An Empirical Study on Privacy Preserving Data Mining

  ijett-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
  
© 2012 by IJETT Journal
Volume-3 Issue-6                       
Year of Publication : 2012
Authors :  Md.Riyazuddin , Dr.V.V.S.S.S.Balaram , Md.Afroze , Md.JaffarSadiq , M.D.Zuber

Citation 

Md. Riyazuddin , Dr.V.V.S.S.S.Balaram , Md.Afroze , Md.JaffarSadiq , M.D.Zuber. "An Empirical Study on Privacy Preserving Data Mining". International Journal of Engineering Trends and Technology (IJETT). V3(6):687-693 Nov-Dec 2012. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group

Abstract

In modern years, advances in hardware expertise have lead to an increase in the competence to store and record personal data about consumers and individuals. This has lead to concerns that the personal data may be misused for a variety of purposes. In order to lighten these concerns, a number of techniques have newly been proposed in order to perform the data mining tasks in a privacy - preserving way. Privacy preserving data mining has become increasingly popular because it allows sharing of privacy sensitive data for analysis purposes. So society have become increasingly indisposed to share their data, frequently resulting in individuals either refusing to share their data o r providing incorrect data. Privacy preserving data mining has been studied extensively, because of the wide explosion of sensitive information on the g lobal source. In this paper, we provide a review of methods for privacy and analyze the representative t echnique for privacy preserving data mining.

References

[1] Murat Kantarcioglou and Chris Clifton, Privacy - preserving distributed mining of association rules on horizontally partitioned data , In Proceedings of the ACM SIGMOD Workshop on Research Isuues in Data Mining and Knowledge Discovery (2002), 24 – 31.
[2] Yehuda Lindell and Benny Pinkas, Privacy preserving data mining , In Advances in Cryptology - CRYPTO 2000 (2000), 36 – 54.
[3] P.Samarati,(2001). Protecting respondent`s privacy in micro data release. In IEEE Transaction on knowledge and Data Engineering,pp.010 - 027.
[4] L. Sweeney, (2002)."k - anonymity: a model for protecting privacy ", International Journal on Uncertainty, Fuzziness and Knowledge based Systems, pp. 557 - 570.
[5] Agrawal, R. and Srikant, R, (2000)."Privacy - preserving data mining ".In Proc. SIGMOD00, pp. 439 - 450.
[6] Evfimievski, A.Srikant, R.Agrawal, and GehrkeJ(2002),"Privacy preserving mining of association rules". In Proc.KDD02, pp. 217 - 228.
[7] Hong, J.I. and J.A. Landay,(2004).Archit ecture for Privacy Sensitive Ubiquitous Computing", In Mobisys04, pp. 177 - 189.
[8] Laur, H. Lipmaa, and T. Mieli` ainen,(2006)."Cryptographically private support vector machines".In Twelfth ACM SIGKDD International Conference on Knowledge Discovery and Da ta Mining, pp. 618 - 624.
[9] Ke Wang, Benjamin C. M. Fung1 and Philip S. Yu, (2005) "Template based privacy preservation in classification problems", In ICDM, pp. 466 - 473.
[10] Yang Z., ZhongS.Wright R.(2006) Privacy - Preserving Classification of Customer Da ta without Loss of Accuracy. SDM Conference, 603 - 610.
[11] Clifton C. Kantarcioglou M., Lin X., Zhu M.(2002).Tools for privacy - preserving distributed data mining. ACM SIGKDD Explorations, 4(2).
[12] M. Kantarcioglu and C. Clifton, (2002).“Privacy - preservin g distributed mining of association rules on horizontally partitioned data”, In Proc.of DKMD’02
[13] Nabil Adam and John C. Wortmann, Security - Control Methods for Statistical Databases: AComparison Study , ACM Computing Surveys 21 (1989), no. 4, 515 – 556.
[14] DakshiAgrawal and Charu C. Aggarwal, On the design and quantification of privacy preservingdata mining algorithms , In Proceedings of the 20th ACMSymposium on Principles of Database Systems (2001), 247 – 255.
[15] RakeshAgrawal and RamakrishnanSrikant, Priv acy - preserving data mining , In Proceedings of the ACM SIGMOD Conference on Management of Data (2000), 439 – 450.
[16] Mike J. Atallah, Elisa Bertino, Ahmed K. Elmagarmid, Mohamed Ibrahim, and Vassilios S. Verykios, Disclosure Limitation of Sensitive Rules , I n Proceedings of the IEEE Knolwedge and Data Engineering Workshop (1999),45 – 52.
[17] LiWu Chang and Ira S. Moskowitz, Parsimoniousdowngrading and decision trees applied to the inference problem , In Proceedings of the 1998 New Security Paradigms Workshop (1 998), 82 – 89.
[18] Chris Clifton and Donald Marks, Security and privacy implications of data mining , In Proceedings of the ACM SIGMOD Workshop on Research Issues on Data Mining and Knowledge Discovery (1996), 15 – 19

Keywords
Privacy preserving, Data Mining, Techniques, Analysis.