Call for Paper - August 2022 Edition
IJCA solicits original research papers for the August 2022 Edition. Last date of manuscript submission is July 20, 2022. Read More

A Brief Survey on Different Privacy Preserving Techniques

Print
PDF
IJCA Proceedings on Technical Symposium on Emerging Technologies in Computer Science
© 2016 by IJCA Journal
TSETCS 2016 - Number 2
Year of Publication: 2016
Authors:
Aparna Shinde
Khushboo Saxena
Amit Mishra
Shiv K. Sahu

Aparna Shinde, Khushboo Saxena, Amit Mishra and Shiv K Sahu. Article: A Brief Survey on Different Privacy Preserving Techniques. IJCA Proceedings on Technical Symposium on Emerging Technologies in Computer Science TSETCS 2016(2):1-4, June 2016. Full text available. BibTeX

@article{key:article,
	author = {Aparna Shinde and Khushboo Saxena and Amit Mishra and Shiv K. Sahu},
	title = {Article: A Brief Survey on Different Privacy Preserving Techniques},
	journal = {IJCA Proceedings on Technical Symposium on Emerging Technologies in Computer Science},
	year = {2016},
	volume = {TSETCS 2016},
	number = {2},
	pages = {1-4},
	month = {June},
	note = {Full text available}
}

Abstract

As data mining is used to extract valuable information from large amount of data. But this is harmful in some cases so some kind of protection is required for sensitive information. So privacy preserving mining is emerge with the goal to provide protection from mining. There are many research branches in this area. This paper focus on analyzing different techniques of privacy persevering and specify there requirement for special type of cases.

References

  • FoscaGiannotti, Laks V. S. Lakshmanan, Anna Monreale, Dino Pedreschi, and Hui (Wendy) Wang, "Privacy-Preserving Mining of Association Rules from Outsourced Transaction Databases" In IEEESystems Journal, VOL. 7, NO. 3, SEPTEMBER 2013, pp. 385-395.
  • N. Zhang and W. Zhao, "Privacy Preserving Data Mining Systems " In IEEE Computer society, 2007 pp. 52-58.
  • W. K. Wong, D. W. Cheung, E. Hung, B. Kao, and N. Mamoulis, "Security in outsourcing of association rule mining," in Proc. Int. Conf. Very Large Data Bases, 2007, pp. 111–122.
  • K. Sathiyapriya and Dr. G. SudhaSadasivam, " A Survey on Privacy Preserving Association Rule Mining", In IJKDP Vol. 3 No 2– March-2013, pp 119-131.
  • R. Agrawal and R. Srikant, "Privacy-preserving data mining," in Proc. ACM SIGMOD Int. Conf. Manage. Data, 2000, pp. 439–450.
  • ManopPhankokkruad, " Association Rules for Data Mining in Item Classification Algorithm : Web Service Approach ", In IEEE, 2012 pp. 463-468.
  • D. Narmadha, G. NaveenSundar and S. Geetha,"A Novel Approach to Prune Mined Association Rules in Large Databases?", IEEE, 2011 pp.
  • T zung -Pei, Hong Kuo-Tung Yang, Chun-Wei Lin and Shyue-Liang Wang, "Evolutionary privacy preserving in data mining ",In IEEE World Automation Congress conference , 2010 pp.
  • Z. Yang and R. N. Wright. "Privacy-preserving computation of bayesian networks on vertically partitioned data. " In IEEE Trans. on Knowledge and Data Engineering , 2006, pp. 1253–1264.
  • Enabling Multilevel Trust in Privacy Preserving Data Mining Yaping Li, Minghua Chen, Qiwei Li, and Wei Zhang IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 24, NO. 9, SEPTEMBER 2012.
  • Survey on Privacy Preserving Data Mining Haitao Liu and Jing GeUniversity of Illinois at Urbana-Champaign, UrbanaIL, 61801 USA.
  • Privacy- Preserving Data Publishing for MultipleNumerical Sensitive Attributes QinghaiLiu, Hong Shen_, and Yingpeng Sang. TSINGHUA SCIENCE AND TECHNOLOGY Volume 20, Number 3, Jun 2015