Review paper on Privacy Preserving Data Analysis
DOI:
https://doi.org/10.26438/ijcse/v7i6.11351138Keywords:
Anonymization, Privacy Preserving Data Mining, k-anonymity, RandomizationAbstract
Privacy-Preserving Data Mining (PPDM), as an important branch of data mining and an interesting topic in privacy preservation, has gained special attention in recent years. In addition to extracting useful information and revealing patterns from large amounts of data, PPDM also protects private and sensitive data from disclosure without the permission of data owners or providers. In recent years, privacy preserving data mining has been studied extensively, because of the wide proliferation of sensitive information on the internet. The major area of concern is that non-sensitive data even may deliver sensitive information, including personal information, facts or patterns. K-anonymity is a property that models the protection of released data against possible re-identification of the respondents to which the data refers. Anonymization approach makes the data owners anonymous but vulnerable to attacks like linking attacks. The paper presents various techniques which are used to perform PPDM technique and also tabulates their advantages and disadvantages.
References
[1] Agrawal R., Srikant R. Privacy-Preserving Data Mining. ACM SIGMOD Conference, 2000.
[2] K David Raju, L Vijay Kumar, K Anthony Rahul Showry, B LhoitKrishn ,(2018) ." techniques of providing data integrity in cloud computing".
[3] Aggarwal C. C., Yu P. S. On Variable Constraints in Privacy Preserving Data Mining. ACM SIAM Data Mining Conference, 2005.
[4] Alexandre Evfimievski, Tyrone Grandison, “Privacy Preserving Data Mining”.
[5] Evfimievski, A., R. Srikant, R. Agrawal and J. Gehrke. “Privacy preserving mining of association rules”. Proceedings of the 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, July 23-25, ACM Press, Edmonton, AB., Canada, pp. 1-12,2002.
[6] Surbhi Sharma and Deepak Shukla, “Efficient multi-party privacy preserving data mining for vertically partitioned data”,Inventive Computation Technologies (ICICT), 10.1109/INVENTIVE.2016.7824852, © 2017 IEEE.
[7] Y. Lindell and B. Pinkas, “Privacy preserving data mining”, J. Cryptology, 15(3):177–206, 2002.
[8] L. Sweeney, "k-ANONYMITY: A MODEL FOR PROTECTING PRIVACY," Int. J.Uncertain., vol. 10, no. 5, pp. 557- 570, 2002.
[9] G. T. Duncan and S. Mukherjee. Optimal disclosure limitation strategy in statistical databases: Deterring tracker attacks through additive noise. Journal of the American Statistical Association, 95(451):720–729, 2000.
[10] T. Evans, L. Zayatz, and J. Slanta. Using noise for disclosure limitation of establishment tabular data. Journal of Official Statistics, 14(4):537–551, 1998.
[11] M. Prakash and G. Singaravel,” An approach for prevention of privacy breach and information leakage in sensitive data mining”, Computers and Electrical Engineering 2015.
[12] S. E. Fienberg, U. E. Makov, and R. J. Steele. Disclosure limitation using perturbation and related methods for categorical data. Journal of Official Statistics, 14(4):485–502, 1998.
[13] Mahima Joshi, Yudhveer Singh Moudgil,"secure Cloud Storage."
[14] Yogendra Kumar Jain, Vinod Kumar Yadav& Geetika S. Panday, An Efficient Association Rule Hiding Algorithm for Privacy Preserving Data Mining, International Journal on Computer Science and Engineering (IJCSE), Vol. 3 No. 7 July 2011.
[15] J. J. Kim and W. E. Winkler. Masking microdata files, 1995.
[16] J. Jesu Vedha Nayahi and V. Kavitha,” Privacy and utility preserving data clustering for data anonymization and distribution on Hadoop”,Future Generation Computer Systems, 0167-739X/© 2016 Elsevier.
[17] R. Rajeswari and Mrs R. Kavitha ,”Privacy Preserving Mechanism for anonymizing data streams in data mining”, International conference on current research in Engineering Science and Technology(ICCREST-2016).
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
