baghdad, Dept Comp Sci, Coll Educ, Baghdad, Iraq
来源
SPRINGERPLUS | 2015年 / 4卷
关键词
Privacy preserving; Data mining; Distortion; Association; Classification; Clustering; Outsourcing; K-anonymity; ASSOCIATION RULES; K-ANONYMITY; SECURE; PRESERVATION;
D O I
10.1186/s40064-015-1481-x
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Preservation of privacy in data mining has emerged as an absolute prerequisite for exchanging confidential information in terms of data analysis, validation, and publishing. Ever-escalating internet phishing posed severe threat on widespread propagation of sensitive information over the web. Conversely, the dubious feelings and contentions mediated unwillingness of various information providers towards the reliability protection of data from disclosure often results utter rejection in data sharing or incorrect information sharing. This article provides a panoramic overview on new perspective and systematic interpretation of a list published literatures via their meticulous organization in subcategories. The fundamental notions of the existing privacy preserving data mining methods, their merits, and shortcomings are presented. The current privacy preserving data mining techniques are classified based on distortion, association rule, hide association rule, taxonomy, clustering, associative classification, outsourced data mining, distributed, and k-anonymity, where their notable advantages and disadvantages are emphasized. This careful scrutiny reveals the past development, present research challenges, future trends, the gaps and weaknesses. Further significant enhancements for more robust privacy protection and preservation are affirmed to be mandatory.
引用
收藏
页码:1 / 36
页数:36
相关论文
共 50 条
  • [1] A Review on Privacy Preserving Data Mining
    Shanthi, A. S.
    Karthikeyan, M.
    2012 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC), 2012, : 438 - 441
  • [2] A Comprehensive Assessment of Privacy Preserving Data Mining Techniques
    Prasanthi, Kundeti Naga
    Rao, M. V. P. Chandra Sekhara
    PROCEEDINGS OF SECOND INTERNATIONAL CONFERENCE ON SUSTAINABLE EXPERT SYSTEMS (ICSES 2021), 2022, 351 : 833 - 842
  • [3] A Review on Privacy-Preserving Data Mining
    Li, Xueyun
    Yan, Zheng
    Zhang, Peng
    2014 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY (CIT), 2014, : 769 - 774
  • [4] Classification and Evaluation of Privacy Preserving Data Mining: A Review
    Senosi, Aobakwe
    Sibiya, George
    2017 IEEE AFRICON, 2017, : 849 - 855
  • [5] Privacy Preserving Data Mining: A Review of the State of the Art
    Sharma, Shivani
    Ahuja, Sachin
    HARMONY SEARCH AND NATURE INSPIRED OPTIMIZATION ALGORITHMS, 2019, 741 : 1 - 15
  • [6] Privacy preserving data mining
    Lindell, Y
    Pinkas, B
    JOURNAL OF CRYPTOLOGY, 2002, 15 (03) : 177 - 206
  • [7] Privacy Preserving Data Mining
    Journal of Cryptology, 2002, 15 : 177 - 206
  • [8] Privacy preserving data mining
    Lindell, Y
    Pinkas, B
    ADVANCES IN CRYPTOLOGY-CRYPTO 2000, PROCEEDINGS, 2000, 1880 : 36 - 54
  • [9] Quantifying privacy for privacy preserving data mining
    Zhan, Justin
    2007 IEEE SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DATA MINING, VOLS 1 AND 2, 2007, : 630 - 636
  • [10] Classification Rule Mining through SMC for Preserving Privacy Data Mining: A Review
    Gangrade, Alka
    Mishra, Durgesh Kumar
    Patel, Ravindra
    PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND COMPUTING (IACSIT ICMLC 2009), 2009, : 431 - 434