INTERNATIONAL RESEARCH JOURNAL OF SCIENCE ENGINEERING AND TECHNOLOGY

( Online- ISSN 2454 -3195 ) New DOI : 10.32804/RJSET

Impact Factor* - 6.2311


**Need Help in Content editing, Data Analysis.

Research Gateway

Adv For Editing Content

   No of Download : 163    Submit Your Rating     Cite This   Download        Certificate

ANALYTICAL STUDY ON PRIVACY PRESERVING DATA MINING MODELS AND TECHNIQUES

    1 Author(s):  DEVENDRA KUMAR

Vol -  2, Issue- 2 ,         Page(s) : 38 - 47  (2012 ) DOI : https://doi.org/10.32804/RJSET

Abstract

Privacy preserving becomes an important issue in the development progress of data mining techniques. Privacy preserving data mining has become increasingly popular because it allows sharing of privacy-sensitive data for analysis purposes. As we know that, there has been an important research area that how to protect private information or sensitive knowledge from leaking in the mining process. Our goal in investigating privacy preservation issues was to take a systemic view of architectural requirements and design principles. This paper describes meaning of data mining, Privacy, Design architecture for privacy preserving, types of privacy preserving, privacy preserving data mining, data distortion, data encryption, and reconstruction techniques in detail.

  1. V. Verykios, E. Bertino, I.G. Fovino, L.P. Provenza, Y. Saygin, and Y. Theodoridis, State-of-the-art in Privacy Preserving Data Mining? SIGMOD Record, Vol. 33, No. 1, 50-57, March 2004.
  2. Kargupta H, Datta S, Wang Q, Sivakumar K. On the privacy preserving properties of random data perturbation techniques, Proceedings of the IEEE International Conference on Data Mining (ICDM). Melbourne, Florida, 2003: 99-106
  3. Moskowitz I S, Chang L W. A decision theoretical based system for information downgrading//Proceedings of the 5th Joint Conference on Information Sciences (JCIS). AtlanticCity, NJ USA, 2000: 82-89
  4. VERYKIOS V S, ELMAGARMID A, BERTINO E, et al. Association rule hiding[J].IEEE Trans on Know ledge and Data Engineering,2004,16(4): 434-447
  5. Pinkas B. Cryptographic techniques for privacy-preserving datamining• SIGKDD Explorations,2002,4(2)
  6. DU Wen-liang, ZHAN Zhi-jun. Building decision tree classifier on private data[C] Proc of IEEE International Coference on Privacy, Security and DataMining. Darlinghurst: Australian Computer  Society, 2002: 1-8.
  7. ZHOU Shui-Geng, LI Feng1, TAO Yu-Fei, XIAO Xiao-Kui. Privacy Preservation in Database Applications: A Surve. CHINESE JOURNAL OF COMPUTER,2009,32(5)
  8. Pinkas B. Cryptographic techniques for privacy-preserving data mining [J]. ACM SIGKDD Explorations Newsletter,2002,4(2):12-19.
  9. Du Wenliang, Attalah M J. Secure multi problem computation problems and their applications: A review and open problems [R].CERIAS Tech Report 2001-51,Center for Education and Research in Information Assurance and Security and Department of Computer Sciences, Purdue University, West Lafayette,IN,2001.
  10.  Kantarcioglu M, Clifton C• Privacy preserving Distributed Mining of Association Rules on Horizontally Partitioned Data In: ACM SIGMOD Workshop on Research Issues on Data Mining and Knowledge Discovery, 2002
  11. Agrawal R, Srikant R. Privacy-preserving data mining [A]. Proceedings of the 2000 ACM SIGMOD international conference on Management of data[C]. Dallas, Texas, United States: ACM, 2000. 439-450
  12. Clifton C , Kantarcioglou M , Zhu Y M. Tools for privacy preserving distributed data mining[J]. SIGKDD Explorations 4,2002,(2).
  13. Du Wenliang,Zhan Zhijun. Building decision tree classifier on private data[C]. In Proceedings of the IEEE ICDM Workshop on  Privacy,Security and DataMining,2002
  14. Lindell Y , Pinkas B. Privacy preserving data mining[C]. In Advances in Cryptology-CRYPTO 2000,2000:36-54.
  15. Rizvi S J, Haritsa J R. Maintaining data privacy in association rule mining [A]. In Proceedings of the 28th International Conference on Very Large Databases(VLD) [C]. Hong Kong,Chi-na: [s.n.], 2002. 682-693.
  16. Agrawal D,Aggarwal C C.On the design and quantification of privacy preserving 
  17. data mining algorithms[A]. Proceedings of the twentieth ACM SIGMOD-SIGACT-SIGART symposium on Principles of Study of Privacy Preserving Data Mining Haisheng Li East China Jiaotong University, Nachang330013,China
  18. 4. L. Wang, S. Jajodia, and D. Wijesekera, “Securing OLAP Data Cubes against Privacy Breaches,” Proc. 25th IEEE Symp.Security and Privacy, IEEE Press, 2004, pp. 161-175.
  19. Verykios, VS; Bertino, E; Fovino, IN; Provenza, LP; Saygin, and Theodoridis, Y. 2004. State-of –the-art in Privacy Preserving Data Mining. SIGMOD Record. Volume 33, Issue 1:50-57.

*Contents are provided by Authors of articles. Please contact us if you having any query.






Bank Details