A Survey on Privacy Preserving Data Mining Approaches and Techniques

被引:17
|
作者
Siraj, Maheyzah Md [1 ]
Rahmat, Nurul Adibah [1 ]
Din, Mazura Mat [1 ]
机构
[1] Univ Teknol Malaysia, Fac Engn, Sch Comp, Johor Baharu, Malaysia
关键词
Data Mining; privacy preserving; knowledge; PPDM (Privacy Preserving Data Mining;
D O I
10.1145/3316615.3316632
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In recent years, the importance of the Internet in our personal as well as our professional lives cannot be overstated as can be observed from the immense increase of its users. It therefore comes as no surprise that a lot of businesses are being carried out over the internet. It brings along privacy threats to the data and information of an organization. Data mining is the processing of analyze larger data in order to discover patterns and analyze hidden data concurring to distinctive sights for categorize into convenient information which is collected and assembled in common areas and other information necessities to eventually cut costs and increase revenue. In fact, the data mining has emerged as a significant technology for gaining knowledge from vast quantities of data. However, there was been growing concern that use of this technology is violating individual privacy. This tool aims to find useful patterns from large amount of data using by mining algorithms and approaches. The analysis of privacy preserving data mining (PPDM) algorithms should consider the effects of these algorithms in mining the results as well as in preserving privacy. Therefore, the success of privacy preserving data mining algorithms is measured in term of its performances, data utility, level of uncertainty, data anonymization, data randomization and so on based on data mining techniques and approaches are presented in this paper to analyze.
引用
收藏
页码:65 / 69
页数:5
相关论文
共 50 条
  • [41] Privacy Preserving Techniques For Storage Privacy Attacks:A Survey
    Pawar, Tejaswini
    Kamalapur, Snehal
    2012 12TH INTERNATIONAL CONFERENCE ON HYBRID INTELLIGENT SYSTEMS (HIS), 2012, : 283 - 287
  • [42] An Overview of Privacy Preserving Data Mining
    Qi, Xinjun
    Zong, Mingkui
    2011 INTERNATIONAL CONFERENCE OF ENVIRONMENTAL SCIENCE AND ENGINEERING, VOL 12, PT B, 2012, 12 : 1341 - 1347
  • [43] A Review on Privacy Preserving Data Mining
    Shanthi, A. S.
    Karthikeyan, M.
    2012 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC), 2012, : 438 - 441
  • [44] Study of Privacy Preserving Data Mining
    Li, Haisheng
    2010 THIRD INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY AND SECURITY INFORMATICS (IITSI 2010), 2010, : 700 - 703
  • [45] Novel Approaches for Privacy Preserving Data Mining in k-Anonymity Model
    Bhaladhare, Pawan R.
    Jinwala, Devesh C.
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2016, 32 (01) : 63 - 78
  • [46] δ-privacy: Bounding Privacy Leaks in Privacy Preserving Data Mining
    Li, Zhizhou
    Lai, Ten H.
    DATA PRIVACY MANAGEMENT, CRYPTOCURRENCIES AND BLOCKCHAIN TECHNOLOGY, 2017, 10436 : 124 - 142
  • [47] A Survey on Privacy Preserving Association Rule Mining
    Zhang, Lili
    Niu, Danmei
    Li, Yuxiang
    Zhang, Zhiyong
    2018 5TH INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND CONTROL ENGINEERING (ICISCE 2018), 2018, : 93 - 97
  • [48] A Survey on Auditing Techniques Used for Preserving Privacy of Data Stored on Cloud
    Sawant, N. M.
    Mane, N. S.
    Pottigar, V. V.
    2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, AND OPTIMIZATION TECHNIQUES (ICEEOT), 2016, : 1320 - 1323
  • [49] Privacy Preserving Data Mining Techniques for Hiding Sensitive Data: A Step Towards Open Data
    Toshniwal, Durga
    DATA SCIENCE LANDSCAPE: TOWARDS RESEARCH STANDARDS AND PROTOCOLS, 2018, 38 : 205 - 212
  • [50] Data transformation techniques for preserving privacy in distance-based mining algorithms
    Kadampur, Mohammad Ali
    Somayajulu, D. V. L. N.
    INTERNATIONAL JOURNAL OF DATA MINING MODELLING AND MANAGEMENT, 2014, 6 (03) : 285 - 311