##plugins.themes.academic_pro.article.main##

Abstract

Most data mining applications operate under the assumption that all the data is available at a single central repository, called a data warehouse. This poses a huge privacy problem because violating only a single repository’s security exposes all the data. Although people might trust some entities with some of their data, they don’t trust anyone with all their data. With the extensive amount of data stored in

databases and other repositories it is very important to develop a powerful and effective mean for analysis and interpretation of such data for extracting the interesting and useful knowledge that could help in decision making. Data mining is such a technique which extracts the useful information from the large

repositories. Knowledge discovery in database (KDD) is another name of data mining. Privacy preserving data mining techniques are introduced with the aim of extract the relevant knowledge from the large amount of data while protecting the sensible information at the same time. In this paper we review on the various privacy preserving data mining techniques like data modification and secure multiparty computation based on the different aspects. We also analyze the comparative study of all

Techniques followed by the future research work

##plugins.themes.academic_pro.article.details##

Author Biography

Jyoti, Divya Rana, Guru gobind singh indraprastha university

Student
How to Cite
Divya Rana, J. (2015). A Review on Privacy Preserving Data Mining. International Journal of Emerging Trends in Science and Technology, 2(02). Retrieved from https://igmpublication.org/ijetst.in/index.php/ijetst/article/view/506

References

1. David Hand,Heikki Mannila,Padhraic Smyth,”Principal of data Mining”,A Bradford book,The MIT Press ,Cambridge Massachusetts,London ,England
2. J. Liu, J. Luo and J. Z. Huang, “Rating: Privacy Preservation for Multiple Attributes with Different Sensitivity requirements”, in proceedings of 11th IEEE International Conference on Data Mining Workshops, IEEE 2011
3. H. Kargupta and S. Datta, Q. Wang and K. Sivakumar, “On the Privacy Preserving Properties of Random Data Perturbation Techniques”, in proceedings of the Third IEEE International Conference on Data Mining, IEEE 2003.
4. T. Jahan, G.Narsimha and C.V Guru Rao, “Data Perturbation and Features Selection in Preserving Privacy” in proceedings of 978- 1-4673-1989-8/12, IEEE 2012.
5. R. Agrawal and A. Srikant, " Privacy-preserving data mining”, in proceedings of SIGMOD00, pp. 439-450
6. J. Vaidya and C. Clifton, “Privacy preserving association rule mining in vertically partitioned data”, in The Eighth ACM SIGKDD International conference on Knowledge Discovery and Data Mining, Edmonton, Alberta, CA, July 2002, IEEE 2002.
7. Evfimievski, A.Srikant, R.Agrawal, and Gehrke , "Privacy preserving mining of association rules", in proceedings of KDD02, pp. 217-228
8. S. Lohiya and L. Ragha, “Privacy Preserving in Data Mining Using Hybrid Approach”, in proceedings of 2012 Fourth International Conference on Computational Intelligence and Communication Networks, IEEE 2012.
9. A. Parmar, U. P. Rao, D. R. Patel, “Blocking based approach for classification Rule hiding to Preserve the Privacy in Database” , in proceedings of International Symposium on Computer Science and Society, IEEE 2011
10. Y. Lindell, B.Pinkas, “Privacy preserving data mining”, in proceedings of Journal of Cryptology, 5(3), 2000.
11. C. Aggarwal , P.S. Yu, “A condensation approach to privacy preserving data mining”, in proceedings of International Conference on Extending Database Technology (EDBT), pp. 183–199, 2004. 746
12. A. Machanavajjhala, J.Gehrke, D. Kifer and M. Venkitasubramaniam, "I-Diversity: Privacy Beyond kAnonymity", Proc. Int'l Con! Data Eng. (ICDE), p. 24, 2006.
13. Slava Kisilevich, Lior Rokach, Yuval Elovici, Bracha Shapira, “Efficient Multi-Dimensional Suppression for K-Anonymity”, in proceedings of IEEE Transactions on Knowledge and Data Engineering, Vol. 22, No. 3. (March 2010), pp. 334-347, IEEE 2010.
14. P.Deivanai, J. Jesu Vedha Nayahi and V.Kavitha,” A Hybrid Data Anonymization integrated with Suppression for Preserving Privacy in mining multi party data” in proceedings of International Conference on Recent Trends in Information Technology, IEEE 2011
15. K. Alotaibi, V. J. Rayward-Smith, W. Wang and Beatriz de la Iglesia, “Non-linear Dimensionality Reduction for PrivacyPreserving Data Classification” in proceedings of 2012 ASE/IEEE International Conference on Social Computing and 2012 ASE/IEEE International Conference on Privacy, Security,Risk and Trust, IEEE 2012
G. Mathew, Z. Obradovic,” A Privacy-Preserving Framework for Distributed Clinical Decision Support”, in proceedings of 978-1- 61284-852-5/11/$26.00 ©2011 IEEE