A Survey on Privacy Preserving Data Mining Approaches and Techniques

被引:17
|
作者
Siraj, Maheyzah Md [1 ]
Rahmat, Nurul Adibah [1 ]
Din, Mazura Mat [1 ]
机构
[1] Univ Teknol Malaysia, Fac Engn, Sch Comp, Johor Baharu, Malaysia
关键词
Data Mining; privacy preserving; knowledge; PPDM (Privacy Preserving Data Mining;
D O I
10.1145/3316615.3316632
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In recent years, the importance of the Internet in our personal as well as our professional lives cannot be overstated as can be observed from the immense increase of its users. It therefore comes as no surprise that a lot of businesses are being carried out over the internet. It brings along privacy threats to the data and information of an organization. Data mining is the processing of analyze larger data in order to discover patterns and analyze hidden data concurring to distinctive sights for categorize into convenient information which is collected and assembled in common areas and other information necessities to eventually cut costs and increase revenue. In fact, the data mining has emerged as a significant technology for gaining knowledge from vast quantities of data. However, there was been growing concern that use of this technology is violating individual privacy. This tool aims to find useful patterns from large amount of data using by mining algorithms and approaches. The analysis of privacy preserving data mining (PPDM) algorithms should consider the effects of these algorithms in mining the results as well as in preserving privacy. Therefore, the success of privacy preserving data mining algorithms is measured in term of its performances, data utility, level of uncertainty, data anonymization, data randomization and so on based on data mining techniques and approaches are presented in this paper to analyze.
引用
收藏
页码:65 / 69
页数:5
相关论文
共 50 条
  • [31] Association Rule Hiding Techniques for Privacy Preserving Data Mining: A Study
    Gayathiri, P.
    Poorna, B.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2015, 6 (12) : 236 - 242
  • [32] A model for Privacy Preserving in Data Mining using Soft Computing Techniques
    Malik, Majid Bashir
    Asger, M.
    Ali, Rashid
    Sarvar, Abid
    2015 2ND INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2015, : 181 - 186
  • [33] Contemporary Trends in Privacy Preserving Collaborative Data Mining- A Survey
    Shah, Alpa
    Gulati, Ravi
    2015 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, SIGNALS, COMMUNICATION AND OPTIMIZATION (EESCO), 2015,
  • [34] Survey on Privacy-Preserving and Other Security Issues in Data Mining
    Karthika, K.
    Priya, R. Devi
    Sathishkumar, S.
    INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES, ICICCT 2019, 2020, 89 : 849 - 858
  • [35] Survey of Anonymity Techniques for Privacy Preserving
    Luo Yongcheng
    Le Jiajin
    Wang Jian
    COMPUTING, COMMUNICATION, AND CONTROL, 2011, 1 : 248 - 252
  • [36] Privacy-preserving association rule mining: a survey of techniques for sensitive rule identification and enhanced data protection
    Barua E.
    Dutta M.
    International Journal of Computers and Applications, 2024, 46 (04) : 252 - 265
  • [37] Privacy Preserving Data Mining by Cyptography
    Sharma, Anand
    Ojha, Vibha
    RECENT TRENDS IN NETWORK SECURITY AND APPLICATIONS, 2010, 89 : 576 - +
  • [38] Privacy-preserving data mining
    Agrawal, R
    Srikant, R
    SIGMOD RECORD, 2000, 29 (02) : 439 - 450
  • [39] Research on Privacy Preserving Data Mining
    Wang, Pingshui
    Wang, Jiandong
    Zhu, Xinfeng
    Jiang, Jian
    2010 INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT (CCCM2010), VOL I, 2010, : 172 - 175
  • [40] On data distortion for privacy preserving data mining
    Kabir, Saif M. A.
    Youssef, Amr M.
    Elhakeem, Ahmed K.
    2007 CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1-3, 2007, : 308 - 311