On Privacy Preserving Data Mining Techniques: Merits and Demerits
DOI:
https://doi.org/10.26438/ijcse/v5i9.210214Keywords:
privacy-preserving data mining, k-anonymity, l-diversity, t-closeness, slicingAbstract
Data mining is the process that extracts previously not known valid and actionable information from large archived data to make crucial business and strategic decisions. In recent years, privacy preserving data mining techniques has been studied and more research has been done in this area due to proliferation of internet in everyday life along with huge availability of personal data. Huge volume of microdata is produced on every minute due to e-governance and e-commerce which contains private data about individuals and businesses. The data has been modified in some way to preserve the privacy of individuals. The main goal of privacy preserving data mining is hiding an individual’s sensitive identity and at the same time maintains the usability of data. This paper will give an overview about these rapidly changing techniques and their advancements.
References
Malin B., Sweeney L., “Determining the identifiability of DNA database entries”, Journal of the American Medical Informatics Association, pp. 537–541, November 2000.
Fienberg S., McIntyre J., “Data Swapping: Variations on a Theme by Dalenius and Reiss”, Technical Report, National Institute of Statistical Sciences, pp. 14–29, 2003.
Aggarwal C. C., “On Randomization, Public Information and the Curse of Dimensionality”, ICDE Conference, pp. 136-145, 2007.
Atallah, M., Elmagarmid, A., Ibrahim, M., Bertino, E., Verykios, V., “Disclosure limitation of sensitive rules”, Workshop on Knowledge and Data Engineering Exchange, 1999, DOI: 10.1109/KDEX.1999.836532.
S. Rathod, B.J. Doddegowda , "m-Privacy Preserving Data Analysis And Data Publising", International Journal of Computer Sciences and Engineering, Vol.2, Issue.6, pp.54-58, 2014.
Machanavajjhala A., Gehrke J., Kifer D., and Venkitasubramaniam M., “l-Diversity: Privacy Beyond k-Anonymity”, ICDE, 2006, DOI: 10.1109/ICDE.2006.1.
Malin B, Sweeney L., “Re-identification of DNA through an automated linkage process”, Journal of the American Medical Informatics Association, pp. 423–427, 2001.
Aggarwal C. C., Yu P. S., “On Variable Constraints in Privacy-Preserving Data Mining”, SIAM Conference, pp. 115-125, 2005.
Aggarwal C. C., “On k-anonymity and the curse of dimensionality”, VLDB Conference, pp. 901–909, 2005.
Li N., Li T., Venkatasubramanian S, “t-Closeness: Privacy beyond k-anonymity and l-diversity”, ICDE Conference, 2007, DOI: 10.1109/ICDE.2007.367856.
Malin B., “Why methods for genomic data privacy fail and what we can do to fix it”, AAAS Annual Meeting, Seattle, WA, 2004.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
