Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Survey on Privacy Preserving Data Mining


Affiliations
1 Department of Computer Applications, Kumaraguru College of Technology, Coimbatore, India
     

   Subscribe/Renew Journal


Privacy preserving data mining deals with hiding a person’s sensitive identity without sacrificing the usability of data. It has become a very significant area of concern but still this branch of research is in its immaturity. People today have become conscious of the privacy intrusions of their sensitive data and are very disinclined to share their information. The major area of concern is that non-sensitive data even may deliver sensitive information, including personal information, facts or patterns. Several techniques of privacy preserving data mining have been anticipated in literature. In this paper, we have considered all these state of art techniques. A tabular relationship of work done by different authors is presented. In our future work we will work on a mixture of these techniques to preserve the privacy of sensitive data.


Keywords

Data Mining, Privacy Preserving Data Mining, Data Perturbation, Blocking Based Technique, Privacy Preserving Techniques.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 189

PDF Views: 1




  • Survey on Privacy Preserving Data Mining

Abstract Views: 189  |  PDF Views: 1

Authors

N. Selvakumar
Department of Computer Applications, Kumaraguru College of Technology, Coimbatore, India
M. C. S. Geetha
Department of Computer Applications, Kumaraguru College of Technology, Coimbatore, India

Abstract


Privacy preserving data mining deals with hiding a person’s sensitive identity without sacrificing the usability of data. It has become a very significant area of concern but still this branch of research is in its immaturity. People today have become conscious of the privacy intrusions of their sensitive data and are very disinclined to share their information. The major area of concern is that non-sensitive data even may deliver sensitive information, including personal information, facts or patterns. Several techniques of privacy preserving data mining have been anticipated in literature. In this paper, we have considered all these state of art techniques. A tabular relationship of work done by different authors is presented. In our future work we will work on a mixture of these techniques to preserve the privacy of sensitive data.


Keywords


Data Mining, Privacy Preserving Data Mining, Data Perturbation, Blocking Based Technique, Privacy Preserving Techniques.