Privacy preserving data mining techniques-survey

Privacy preserving is one of the most important research topics in the data security field and it has become a serious concern in the secure transformation of personal data in recent years. A number of algorithmic techniques have been designed for Privacy Preserving Data Mining (PPDM). It is used to efficiently protect individual privacy in data sharing. Thus, the various models have been designed for privacy preserving data sharing. In this paper, various privacy preserving approaches in data sharing and their merits and demerits are analyzed.

[1]  Wang Zhi Clustering-Based Approach for Data Anonymization , 2010 .

[2]  Chris Clifton,et al.  Privacy-preserving k-means clustering over vertically partitioned data , 2003, KDD '03.

[3]  Grigorios Loukides,et al.  An Efficient Clustering Algorithm for k-Anonymisation , 2008, Journal of Computer Science and Technology.

[4]  Chris Clifton,et al.  Privacy-preserving distributed mining of association rules on horizontally partitioned data , 2004, IEEE Transactions on Knowledge and Data Engineering.

[5]  Charu C. Aggarwal,et al.  On the design and quantification of privacy preserving data mining algorithms , 2001, PODS.

[6]  Chris Clifton,et al.  Privacy-preserving data mining: why, how, and when , 2004, IEEE Security & Privacy Magazine.

[7]  Qi Wang,et al.  On the privacy preserving properties of random data perturbation techniques , 2003, Third IEEE International Conference on Data Mining.

[8]  Jayant R. Haritsa,et al.  Maintaining Data Privacy in Association Rule Mining , 2002, VLDB.

[9]  Chris Clifton,et al.  Privacy Preserving Naïve Bayes Classifier for Vertically Partitioned Data , 2004, SDM.

[10]  Wenliang Du,et al.  Deriving private information from randomized data , 2005, SIGMOD '05.

[11]  Xiaojun Ye,et al.  An Improved Weighted-Feature Clustering Algorithm for K-anonymity , 2009, 2009 Fifth International Conference on Information Assurance and Security.

[12]  Xintao Wu,et al.  Privacy Preserving Market Basket Data Analysis , 2007, PKDD.

[13]  Yufei Tao,et al.  Personalized privacy preservation , 2006, Privacy-Preserving Data Mining.

[14]  Yehuda Lindell,et al.  Privacy Preserving Data Mining , 2002, Journal of Cryptology.

[15]  Jun-Lin Lin,et al.  Genetic algorithm-based clustering approach for k-anonymization , 2009, Expert Syst. Appl..

[16]  A. Yao,et al.  Fair exchange with a semi-trusted third party (extended abstract) , 1997, CCS '97.

[17]  Jian Xu,et al.  A Clustering-Based Approach for Data Anonymization: A Clustering-Based Approach for Data Anonymization , 2010 .