CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

A Study of Correlation Impact on Privacy Preserving Data Mining

by J. Hyma, P.V.G.D. Prasad Reddy, A. Damodaram
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 129 - Number 15
Year of Publication: 2015
Authors: J. Hyma, P.V.G.D. Prasad Reddy, A. Damodaram
10.5120/ijca2015907152

J. Hyma, P.V.G.D. Prasad Reddy, A. Damodaram . A Study of Correlation Impact on Privacy Preserving Data Mining. International Journal of Computer Applications. 129, 15 ( November 2015), 22-25. DOI=10.5120/ijca2015907152

@article{ 10.5120/ijca2015907152,
author = { J. Hyma, P.V.G.D. Prasad Reddy, A. Damodaram },
title = { A Study of Correlation Impact on Privacy Preserving Data Mining },
journal = { International Journal of Computer Applications },
issue_date = { November 2015 },
volume = { 129 },
number = { 15 },
month = { November },
year = { 2015 },
issn = { 0975-8887 },
pages = { 22-25 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume129/number15/23150-2015907152/ },
doi = { 10.5120/ijca2015907152 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:23:31.135725+05:30
%A J. Hyma
%A P.V.G.D. Prasad Reddy
%A A. Damodaram
%T A Study of Correlation Impact on Privacy Preserving Data Mining
%J International Journal of Computer Applications
%@ 0975-8887
%V 129
%N 15
%P 22-25
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Data sharing is obvious in present day scenario of digital world, and when data is being shared among various application areas the sensitive data of the individuals is disclosed to the public. An evident awareness about this privacy violation has been created among the people now when compared to the earlier days and they are also showing a real concern towards their privacy in the technology enabled digital world. At one end several studies have been proved that privacy is a primary concern and also suggesting not to disclose too much of individual information, but at the other end people are disclosing their personal information knowingly or unknowingly through online surveys, social networks, online shopping sites, e-commerce, government agencies etc. This information sharing is obvious and it can’t be unavoidable. Consequently several techniques have been proposed to protect privacy of the individual disclosed information, but still there is an immense need of new privacy preserving techniques that can equally accommodate with the proportionate expansion of the digital data. Existing privacy techniques applied on the data set assuming all the records are independently sampled, where as in the real world data set the correlations among the records is obvious and needs to be studied to achieve accurate privacy protection. This paper provides an overview of the development of privacy preserving models and the further enhancements to be carried out to accommodate with the diverse privacy requirements and data utilization along with the correlation study.

References
  1. Bharat Bhushan Agarwal and Sumit Prakash Tayal, "Data Mining and Data Warehousing", Laxmi Publications Ltd, 2009.
  2. LjiljanaBrankovic and Vladimir Estivill-Castro, "Privacy Issues In Knowledge Discovery and Data Mining", In Proceedings of Australian Institute of Computer Ethics Conference, Melbourne, Victoria, Australia, July 1999
  3. Agarwal, R, and Srikanth ,R, “Privacy Preserving Data Mining” Proceeding of Special Interest Group on Management of Data, pp 439-450, 2000
  4. Jian Wang, Yongcheng Lou, Yen Zhao, Jiajin Le, "A Survey on Privacy Preserving Data Mining", International Workshop on Database Technology and Applications, pp.111-114, 2009.
  5. Anita A. Parmar, Udai Pratap Rao, "Blocking Based approach for Classification Rule Hiding to Preserve the Privacy in Database", International Symposium on Computer Science and Society (ISCCS), pp.323-326, 2011.
  6. L. Sweeney, "K-anonymity: A Model for Protecting Privacy", International Journal on Uncertainty, Fuzziness and Knowledge based Systems, pp. 557-570, 2002.
  7. B.C.M. Fung, K. Wang, and P.S. Yu, "Anonymizing Classification Data for Privacy Preservation", IEEE Trans. Knowledge and Data Eng., vol. 19, no. 5, pp. 711-725, May 2007.
  8. S.Vijayarani, A.Tamilarasi, M.Sampoorna, "Analysis of Privacy Preserving K Anonymity Methods and Techniques", Proceedings of the International Conference on communication and Computational Intelligence, pp.540-545, December 2010.
  9. Xiaolin Zhang, Hongjing Bi, "Research on Privacy Preserving Classification Data Mining Based on Random Perturbation", International Conference on Information Networking and Automation (ICINA), pp.173-178, 2010.
  10. Jinfei Liu, Jun Luo, and Joshua Zhexue Huang, "Rating: Privacy Preservation for Multiple Attributes with Different Sensitivity Requirements", International conference on Data Mining Workshops, pp.666-670, 2011.
  11. Vassilios S. Verykios, Elisa Bertino, "State-of-the-art in Privacy Preserving Data Mining", Proceeding of Special Interest Group on Management of Data (SIGMOD) Record, Vol. 33, No. 1,pp.50-57, 2004.
  12. Haisheng Li, "Study of Privacy Preserving Data Mining", Third International Symposium on Intelligent Information Technology and Security Informatics, pp.700-703, 2010.
  13. Charu C. Aggarwal, Philip S. Yu, "A condensation approach to privacy preserving data mining", International Conference on Extending Database Technology (EDBT), pp. 183-199, 2004.
  14. Nan Zhang; Wei Zhao, "Privacy-Preserving Data Mining Systems," in Computer , vol.40, no.4, pp.52-58, April 2007
Index Terms

Computer Science
Information Sciences

Keywords

Data Mining Privacy Preserving Data Mining (PPDM) Correlation Correlation constraints.