CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Survey on Privacy Preserving Data Mining Techniques using Recent Algorithms

by Rajesh N., Sujatha K., A. Arul Lawrence Selvakumar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 133 - Number 7
Year of Publication: 2016
Authors: Rajesh N., Sujatha K., A. Arul Lawrence Selvakumar
10.5120/ijca2016907917

Rajesh N., Sujatha K., A. Arul Lawrence Selvakumar . Survey on Privacy Preserving Data Mining Techniques using Recent Algorithms. International Journal of Computer Applications. 133, 7 ( January 2016), 30-33. DOI=10.5120/ijca2016907917

@article{ 10.5120/ijca2016907917,
author = { Rajesh N., Sujatha K., A. Arul Lawrence Selvakumar },
title = { Survey on Privacy Preserving Data Mining Techniques using Recent Algorithms },
journal = { International Journal of Computer Applications },
issue_date = { January 2016 },
volume = { 133 },
number = { 7 },
month = { January },
year = { 2016 },
issn = { 0975-8887 },
pages = { 30-33 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume133/number7/23799-2016907917/ },
doi = { 10.5120/ijca2016907917 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:30:30.768707+05:30
%A Rajesh N.
%A Sujatha K.
%A A. Arul Lawrence Selvakumar
%T Survey on Privacy Preserving Data Mining Techniques using Recent Algorithms
%J International Journal of Computer Applications
%@ 0975-8887
%V 133
%N 7
%P 30-33
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The privacy preserving data mining is playing crucial role act as rising technology to perform various data mining operations on private data and to pass on data in a secured way to protect sensitive data. Many types of technique such as randomization, secured sum algorithms and k-anonymity have been suggested in order to execute privacy preserving data mining. In this survey paper, on current researches made on privacy preserving data mining technique with fuzzy logic, neural network learning, secured sum and various encryption algorithm is presented. This will enable to grasp the various challenges faced in privacy preserving data mining and also help us to find best suitable technique for various data environment.

References
  1. A. Hussien, N. Hamza and H. Hefny, 2013 , Attacks on Anonymization-Based Privacy-Preserving: A Survey for Data Mining and Data Publishing, Journal of Information Security, Vol. 4 No. 2, 2013, pp. 101-112. doi:10.4236/jis.2013.42012.
  2. Cano I, Torra V. 2009 Generation of synthetic data by means of fuzzy c-Regression . IEEE International Conference on Fuzzy Systems, 2009. FUZZ-IEEE, pp: 1145 – 1150.
  3. Grljevic O, Bosnjak Z, Mekovec R. 2011, Privacy preserving in data mining - Experimental research on SMEs data, IEEE 9th International Symposium on Intelligent Systems and Informatics (SISY), 2011 , pp- 477 – 481.
  4. Honda K, Kawano A, Nots A, Ichihashi H., 2012, A fuzzy variant of k-member clustering for collaborative filtering with data anonymization, Fuzzy Systems (FUZZ-IEEE), 2012 IEEE International Conference on, pp: 1-6.
  5. Hasan O, Bertino E, Brunie L. 2010, Efficient privacy preserving reputation protocols inspired by secure sum, Privacy Security and Trust (PST), 2010 Eighth Annual International Conference on, pp: 126 – 133.
  6. Inan A, Richardson TX, Kantarcioglu M, Bertino E., 2009, Using Anonymized Data for Classification, IEEE 25th International Conference on Data Engineering, 2009. ICDE '09. , pp : 429-430.
  7. Jian Wang, Yongcheng Luo ; Yan Zhao ; Jiajin Le, 2009, A Survey on Privacy Preserving Data Mining, First International Workshop on Database Technology and Applications, 2009 , pp: 111-114.
  8. Jiang, J. and Umano, M. 2014, Privacy preserving extraction of fuzzy rules from distributed data with different attributes, Joint 7th International Conference on and Advanced Intelligent Systems (ISIS), 15th International Symposium on Soft Computing and Intelligent Systems (SCIS), 2014, pp : 1180-1185.
  9. Kabir S.M.A, Youssef A.M, Elhakeem, A.K., 2007, On Data Distortion for Privacy Preserving Data Mining, Canadian Conference on Electrical and Computer Engineering, 2007. CCECE 2007. , pp : 308 – 311.
  10. Kun Liu , Kargupta H, Ryan J., 2006, Random projection-based multiplicative data perturbation for privacy preserving distributed data mining, Knowledge and Data Engineering, IEEE Transactions on (Volume:18 , Issue: 1 ), pp: 92 – 106.
  11. Kikuchi H., Aoki Y, Terada M, Ishii K., 2012, Accuracy of Privacy-Preserving Collaborative Filtering Based on Quasi-homomorphic Similarity, 9th International Conference on Ubiquitous Intelligence & Computing and 9th International Conference on Autonomic & Trusted Computing (UIC/ATC), 2012,pp : 555- 562.
  12. Kasugai H, Kawano A, Honda, K, Notsu A. 2013, A study on applicability of fuzzy k-member clustering to privacy preserving pattern recognition, IEEE International Conference on Fuzzy Systems (FUZZ), 2013, pp:1-6 .
  13. Kokkinos Y, Margaritis K. 2013, Distributed privacy-preserving P2P data mining via probabilistic neural network committee machines, Fourth International Conference on Information, Intelligence, Systems and Applications (IISA), 2013, pp: 1-4.
  14. Li Yaping Chen Minghua, Li Qiwei, Zhang, Wei. 2012, Enabling Multilevel Trust in Privacy Preserving Data Mining, Knowledge and Data Engineering, IEEE Transactionson (Volume:24, Issue: 9 ), pp: 1598 – 1612.
  15. Liu Wen, Luo Shou-shan, Wang Yong-bin, Jiang Zhen-tao, 2011, A Protocol of Secure Multi-party Multi-data Ranking and Its Application in Privacy Preserving Sequential Pattern Mining, 2011 Fourth International Joint Conference on Computational Sciences and Optimization (CSO), pp: 272 – 275.
  16. Malik M.B, Ghazi M.A, Ali R. 2012, Privacy Preserving Data Mining Techniques: Current Scenario and Future Prospects, Third International Conference on Computer and Communication Technology (ICCCT), pp: 26 – 32.
  17. Mi Wen, Rongxing Lu ; Jingshen Lei ; Xiaohui Liang , 2013, ECQ: An Efficient Conjunctive Query scheme over encrypted multidimensional data in smart grid, Global Communications Conference (GLOBECOM), 2013 IEEE, 796 – 801.
  18. Mittal D, Kaur D, Aggarwal A. 2014 , Secure Data Mining in Cloud Using Homomorphic Encryption IEEE International Conference on Cloud Computing in Emerging Markets (CCEM), 2014, pp : 1 – 7.
  19. Mukkamala R., Ashok V.G, 2011 Fuzzy-based Methods for Privacy-Preserving Data Mining Eighth International Conference on Information Technology: New Generations (ITNG), pp: 348 – 353.
  20. Inan A, Richardson TX, Kantarcioglu M., Bertino E., 2009, Using Anonymized Data for Classification, IEEE 25th International Conference on Data Engineering, 2009. ICDE '09. , pp : 429-430.
  21. Pathak F.A.N , Pandey S.B.S., 2013, An efficient method for privacy preserving data mining in secure multiparty computation, Nirma University International Conference on Engineering (NUiCONE), 2013, pp: 1 – 3 Pathak, F.A.N. , Pandey, S.B.S., 2013.
  22. Pathak F.A.N , Pandey S.B.S, 2013, Distributed changing neighbors k-secure sum protocol for secure multiparty computation, Nirma University International Conference on Engineering (NUiCONE), 2013, pp: 1 – 3.
  23. Shweta Taneja, Shashank Khanna, Sugandha Tilwalia, Ankita, 2014, A Review on Privacy Preserving Data Mining: Techniques and Research Challenges, International Journal of Computer Science and Information Technologies, Vol. 5 (2) , 2014, pp: 2310-2315.
  24. Shu Qin Ren , Khin Mi Mi Aung ; Jong Sou Park, 2010, A Privacy Enhanced Data Aggregation Model, Computer and Information Technology (CIT), 2010 IEEE 10th International Conference on, pp: 985 – 990.
  25. SathiyaPriya K, Sadasivam G.S, Celin N. 2011, A new method for preserving privacy in quantitative association rules using DSR approach with automated generation of membership function, World Congress on Information and Communication Technologies (WICT), 2011, pp: 148-153.
  26. Samet S, Miri A., 2009, Privacy-Preserving Bayesian Network for Horizontally Partitioned Data International Conference on Computational Science and Engineering, 2009. CSE '09. (Volume:3 ), pp: 9-16.
  27. Tiancheng Li, Ninghui Li, Jian Zhang, Ian Molloy, "Slicing: A New Approach for Privacy Preserving Data Publishing", IEEE Transactions on Knowledge & Data Engineering, vol.24, no. 3, pp. 561-574, March 2012, doi:10.1109/TKDE.2010.236.
  28. Teo S.G ,Lee V, Shuguo Han, 2012, A Study of Efficiency and Accuracy of Secure Multiparty Protocol in Privacy-Preserving Data Mining, 26th International Conference on Advanced Information Networking and Applications Workshops (WAINA), pp: 85-90.
  29. Torra, V, Miyamoto S, Endo Y. Domingo-Ferrer, 2008, On intuitionistic fuzzy clustering for its application to privacy,J. FUZZ-IEEE (IEEE World Congress on Computational Intelligence). IEEE International Conference on Fuzzy System DOI: 10.1109/FUZZY.2010.5584186, pp 1042 –1048.
  30. Tanaka D, Oda T, Honda K, Notsu A, 2014, Privacy preserving fuzzy co-clustering with distributed cooccurrence matrices Joint 7th International Conference on Soft Computing and Intelligent Systems (SCIS), 2014 and 15th International Symposium on Advanced Intelligent Systems (ISIS), pp: 700-705.
  31. Tsiafoulis, S.G. Zorkadis, V.C., 2010, A Neural Network Clustering Based Algorithm for Privacy Preserving Data Mining, International Conference on Computational Intelligence and Security (CIS), 2010, pp: 401-405.
  32. Wang Hongmei , Zhao Zheng , Sun Zhiwei, 2005, Privacy-preserving Bayesian network structure learning on distributed heterogeneous data,.11th Pacific Rim International Symposium on Dependable Computing, 2005. Proceedings, DOI: 10.1109/PRDC.2005.49.
  33. Xiaolin Zhang, Hongjing Bi, 2010, Research on privacy preserving classification data mining based on random perturbation, Information Networking and Automation (ICINA), 2010 International Conference on (Volume:1 ), pp : V1-173 - V1-178
  34. Xueyun Li, Zheng Yan and Peng Zhang, 2014, A Review on Privacy-Preserving Data Mining, IEEE International Conference on Computer and Information Technology (CIT), 769 – 774.
  35. Zhiqiang Yang, Wright R.N. 2005, Improved Privacy-Preserving Bayesian Network Parameter Learning on Vertically Partitioned Data, 21st International Conference on Data Engineering Workshops, 2005. PP: 91-96.
Index Terms

Computer Science
Information Sciences

Keywords

Privacy Preserving Data Mining (PPDM) Privacy Preserving Data Publishing (PPDP) Secure Multiparty Computation (SMC) Cryptographic & Secured Sum Computation Algorithms.