An Enhanced Approach for Privacy Preserving Data Mining (PPDM)
2018, International Journal of Recent Trends in Engineering and Research
https://doi.org/10.23883/IJRTER.CONF.20171201.013.FK39TAbstract
With the development of network, data collection and storage technology, the use and sharing of large amounts of data has become possible. Once the data and information accumulated, it will become the wealth of information. However, traditional data mining techniques and algorithms directly operated on the original data set, which will cause the leakage of privacy data. At the same time, large amounts of data implicate the sensitive knowledge that their disclosure cannot be ignored to the competitiveness of enterprise. In order to overcome these problems, Privacy Preserving Data Mining (PPDM) techniques are developed. Traditional PPDM techniques suffer from different types of attacks and loss of information. In this paper an alternative method was proposed which provides less information loss and more privacy.
References (13)
- L. Cranor, T. Rabin, V. Shmatikov, S. Vadhan, and D.Weitzner, Towards a privacy research roadmap for the computing community, Comput. Commun. Consortium Committee, Comput. Res. Assoc., Washington, DC, USA, White Paper, 2015.
- C. C. Aggarwal and P. S. Yu, A general survey of privacy- preserving data mining models and algorithms, in Privacy- Preserving Data Mining, New York, NY, USA: Springer, 2008, pp. 11_52.
- Agarwal, R and Shrikant, R, Privacy Preserving Data Mining, Proceeding of Special Interest Group on Management of Data, 2000.
- Samarati P, Sweeney L. Protecting Privacy when Disclosing Information:k-Anonymity and its Enforcement through Generalization and Suppression. IEEE Symp. on Security and Privacy, 1998.
- A Machanavajjhala, D. Kifer, J Gehrke, and M. Venkata Subramaniam: l-diversity: Privacy beyond k-anonymity, ACM Trans. Knowl. Discovery Data, vol. 1, no. 1, p. 3, 2007
- S. Dua and X. Du, Data Mining and Machine Learning in Cybersecurity. Boca Raton, FL, USA: CRC Press, 2011.
- A. Shah and R. Gulati, ``Privacy preserving data mining: Techniques, classification and implications-A survey,'' Int. J. Comput. Appl., vol. 137, no. 12, pp. 40_46, 2016.
- K. Liu, H. Kargupta, and J. Ryan, Random projection based multiplicative data perturbation for privacy preserving distributed data mining, IEEE Trans. Knowl. Data Eng., vol. 18, no. 1, pp. 92_106, Jan. 2006.
- Kargupta H, Datta S, Wang Q, and K.Sivakumar, On the privacy preserving properties of random data perturbation techniques, in Proceedings, 3rd IEEE International Conference on Data Mining, Nov. 2003, pp. 99-106.
- Jaydip Sen: Privacy Preserving Data Mining -Applications, Challenges and Future Trends, in Proceedings 2nd ICCCT, MNNIT, Sep. 2011.
- Nissim Matatov, Lior Rokach and Oded Maimon "Privacy- preserving data mining: A feature set partitioning approach"2010.
- Langhreinrich L, Privacy in ubiquitous Computing, Boca Raton, FL, USA: CRC Press, 2009. Ch.3, pp.95-159.
- C.M. Bishop, Pattern Recognition and Machine Learning, vol.4, Newyork, USA, Springer, 2006.