A Survey on Privacy Preserving Data Mining Approaches and Techniques

被引:17
|
作者
Siraj, Maheyzah Md [1 ]
Rahmat, Nurul Adibah [1 ]
Din, Mazura Mat [1 ]
机构
[1] Univ Teknol Malaysia, Fac Engn, Sch Comp, Johor Baharu, Malaysia
关键词
Data Mining; privacy preserving; knowledge; PPDM (Privacy Preserving Data Mining;
D O I
10.1145/3316615.3316632
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In recent years, the importance of the Internet in our personal as well as our professional lives cannot be overstated as can be observed from the immense increase of its users. It therefore comes as no surprise that a lot of businesses are being carried out over the internet. It brings along privacy threats to the data and information of an organization. Data mining is the processing of analyze larger data in order to discover patterns and analyze hidden data concurring to distinctive sights for categorize into convenient information which is collected and assembled in common areas and other information necessities to eventually cut costs and increase revenue. In fact, the data mining has emerged as a significant technology for gaining knowledge from vast quantities of data. However, there was been growing concern that use of this technology is violating individual privacy. This tool aims to find useful patterns from large amount of data using by mining algorithms and approaches. The analysis of privacy preserving data mining (PPDM) algorithms should consider the effects of these algorithms in mining the results as well as in preserving privacy. Therefore, the success of privacy preserving data mining algorithms is measured in term of its performances, data utility, level of uncertainty, data anonymization, data randomization and so on based on data mining techniques and approaches are presented in this paper to analyze.
引用
收藏
页码:65 / 69
页数:5
相关论文
共 50 条
  • [21] Privacy Preserving Utility Mining: A Survey
    Gan, Wensheng
    Chun-Wei, Jerry
    Chao, Han-Chieh
    Wang, Shyue-Liang
    Yu, Philip S.
    2018 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2018, : 2617 - 2626
  • [22] Random-data perturbation techniques and privacy-preserving data mining
    Kargupta, H
    Datta, S
    Wang, Q
    Sivakumar, K
    KNOWLEDGE AND INFORMATION SYSTEMS, 2005, 7 (04) : 387 - 414
  • [23] Privacy-preserving techniques of genomic data-a survey
    Al Aziz, Md Momin
    Sadat, Md Nazmus
    Alhadidi, Dima
    Wang, Shuang
    Jiang, Xiaoqian
    Brown, Cheryl L.
    Mohammed, Noman
    BRIEFINGS IN BIOINFORMATICS, 2019, 20 (03) : 887 - 895
  • [24] A survey on genomic data by privacy-preserving techniques perspective
    Abinaya, B.
    Santhi, S.
    COMPUTATIONAL BIOLOGY AND CHEMISTRY, 2021, 93
  • [25] Survey on privacy preserving techniques for publishing social network data
    School of Information Science and Engineering, Northeastern University, Shenyang 110819, China
    Ruan Jian Xue Bao, 3 (576-590):
  • [26] Anonymization Techniques for Privacy Preserving Data Publishing: A Comprehensive Survey
    Majeed, Abdul
    Lee, Sungchang
    IEEE ACCESS, 2021, 9 : 8512 - 8545
  • [27] Data Security and Privacy Preserving Techniques for Wearable Devices: A Survey
    Liu Q.
    Li T.
    Yu Y.
    Cai Z.
    Zhou T.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2018, 55 (01): : 14 - 29
  • [28] Random-data perturbation techniques and privacy-preserving data mining
    Hillol Kargupta
    Souptik Datta
    Qi Wang
    Krishnamoorthy Sivakumar
    Knowledge and Information Systems, 2005, 7 : 387 - 414
  • [29] Quantifying privacy for privacy preserving data mining
    Zhan, Justin
    2007 IEEE SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DATA MINING, VOLS 1 AND 2, 2007, : 630 - 636
  • [30] Privacy Preserving Data Mining Techniques: Current Scenario and Future Prospects
    Malik, Majid Bashir
    Ghazi, M. Asger
    Ali, Rashid
    2012 THIRD INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION TECHNOLOGY (ICCCT), 2012, : 26 - 32