A Brief Survey on Privacy Preserving Techniques in Data Mining

Data mining is a process of extracting the required information from large datasets. Privacy preserving data mining deals with hiding a person's sensitive identity without losing the usability of data. Sensitive identities include some private information about persons, companies, and governments that have to be suppressed before it is shared or published. Thus, privacy preserving data mining has become a vital field of research. The capability of privacy preserving data mining techniques is measured by using metrics such as performance in terms of time efficiency, data utility and level of uncertainty or resistance to data mining algorithms. In this paper, various privacy preserving techniques such as Data anonymization, Data Randomization, use of cryptography are presented. General Terms: Data Mining, Privacy and Security.

[1]  R. Suganya,et al.  Data Mining Concepts and Techniques , 2010 .

[2]  Murat Kantarcioglu,et al.  Privacy Preserving Decision Tree Mining from Perturbed Data , 2009 .

[3]  Keke Chen,et al.  Under Consideration for Publication in Knowledge and Information Systems Geometric Data Perturbation for Privacy Preserving Outsourced Data Mining , 2010 .

[4]  Minghua Chen,et al.  Enabling Multilevel Trust in Privacy Preserving Data Mining , 2011, IEEE Transactions on Knowledge and Data Engineering.

[5]  Philip S. Yu,et al.  Privacy-preserving data publishing: A survey of recent developments , 2010, CSUR.

[6]  Marina Blanton Achieving Full Security in Privacy-Preserving Data Mining , 2011, 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing.

[7]  Jiawei Han,et al.  Data Mining: Concepts and Techniques , 2000 .

[8]  Heikki Mannila Randomization Techniques for Data Mining Methods , 2008, ADBIS.

[9]  Anil Prakash Dangi,et al.  Privacy Preservation Measure using t-closeness with combined l-diversity and k-anonymity , 2012 .

[10]  David J. DeWitt,et al.  Workload-aware anonymization techniques for large-scale datasets , 2008, TODS.

[11]  A. Vinaya Babu,et al.  Preserving Privacy and Sharing the Data in Distributed Environment using Cryptographic Technique on Perturbed data , 2010, ArXiv.

[12]  Naser Azad,et al.  Information disclosure by data mining approach , 2012 .

[13]  Raghvendra Kumar,et al.  Privacy preservation in horizontally partitioned databases using randomized response technique , 2013, 2013 IEEE CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES.

[14]  Benny Pinkas,et al.  Cryptographic techniques for privacy-preserving data mining , 2002, SKDD.

[15]  M. B. Malik,et al.  Privacy Preserving Data Mining Techniques: Current Scenario and Future Prospects , 2012, 2012 Third International Conference on Computer and Communication Technology.

[16]  M. Vedanayaki,et al.  A Study of Data Mining and Social Network Analysis , 2014 .

[17]  Vinod Kumar Yadav,et al.  An Efficient Association Rule Hiding Algorithm for Privacy Preserving Data Mining , 2011 .

[18]  Li Liu,et al.  Privacy Preserving Decision Tree Mining from Perturbed Data , 2009, 2009 42nd Hawaii International Conference on System Sciences.