A review paper on Privacy-Preserving Data Mining
Keywords:
data driven, artificial intelligence technology, data warehousing, threatsAbstract
Data mining technology help us in extraction of useful knowledge from large data sets. The process of data collection and data dissemination may, however, result in an inherent risk of privacy threats. Some private information about individuals, businesses and organizations has to be suppressed before it is shared or published. The privacy-preserving data mining (PPDM) has thus become an important issue in current years. This paper we propose an evolutionary privacy-preserving data mining technology to find appropriate method to perform secure transactions into a database.
References
Alexandre Evfimievski and Tyrone Grandison, ―Privacy Preserving Data Mining‖ at IBM Almaden Research Center, 2007.
Tzung-Pei Hong, Dept. of Comput. Sci. & Inf. Eng., Nat. Univ. of Kaohsiung, Kaohsiung, Taiwan, ‖Evolutionary privacy-preserving data mining‖, 19-23 Sept. 2010.
Adam, N. R. & Wortmann, J. C., ―Security-Control Methods for Statistical Databases: A Comparative Study‖, ACM Computing Surveys, Vol. 21, N. 4, pp. 515–556, 1989.
Justin Zhan from Carnegie Mellon University, USA, ―Privacy- Preserving Collaborative Data Mining‖, 2008.
Benjamin C.M. Fung, Ke Wang, and Philip S. Yu, Fellow, IEEE, ―Anonymizing Classification Data for Privacy Preservation‖, may 2007.
Keke Chen, Member, IEEE, and Ling Liu, Senior Member, IEEE, ―Privacy-Preserving Multiparty Collaborative Mining with Geometric Data Perturbation‖, Dec-2009.
Agrawal, R. & Srikant, R., ―Privacy Preserving Data Mining. In Proc. of ACM SIGMOD‖, Conference on Management of Data (SIGMOD’00), Dallas, TX, 2000.
Lindell, Y. & Pinkas, B, ―Privacy Preserving Data Mining. In Proc. of Advances in Cryptology – Crypto’00, LNCS 1880‖, Springer-Verlag, pp. 20–24, 2000.
Goldreich, O, ―Foundations of Cryptography‖, Volume I, II. Cambridge University Press., 2004.
Castano, S., Fugini, M., Martella, G., & Samarati, P, ―Database Security‖, Addison Wesley, 456 p, 1995.
P. Paillier, ―Public-key cryptosystems based on composite degree residuosity classes‖, In Advances in Cryptography—EUROCRYPT’99, pp. 223–238, Prague, Czech Republic, 1999.
R. Rivest, L. Adleman, and M. Dertouzos, ―On data banks and privacy homomorphisms‖, In Foundations of Secure Computation, eds. R. A. DeMillo et al., Academic Press, pp. 169–179, 1978.
R. Wright and Z. Yang, ―Privacy-preserving bayesian network structure computation on distributed heterogeneous data‖, In Proceedings of the 10th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD), 2004.
Z. Zhan, S. Matwin, and L. Chang, ―Privacy-preserving collaborative association rule mining‖, In 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, University of Connecticut, Storrs, CT, U.S.A., Aug. 7–10, 2005.
Z. Zhan and S. Matwin, ―A crypto-approach to privacypreserving data mining‖, In IEEE International Workshop on Privacy Aspect of Data Mining, Hong Kong, Dec. 18–22, 2006.
Er.M.R.Arun Venkatesh, Bharath University, Chennai, ―Privacy-Preserving Updates to Anonymous and Confidential Database‖, June-2012.
Shweta Shrma Hitesh Gupta and Priyank Jain, ―A Study Survey of Privacy Preserving Data Mining‖, IJRICE April 2012.
Divya Sharma, ―A Survey on Maintaining Privacy in Data Mining‖, IJERT April 2012.
SWAGATIKA DEVI, ―A SURVEY ON PRIVACY PRESERVING DATA MINING: APPROACHES AND TECHNIQUES‖, IJEST March 2011.
Tipawan Silwattananusarn and Assoc.Prof. Dr. KulthidaTuamsuk, ―Data Mining and Its Applications for Knowledge Management: A Literature Review from 2007 to 2012‖, IJDKP September 2012.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2013 COMPUSOFT: An International Journal of Advanced Computer Technology
This work is licensed under a Creative Commons Attribution 4.0 International License.
©2023. COMPUSOFT: AN INTERNATIONAL OF ADVANCED COMPUTER TECHNOLOGY by COMPUSOFT PUBLICATION is licensed under a Creative Commons Attribution 4.0 International License. Based on a work at COMPUSOFT: AN INTERNATIONAL OF ADVANCED COMPUTER TECHNOLOGY. Permissions beyond the scope of this license may be available at Creative Commons Attribution 4.0 International Public License.