On Privacy Preserving Data Mining Techniques: Merits and Demerits

Authors

  • Mohana Chelvan P Dept. of Computer Science, Hindustan College of Arts and Science, Chennai, India
  • Perumal K Dept. of Computer Applications, Madurai Kamaraj University, Madurai, India

DOI:

https://doi.org/10.26438/ijcse/v5i9.210214

Keywords:

privacy-preserving data mining, k-anonymity, l-diversity, t-closeness, slicing

Abstract

Data mining is the process that extracts previously not known valid and actionable information from large archived data to make crucial business and strategic decisions. In recent years, privacy preserving data mining techniques has been studied and more research has been done in this area due to proliferation of internet in everyday life along with huge availability of personal data. Huge volume of microdata is produced on every minute due to e-governance and e-commerce which contains private data about individuals and businesses. The data has been modified in some way to preserve the privacy of individuals. The main goal of privacy preserving data mining is hiding an individual’s sensitive identity and at the same time maintains the usability of data. This paper will give an overview about these rapidly changing techniques and their advancements.

References

Malin B., Sweeney L., “Determining the identifiability of DNA database entries”, Journal of the American Medical Informatics Association, pp. 537–541, November 2000.

Fienberg S., McIntyre J., “Data Swapping: Variations on a Theme by Dalenius and Reiss”, Technical Report, National Institute of Statistical Sciences, pp. 14–29, 2003.

Aggarwal C. C., “On Randomization, Public Information and the Curse of Dimensionality”, ICDE Conference, pp. 136-145, 2007.

Atallah, M., Elmagarmid, A., Ibrahim, M., Bertino, E., Verykios, V., “Disclosure limitation of sensitive rules”, Workshop on Knowledge and Data Engineering Exchange, 1999, DOI: 10.1109/KDEX.1999.836532.

S. Rathod, B.J. Doddegowda , "m-Privacy Preserving Data Analysis And Data Publising", International Journal of Computer Sciences and Engineering, Vol.2, Issue.6, pp.54-58, 2014.

Machanavajjhala A., Gehrke J., Kifer D., and Venkitasubramaniam M., “l-Diversity: Privacy Beyond k-Anonymity”, ICDE, 2006, DOI: 10.1109/ICDE.2006.1.

Malin B, Sweeney L., “Re-identification of DNA through an automated linkage process”, Journal of the American Medical Informatics Association, pp. 423–427, 2001.

Aggarwal C. C., Yu P. S., “On Variable Constraints in Privacy-Preserving Data Mining”, SIAM Conference, pp. 115-125, 2005.

Aggarwal C. C., “On k-anonymity and the curse of dimensionality”, VLDB Conference, pp. 901–909, 2005.

Li N., Li T., Venkatasubramanian S, “t-Closeness: Privacy beyond k-anonymity and l-diversity”, ICDE Conference, 2007, DOI: 10.1109/ICDE.2007.367856.

Malin B., “Why methods for genomic data privacy fail and what we can do to fix it”, AAAS Annual Meeting, Seattle, WA, 2004.

Downloads

Published

2025-11-12
CITATION
DOI: 10.26438/ijcse/v5i9.210214
Published: 2025-11-12

How to Cite

[1]
P. Mohana Chelvan and K. Perumal, “On Privacy Preserving Data Mining Techniques: Merits and Demerits”, Int. J. Comp. Sci. Eng., vol. 5, no. 9, pp. 210–214, Nov. 2025.