A Study of Correlation Impact on Privacy Preserving Data Mining

Data sharing is obvious in present day scenario of digital world, and when data is being shared among various application areas the sensitive data of the individuals is disclosed to the public. An evident awareness about this privacy violation has been created among the people now when compared to the earlier days and they are also showing a real concern towards their privacy in the technology enabled digital world. At one end several studies have been proved that privacy is a primary concern and also suggesting not to disclose too much of individual information, but at the other end people are disclosing their personal information knowingly or unknowingly through online surveys, social networks, online shopping sites, e-commerce, government agencies etc. This information sharing is obvious and it can‟t be unavoidable. Consequently several techniques have been proposed to protect privacy of the individual disclosed information, but still there is an immense need of new privacy preserving techniques that can equally accommodate with the proportionate expansion of the digital data. Existing privacy techniques applied on the data set assuming all the records are independently sampled, where as in the real world data set the correlations among the records is obvious and needs to be studied to achieve accurate privacy protection. This paper provides an overview of the development of privacy preserving models and the further enhancements to be carried out to accommodate with the diverse privacy requirements and data utilization along with the correlation study.

[1]  Philip S. Yu,et al.  A Condensation Approach to Privacy Preserving Data Mining , 2004, EDBT.

[2]  Yehuda Lindell,et al.  Privacy Preserving Data Mining , 2002, Journal of Cryptology.

[3]  Xiaolin Zhang,et al.  Research on privacy preserving classification data mining based on random perturbation , 2010, 2010 International Conference on Information, Networking and Automation (ICINA).

[4]  Bharat Bhushan Agarwal,et al.  Data Mining and Data Warehousing , 2006 .

[5]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[6]  S. Vijayarani,et al.  Analysis of privacy preserving K-anonymity methods and techniques , 2010, 2010 International Conference on Communication and Computational Intelligence (INCOCCI).

[7]  Barbara Mento,et al.  Data mining and data warehousing , 2003 .

[8]  Wei Zhao,et al.  Privacy-Preserving Data Mining Systems , 2007, Computer.

[9]  Haisheng Li Study of Privacy Preserving Data Mining , 2010, 2010 Third International Symposium on Intelligent Information Technology and Security Informatics.

[10]  Dhiren R. Patel,et al.  Blocking Based Approach for Classification Rule Hiding to Preserve the Privacy in Database , 2011, 2011 International Symposium on Computer Science and Society.

[11]  Joshua Zhexue Huang,et al.  Rating: Privacy Preservation for Multiple Attributes with Different Sensitivity Requirements , 2011, 2011 IEEE 11th International Conference on Data Mining Workshops.

[12]  Philip S. Yu,et al.  Anonymizing Classification Data for Privacy Preservation , 2007, IEEE Transactions on Knowledge and Data Engineering.

[13]  P. Johri,et al.  Survey on Privacy Preserving Data Mining , 2014 .

[14]  Rakesh Agrawal,et al.  Privacy-preserving data mining , 2000, SIGMOD 2000.

[15]  Ljiljana Brankovic,et al.  PRIVACY ISSUES IN KNOWLEDGE DISCOVERY AND DATA MINING , 2000 .

[16]  Elisa Bertino,et al.  State-of-the-art in privacy preserving data mining , 2004, SGMD.