CFP last date
20 May 2024
Reseach Article

A Survey: Privacy Preservation Techniques in Data Mining

by Hina Vaghashia, Amit Ganatra
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 119 - Number 4
Year of Publication: 2015
Authors: Hina Vaghashia, Amit Ganatra
10.5120/21056-3704

Hina Vaghashia, Amit Ganatra . A Survey: Privacy Preservation Techniques in Data Mining. International Journal of Computer Applications. 119, 4 ( June 2015), 20-26. DOI=10.5120/21056-3704

@article{ 10.5120/21056-3704,
author = { Hina Vaghashia, Amit Ganatra },
title = { A Survey: Privacy Preservation Techniques in Data Mining },
journal = { International Journal of Computer Applications },
issue_date = { June 2015 },
volume = { 119 },
number = { 4 },
month = { June },
year = { 2015 },
issn = { 0975-8887 },
pages = { 20-26 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume119/number4/21056-3704/ },
doi = { 10.5120/21056-3704 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:03:10.245865+05:30
%A Hina Vaghashia
%A Amit Ganatra
%T A Survey: Privacy Preservation Techniques in Data Mining
%J International Journal of Computer Applications
%@ 0975-8887
%V 119
%N 4
%P 20-26
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Data mining tools aims to find useful patterns from large amount of data. These patterns represent information and are conveyed in decision trees, clusters or association rules. The knowledge discovered by various data mining techniques may contain private information about people or business. Preservation of privacy is a significant aspect of data mining and thus study of achieving some data mining goals without losing the privacy of the individuals' . The analysis of privacy preserving data mining (PPDM) algorithms should consider the effects of these algorithms in mining the results as well as in preserving privacy. Within the constraints of privacy, several methods have been proposed but still this branch of research is in its formative years . The success of privacy preserving data mining algorithms is measured in terms of its performance, data utility, level of uncertainty or resistance to data mining algorithms etc. However no privacy preserving algorithm exists that outperforms all others on all possible criteria. Rather, an algorithm may perform better than another on one specific criterion. So, the aim of this paper is to present current scenario of privacy preserving data mining framework and techniques.

References
  1. J. Han, M. Kamber. "Data Mining: Concepts and Techniques", Morgan Kaufmann Publishers.
  2. Charu C. Aggarwal, Philip S. Yu "Privacy-Preserving Data Mining Models and algorithm"advances in database systems 2008 Springer Science, Business Media, LLC.
  3. Vaidya, J. & Clifton, C. W, "Privacy preserving association rule mining in vertically partitioned data," In Proceedings of the eighth ACM SIGKDD international conference on knowledge discovery and data mining, Edmonton, Canada 2002.
  4. Murat Kantarcioglou and Chris Clifton, "Privacy-preserving distributed mi ni ng of association rules on horizontally partitioned data," In Proceedings of the ACM SI GMOD Workshop on Research Isuues in Data Mining and Knowledge Discovery, pp 24-31, 2002.
  5. Ahmed K. Elmagarmid, Amit P. Sheth "Privacy-Preserving Data Mining Models and algorithm" advances in database systems 2008.
  6. Ahmed HajYasien. Thesis on "PRESERVING PRIVACY IN ASSOCIATION RULE MINING" in the Faculty of Engineering and Information Technology Griffith University June 2007.
  7. R. Agrawal and R. Srikant. "Privacy Preserving Data Mining",ACM SIGMOD Conference on Management of Data, pp: 439-450,2000.
  8. Y. Lindell and B. Pinkas, "Privacy Preserving Data Mining", Journal of Cryptology, 15(3), pp. 36-54, 2000.
  9. Aris Gkoulalas-Divanis and Vassilios S. Verikios, "An Overview of Privacy Preserving Data Mining", Published by The ACM Student Magazine, 2010.
  10. Stanley, R. M. O. and R. Z Osmar, "Towards Standardization in Privacy Preserving Data Mining", Published in Proceedings of 3rd Workshop on Data Mining Standards, WDMS' 2004, USA, p. 7-17.
  11. Elisa, B. , N. F. Igor and P. P. Loredana. "A Framework for Evaluating Privacy Preserving Data Mining Algorithms", Published by Data Mining Knowledge Discovery, 2005, pp. 121-154.
  12. Andreas Prodromidis, Philip Chan, and Salvatore Stolfo, : "Metalearning in distributed data mining systems: Issues and approaches". In "Advances in Distributed and Parallel Knowledge Discovery", AAAI/MIT Press, September 2000.
  13. S. V. Vassilios , B. Elisa, N. F. Igor, P. P. Loredana, S. Yucel and T. Yannis, 2004, "State of the Art in Privacy Preserving Data Mining" Published in SIGMOD Record, 33, 2004, pp: 50-57.
  14. Gayatri Nayak, Swagatika Devi, "A survey on Privacy Preserving Data Mining: Approaches and Techniques", ternational Journal of Engineering Science and Technology, Vol. 3 No. 3, 2127-2133, 2011.
  15. Wang P, "Survey on Privacy preserving data mining", International Journal of Digital Content Technology and its Applications, Vol. 4, No. 9, 2010.
  16. Sweeney L, "Achieving k-Anonymity privacy protection uses generalization and suppression" International journal of Uncertainty, Fuzziness and Knowledge based systems, 10(5), 571-588, 2002.
  17. Benny Pinkas, "Cryptographic Techniques for Privacy preserving data mining", SIGKDD Explorations, Vol. 4, Issue 2, 12-19, 2002.
  18. D. Agrawal and C. Aggarwal, "On the Design and Quantification of Privacy Preserving Data Mining Algorithms", PODS 2001. pp: 247-255.
  19. Aggarwal C, Philip S Yu, "A condensation approach to privacy preserving data mining", EDBT, 183-199, 2004.
  20. Helger Lipmaa," Cryptographic Techniques in Privacy-Preserving Data Mining", University College London, Estonian Tutorial 2007.
  21. Dharmendra Thakur and Prof. Hitesh Gupta," An Exemplary Study of Privacy Preserving Association Rule Mining Techniques", P. C. S. T. , BHOPAL C. S Dept, P. C. S. T. , BHOPAL India, International Journal of Advanced Research in Computer Science and Software Engineering ,vol. 3 issue 11,2013.
  22. C. V. Nithya and A. Jeyasree,"Privacy Preserving Using Direct and Indirect Discrimination Rule Method", Vivekanandha College of Technology for WomenNamakkal India, International Journal of Advanced Research in Computer Science and Software Engineering ,vol. 3 issue 12,2013.
Index Terms

Computer Science
Information Sciences

Keywords

Anonymization Condensation Cryptography Distributed Data Mining Perturbation Privacy Preserving Data Mining (PPDM) Randomized Response.