A review paper on Privacy-Preserving Data Mining

Authors

  • Patel M. Mohnish Patel, NIRT, RGPV, Bhopal
  • Prashant Richariya NIRT, RGPV, Bhopal
  • Shrivastava A NIRT, RGPV, Bhopal

Keywords:

data driven, artificial intelligence technology, data warehousing, threats

Abstract

Data mining technology help us in extraction of useful knowledge from large data sets. The process of data collection and data dissemination may, however, result in an inherent risk of privacy threats. Some private information about individuals, businesses and organizations has to be suppressed before it is shared or published. The privacy-preserving data mining (PPDM) has thus become an important issue in current years. This paper we propose an evolutionary privacy-preserving data mining technology to find appropriate method to perform secure transactions into a database.

References

Alexandre Evfimievski and Tyrone Grandison, ―Privacy Preserving Data Mining‖ at IBM Almaden Research Center, 2007.

Tzung-Pei Hong, Dept. of Comput. Sci. & Inf. Eng., Nat. Univ. of Kaohsiung, Kaohsiung, Taiwan, ‖Evolutionary privacy-preserving data mining‖, 19-23 Sept. 2010.

Adam, N. R. & Wortmann, J. C., ―Security-Control Methods for Statistical Databases: A Comparative Study‖, ACM Computing Surveys, Vol. 21, N. 4, pp. 515–556, 1989.

Justin Zhan from Carnegie Mellon University, USA, ―Privacy- Preserving Collaborative Data Mining‖, 2008.

Benjamin C.M. Fung, Ke Wang, and Philip S. Yu, Fellow, IEEE, ―Anonymizing Classification Data for Privacy Preservation‖, may 2007.

Keke Chen, Member, IEEE, and Ling Liu, Senior Member, IEEE, ―Privacy-Preserving Multiparty Collaborative Mining with Geometric Data Perturbation‖, Dec-2009.

Agrawal, R. & Srikant, R., ―Privacy Preserving Data Mining. In Proc. of ACM SIGMOD‖, Conference on Management of Data (SIGMOD’00), Dallas, TX, 2000.

Lindell, Y. & Pinkas, B, ―Privacy Preserving Data Mining. In Proc. of Advances in Cryptology – Crypto’00, LNCS 1880‖, Springer-Verlag, pp. 20–24, 2000.

Goldreich, O, ―Foundations of Cryptography‖, Volume I, II. Cambridge University Press., 2004.

Castano, S., Fugini, M., Martella, G., & Samarati, P, ―Database Security‖, Addison Wesley, 456 p, 1995.

P. Paillier, ―Public-key cryptosystems based on composite degree residuosity classes‖, In Advances in Cryptography—EUROCRYPT’99, pp. 223–238, Prague, Czech Republic, 1999.

R. Rivest, L. Adleman, and M. Dertouzos, ―On data banks and privacy homomorphisms‖, In Foundations of Secure Computation, eds. R. A. DeMillo et al., Academic Press, pp. 169–179, 1978.

R. Wright and Z. Yang, ―Privacy-preserving bayesian network structure computation on distributed heterogeneous data‖, In Proceedings of the 10th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD), 2004.

Z. Zhan, S. Matwin, and L. Chang, ―Privacy-preserving collaborative association rule mining‖, In 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, University of Connecticut, Storrs, CT, U.S.A., Aug. 7–10, 2005.

Z. Zhan and S. Matwin, ―A crypto-approach to privacypreserving data mining‖, In IEEE International Workshop on Privacy Aspect of Data Mining, Hong Kong, Dec. 18–22, 2006.

Er.M.R.Arun Venkatesh, Bharath University, Chennai, ―Privacy-Preserving Updates to Anonymous and Confidential Database‖, June-2012.

Shweta Shrma Hitesh Gupta and Priyank Jain, ―A Study Survey of Privacy Preserving Data Mining‖, IJRICE April 2012.

Divya Sharma, ―A Survey on Maintaining Privacy in Data Mining‖, IJERT April 2012.

SWAGATIKA DEVI, ―A SURVEY ON PRIVACY PRESERVING DATA MINING: APPROACHES AND TECHNIQUES‖, IJEST March 2011.

Tipawan Silwattananusarn and Assoc.Prof. Dr. KulthidaTuamsuk, ―Data Mining and Its Applications for Knowledge Management: A Literature Review from 2007 to 2012‖, IJDKP September 2012.

Downloads

Published

2024-02-26

How to Cite

Patel, M., Richariya, P., & Shrivastava, A. (2024). A review paper on Privacy-Preserving Data Mining. COMPUSOFT: An International Journal of Advanced Computer Technology, 2(09), 296–299. Retrieved from https://ijact.in/index.php/j/article/view/53

Issue

Section

Review Article

Similar Articles

1 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.