CFP last date
22 April 2024
Reseach Article

A Brief Survey on Different Privacy Preserving Techniques

Published on June 2016 by Aparna Shinde, Khushboo Saxena, Amit Mishra, Shiv K. Sahu
Technical Symposium on Emerging Technologies in Computer Science
Foundation of Computer Science USA
TSETCS2016 - Number 2
June 2016
Authors: Aparna Shinde, Khushboo Saxena, Amit Mishra, Shiv K. Sahu
6791722a-421d-49c6-a77b-a70a6340cbcf

Aparna Shinde, Khushboo Saxena, Amit Mishra, Shiv K. Sahu . A Brief Survey on Different Privacy Preserving Techniques. Technical Symposium on Emerging Technologies in Computer Science. TSETCS2016, 2 (June 2016), 1-4.

@article{
author = { Aparna Shinde, Khushboo Saxena, Amit Mishra, Shiv K. Sahu },
title = { A Brief Survey on Different Privacy Preserving Techniques },
journal = { Technical Symposium on Emerging Technologies in Computer Science },
issue_date = { June 2016 },
volume = { TSETCS2016 },
number = { 2 },
month = { June },
year = { 2016 },
issn = 0975-8887,
pages = { 1-4 },
numpages = 4,
url = { /proceedings/tsetcs2016/number2/25033-2022/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 Technical Symposium on Emerging Technologies in Computer Science
%A Aparna Shinde
%A Khushboo Saxena
%A Amit Mishra
%A Shiv K. Sahu
%T A Brief Survey on Different Privacy Preserving Techniques
%J Technical Symposium on Emerging Technologies in Computer Science
%@ 0975-8887
%V TSETCS2016
%N 2
%P 1-4
%D 2016
%I International Journal of Computer Applications
Abstract

As data mining is used to extract valuable information from large amount of data. But this is harmful in some cases so some kind of protection is required for sensitive information. So privacy preserving mining is emerge with the goal to provide protection from mining. There are many research branches in this area. This paper focus on analyzing different techniques of privacy persevering and specify there requirement for special type of cases.

References
  1. FoscaGiannotti, Laks V. S. Lakshmanan, Anna Monreale, Dino Pedreschi, and Hui (Wendy) Wang, "Privacy-Preserving Mining of Association Rules from Outsourced Transaction Databases" In IEEESystems Journal, VOL. 7, NO. 3, SEPTEMBER 2013, pp. 385-395.
  2. N. Zhang and W. Zhao, "Privacy Preserving Data Mining Systems " In IEEE Computer society, 2007 pp. 52-58.
  3. W. K. Wong, D. W. Cheung, E. Hung, B. Kao, and N. Mamoulis, "Security in outsourcing of association rule mining," in Proc. Int. Conf. Very Large Data Bases, 2007, pp. 111–122.
  4. K. Sathiyapriya and Dr. G. SudhaSadasivam, " A Survey on Privacy Preserving Association Rule Mining", In IJKDP Vol. 3 No 2– March-2013, pp 119-131.
  5. R. Agrawal and R. Srikant, "Privacy-preserving data mining," in Proc. ACM SIGMOD Int. Conf. Manage. Data, 2000, pp. 439–450.
  6. ManopPhankokkruad, " Association Rules for Data Mining in Item Classification Algorithm : Web Service Approach ", In IEEE, 2012 pp. 463-468.
  7. D. Narmadha, G. NaveenSundar and S. Geetha,"A Novel Approach to Prune Mined Association Rules in Large Databases?", IEEE, 2011 pp.
  8. T zung -Pei, Hong Kuo-Tung Yang, Chun-Wei Lin and Shyue-Liang Wang, "Evolutionary privacy preserving in data mining ",In IEEE World Automation Congress conference , 2010 pp.
  9. Z. Yang and R. N. Wright. "Privacy-preserving computation of bayesian networks on vertically partitioned data. " In IEEE Trans. on Knowledge and Data Engineering , 2006, pp. 1253–1264.
  10. Enabling Multilevel Trust in Privacy Preserving Data Mining Yaping Li, Minghua Chen, Qiwei Li, and Wei Zhang IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 24, NO. 9, SEPTEMBER 2012.
  11. Survey on Privacy Preserving Data Mining Haitao Liu and Jing GeUniversity of Illinois at Urbana-Champaign, UrbanaIL, 61801 USA.
  12. Privacy- Preserving Data Publishing for MultipleNumerical Sensitive Attributes QinghaiLiu, Hong Shen_, and Yingpeng Sang. TSINGHUA SCIENCE AND TECHNOLOGY Volume 20, Number 3, Jun 2015
Index Terms

Computer Science
Information Sciences

Keywords

Privacy Preserving Mining Data Perturbation Aggregation Data Swapping.