SlideShare a Scribd company logo
International Journal of UbiComp (IJU), Vol.7, No.3, July 2016
DOI:10.5121/iju.2016.7301 1
A Review on Privacy Preservation in Data Mining
1
T.Nandhini, 2
D. Vanathi, 3
Dr.P.Sengottuvelan
1
M.E.Scholar, Department of Computer Science & Engineering, Nandha Engineering
College, Erode-638052, Tamil Nadu, India
2
Associate Professor, Department of Computer Science & Engineering, Nandha
Engineering College, Erode-638052, Tamil Nadu, India
3
Associate Professor & Head, Department Of Computer Science,
Periyar University PG Extension Cente, Darmapuri
ABSTRACT
The main focus of privacy preserving data publishing was to enhance traditional data mining techniques
for masking sensitive information through data modification. The major issues were how to modify the data
and how to recover the data mining result from the altered data. The reports were often tightly coupled
with the data mining algorithms under consideration. Privacy preserving data publishing focuses on
techniques for publishing data, not techniques for data mining. In case, it is expected that standard data
mining techniques are applied on the published data. Anonymization of the data is done by hiding the
identity of record owners, whereas privacy preserving data mining seeks to directly belie the sensitive data.
This survey carries out the various privacy preservation techniques and algorithms.
KEYWORDS
Data mining, privacy preserving, Anonymization
1. INTRODUCTION
The huge amount of data available in information databases becomes worthless until the useful
information is extracted. Mining knowledge from the data is said to be data mining. The two steps
are analyse and extract useful information from database is mandatory for further use in different
work environments like market analysis, fraud detection, science exploration, etc. Information
extraction carried out the following duties such as cleaning data, integration of data,
transformation of data, pattern evaluation, and data presentation. The boom of data mining relies
on the availability of high in data quality and effective sharing. The figure 1 explains the process
of privacy preservation technique.
Figure 1 privacy preservation technique
International Journal of UbiComp (IJU), Vol.7, No.3, July 2016
2
The data mining works with generation of association rules, the modification in support and
confidence of the association rule for masking sensitive rules is done. A concept named „not
altering the support‟ is deployed to hide an association rule. There are two approaches in privacy
preserving data mining. The data Perturbing values for preservation of customer privacy is the
first approach. The other approach is Cryptographic tools to build data mining models. Privacy
preserving [12] is said to be worked out when the attacker is not able to learn anything extra from
the given data even though with the presence of his background knowledge obtained from other
sources.
2. OVERVIEW
Privacy preservation
The main focus of privacy preserving data publishing was to enhance traditional data mining
techniques which mask the sensitive information by modifying the data. The major issues were
how to modify the data and how to rediscover the data mining result from the modified data. The
data Perturbing values for preservation of customer privacy is the first approach. The other
approach is Cryptographic tools to build data mining models. Privacy preserving [12] is preferred
to be go out when the attacker is unable to know anything extra from the given data even though
with the presence of his background knowledge obtained from other sources.
Anonymization
Anonymization of the data is done by hiding the identity of record owners, whereas privacy
preserving data mining seeks to directly belie the sensitive data. The problem of privacy-
preservation in social networks is a major problem. The goal is to arrive at an anonymized view
of the network which is unified without flat out to any of the data holder‟s information apropos
links amid nodes that are controlled by other data holders. The anonymization algorithm and
SaNGreeA algorithm [1] used for sequential clustering. Anonymity parameters are used for
sequential clustering algorithms for anonymizing social networks.
3. LITERATURE SURVEY
Sequential Clustering for Anonymization of Centralized and Distributed Social Networks
The complication of privacy-preservation in social networks is a major problem. The goal is to
arrive at an anonymized view of the unified network without eloquent to any of the data holder‟s
information about links between nodes that are controlled by other data holders. The
anonymization algorithm and SaNGreeA algorithm [1] used for sequential clustering. Anonymity
parameters are used for anonymizing social networks by using sequential clustering algorithms.
Several algorithms produce anonymizations by means of clustering which have an efficient utility
than those achieved by existing algorithms.
On the Design and Analysis of the Privacy-Preserving SVM Classifier
SVM classifier without exposing the private content of training data is preferably said as Privacy-
Preserving SVM Classifier [2]. Data mining algorithm, Classification classifier for public use or
deliver the SVM classifier to clients will bare the private content of support vectors. This violates
the privacy-preserving needs for some legal or commercial account. Privacy violation problem,
and propose an approach as a base technique for the SVM classifier to revamp it to a privacy-
preserving classifier which does not announce the private content of support vectors.
International Journal of UbiComp (IJU), Vol.7, No.3, July 2016
3
Improved MASK Algorithm for Privacy Preserving Association Rules on Data Mining
A data perturbation strategy is implemented through the MASK algorithm, which leads to a
debased privacy-preserving degree. In a while, it is challenging to handle the MASK algorithm
into real time due to long execution time. A hybrid algorithm encapsulated with data perturbation
and query restriction (DPQR) [3] to maximize the privacy-preserving degree by multi-parameters
perturbation. Data Perturbation and Query Restriction (DPQR) algorithm are used to improve
privacy-preserving degree and time-efficiency is achieved. The proposed DPQR is more suitable
for Boolean data, and it cannot deal with numerical data or other types of data.
Privacy-Preserving Gradient-Descent Methods
Gradient descent [4] aims to minimize a target function in order to reach a local trace. In data
mining, this function accords to a decision model that is to be discovered. The author present two
technical approaches stochastic approach and least square approach. Languages modeling
smoothing parameters, weight parameter are used to measure the performance of the system. The
proposed secure building blocks are scalable and the proposed protocols permit us to determine
an efficient secure protocol for the applications for each scenario.The author will extend PPGD to
vertically partitioned data implementing the least square approach for N-number of parities.
Crowd sourcing Database for K-Anonymity
Author suggested integrating the crowdsourcing techniques [5] into the database engine. It
addresses the privacy concern, as each crowdsourcing job requires revealing of some sensitive
data to the anonymous human trader. In this paper, the study focused how to guarantee the data
privacy in the crowdsourcing scenario. A probability-based matrix model is inaugurated to
estimate the lower bound and upper bound of the crowdsourcing certainty for the anonymized
data. The model exhibits that K-Anonymity approach needs to solve the trade-off between the
privacy and the accuracy. Propose a novel K-Anonymity approach. Experiments show that the
solution can cultivate high accuracy results for the crowdsourcing jobs.
Privacy Preserving Decision Tree Learning Using Unrealized Data Sets
Author suggested a privacy preserving approach that can be applied to decision tree learning [6],
without loss of accuracy. It deploys the strategies to the preservation of the privacy of collected
data samples. It converts the original sample data sets into a group of unreal data sets, from which
the original samples cannot be, reestablish without the entire group of unreal data sets. In a while
an unreal data sets which directly built an accurate decision tree. It can be applied directly to the
stored data as soon as the first sample is collected. The approach is better than the other privacy
preserving approaches, such as cryptography, for extra protection.
Traffic Information Systems Based On Secure and Privacy-Preserving Smartphone
Author leverage state-of-the-art cryptographic schemes [7] and readily available
telecommunication infrastructure and presented a comprehensive outperform for traffic
estimation on smartphone that is tried and true to be secure and privacy preserving. A localization
algorithm, suitable for GPS location samples, and evaluated it through realistic simulations.
Results confirm it is attainable to build accurate and trustworthy smartphone-based TIS.
International Journal of UbiComp (IJU), Vol.7, No.3, July 2016
4
A Data Mining Perspective in Privacy Preserving Data Mining Systems
The PPDM systems deployed the key exchange process by cryptographic manner and the key
computation process accomplished by a third party. The Key Distribution-Less Privacy
Preserving Data Mining (KDLPPDM) [9] system is designed. The system novelty is that no data
is published in a same while the association rules are reported to achieve effective data mining
results. Commutative RSA cryptographic algorithms are suggested for key exchanging process. It
overcomes the sustentation arising due to key exchange and key computation by applying the
cryptographic algorithm.
Privacy-Preserving Data Analysis
The existing PPDA techniques [12] cannot prevent participating parties from modifying their
private inputs. It is difficult to check whether the parties participating are reliable about their
private input data. Proposed model first develop key theorems, then based on these theorems,
they analyze certain important privacy-preserving data analysis tasks that telling the truth is the
optimized opinion for any participating party. Deterministically non-cooperatively computable
(DNCC) parameter used for measure the system performance. Claim 5.1, as long as the last step
in a PPDA task is in DNCC, it is always possible to make the entire PPDA task satisfying the
DNCC model.
Random Nonlinear Data Distortion for Privacy-Preserving Outlier Detection
The data owner has some private or sensitive data and needs a data miner to access them for
speculating important patterns by which the sensitive information [20] is not revealed. Privacy-
preserving data mining desired to solve this problem by transforming randomly the data prior to
be allowed to the data miners. Previous works only focused towards the case of linear data
perturbations. Author defines nonlinear data distortion through nonlinear random data
transformation.
4. COMPARISONS ON DIFFERENT PRIVACY PRESERVATION TECHNIQUES
TITLE ALGORITHM PARAMETER CONCLUSION
Anonymization of
Centralized and
Distributed Social
Networks by
Sequential Clustering
Anonymization
algorithm and
SaNGreeA
algorithm used for
sequential
clustering
Clustering coefficient,
Diameter,Average distance,
Effective diameter,
Epidemic threshold.
The presented sequential
clustering algorithms for
anonymizing social
networks. Those
algorithms produce
anonymizations by
means of clustering with
better utility.
Data Mining for
Privacy Preserving
Association Rules
Basedon Improved
MASK Algorithm
Data Perturbation
and
QueryRrestriction
(DPQR)
Multi-parameters
perturbation
The privacy-preserving
degree and time-
efficiency is achieved.
The DPQR is more
suitable for Boolean
data.
International Journal of UbiComp (IJU), Vol.7, No.3, July 2016
5
K-Anonymity for
Crowdsourcing
Database
K-Anonymity
algorithm
No. Of Tuples And Data
spaces are used for measure
the performance of the
system.
The Outperforms
standard K-Anonymity
approaches on retaining
the effectiveness of
crowdsourcing.
Privacy Preserving
Decision Tree
Learning
Using Unrealized
Data Sets
Tree learning
Algorithm,
decision tree
generation are
used.
Temperature
Humidity,
Wind
Play.
The decision tree
algorithm is compatible
with other privacy
preserving approaches,
such as cryptography, for
extra protection.
Secure and Privacy-
Preserving
Smartphone-Based
Traffic Information
Systems
KeyGen(n)
algorithm
GSC(group signature
center)Accuracy,Simulation,
time stamp
A localization algorithm,
suitable for GPS location
samples, and evaluated it
through realistic
simulations.
On the Design and
Analysis of the
Privacy-Preserving
SVM Classifier
Data mining
algorithm,
Classification
algorithm, kernal
adatron algorithm
and datafly
algorithm.
Cost parameter,
Kernalparameter are used to
measure the performance of
the system.
PPSVC can achieve
similar classification
accuracy to the original
SVM classifier. By
protecting the sensitive
content of support
vectors.
Privacy-Preserving
Gradient-Descent
Methods
Genetic
Algorithms
Languages modeling
smoothing parameters,
weight parameters are used
to measure the performance
of the system.
The secure building
blocks are scalable and
the proposed protocols
allow us to determine a
better secure protocol for
the applications for each
scenario.
A Data Mining
Perspective in
Privacy Preserving
Data Mining Systems
1.C5.0 data
mining algorithm,
Commutative
RSA
cryptographic
algorithm.
Area covered by roc,
curve data set id, sensitivity,
specificity-1
Overcomes the
overheads arising due to
key exchange and key
computation by adopting
the cryptographic
algorithm.
Incentive Compatible
Privacy-Preserving
Data Analysis
Data analysis
algorithms
Deterministically non-
cooperatively computable
(DNCC).
Claim 5.1, as long as the
last step in a PPDA task
is in DNCC, it is always
possible to make the
entire PPDA task
satisfying the DNCC
model.
International Journal of UbiComp (IJU), Vol.7, No.3, July 2016
6
Privacy and Quality
Preserving
Multimedia Data
Aggregation for
Participatory Sensing
Systems
Outlier detection
anomaly
detection
algorithm, secure
hash algorithm.
Detection rate, data range.
Indices, anomaly score
A general method for
computing the bounds on
a nonlinear privacy-
preserving data-mining
technique with
applications to anomaly
detection.
5. CONCLUSION
Review on data mining privacy preserving in social network. Main objective of this review on
privacy preservative technique is to protect different users and their identities in the social
network along with obtaining originality. To achieve this goal, there is a need to develop perfect
privacy models to specify the expected loss of privacy under different attacks, and deployed
anonymization techniques to the data. So, the various techniques are surveyed.
REFERENCES
[1] Tamir Tassa and Dror J. Cohen”Anonymization Of Centralized And Distributed Social Networks By
Sequential Clustering”, IEEE Transactions On Knowledge And Data Engineering, Vol. 25, No. 2,
February 2013.
[2] Keng-Pei Lin and Ming-Syan Chen, “On The Design And Analysis Of The Privacy-Preserving SVM
Classifier”, IEEE Transactions On Knowledge And Data Engineering, Vol. 23, No. 11, November
2011.
[3] Haoliang Lou, Yunlong Ma, Feng Zhang, Min Liu, Weiming Shen “Data Mining For Privacy
Preserving Association Rules Based On Improved Mask Algorithm” ,Proceedings Of The 2014 IEEE
18th International Conference On Computer Supported Cooperative Work In Design.
[4] Shuguo Han, Wee Keong Ng, Li Wan, and Vincent C.S. Lee “Privacy-Preserving Gradient-Descent
Methods” IEEE Transactions On Knowledge And Data Engineering, Vol. 22, No. 6, June 2010.
[5] Sai Wu, Xiaoli Wang, Sheng Wang, Zhenjie Zhang, And Anthony K.H. Tung “K-Anonymity For
Crowdsourcing Database”, IEEE Transactions On Knowledge And Data Engineering, Vol. 26, No. 9,
September 2014.
[6] Pui K. Fong And Jens H. Weber-Jahnke, “Privacy Preserving Decision Tree Learningusing Unrealized
Data Sets”, IEEE Transactions On Knowledge And Data Engineering, Vol. 24, No. 2, February 2012.
[7] Stylianos Gisdakis, Vasileios Manolopoulos, Sha Tao, Ana Rusu, And Panagiotis Papadimitratos,
“Secure And Privacy-Preserving Smartphone-Based Traffic Information Systems”,IEEE Transactions
On Intelligent Transportation Systems, Vol. 16, No. 3, June 2015.
[8] Kinjal Parmar1, Vinita Shah2, “A Review On Data Anonymization In Privacy Preserving Data
Mining”, International Journal Of Advanced Research In Computer And Communication Engineering,
Vol. 5, Issue 2, February 2016.
[9] Kumaraswamy Sȧ, Manjula S Hȧ, K R Venugopalȧ And L M Patnaikḃ “A Data Mining Perspective In
Privacy Preserving Data Mining Systems”,International Journal Of Current Engineering And
Technology India ,Accepted 20 March 2014, Available Online 01 April 2014, Vol.4, No.2 (April 2014)
[10] Jordi Soria-Comas, Josep Domingo-Ferrer, David Sanchez And Sergio Martınez “T-Closeness
Through Microaggregation: Strict Privacy With Enhanced Utility Preservation “,IEEE Transactions
On Knowledge And Data Engineering, Vol. 27, No. 11, November 2015 .
[11] Jung Yeon Hwang, Liqun Chen, Hyun Sook Cho, And Daehun Nyang”Short Dynamic Group
Signature Scheme Supporting Controllable Linkability “,IEEE Transactions On Information Forensics
And Security, Vol. 10, No. 6, June 2015.
International Journal of UbiComp (IJU), Vol.7, No.3, July 2016
7
[12] Murat Kantarcioglu and Wei Jiang“Incentive Compatible Privacy-Preserving Data Analysis”, IEEE
Transactions On Knowledge And Data Engineering, Vol. 25, No. 6, June 2013.
[13] Lei Xu, Chunxiao Jiang, Yan Chen, Yong Ren, And K. J. Ray Liu, “Privacy Or Utility In Data
Collection?A Contract Theoretic Approach” ,IEEE Journal Of Selected Topics In Signal Processing,
Vol. 9, No. 7, October 2015.
[14] Huang Lin and Yuguang Fang “Privacy-Aware Profiling And Statistical Data Extraction For Smart
Sustainable Energy Systems”, IEEE Transactions On Smart Grid, Vol. 4, No. 1, March 2013.
[15] Depeng Li, Zeyar Aung, John Williams, and Abel Sanchez “P3: Privacy Preservation Protocol For
Automatic appliance Control Application In Smart Grid”, IEEE Internet Of Things Journal, Vol. 1,
No. 5, October 2014.
[16] Fudong Qi, Ieee, Fan Wu, Guihai Chen, “Privacy And Quality Preserving Multimedia Data
Aggregation For Participatory Sensing Systems”,IEEE Internet Of Things Journal, Vol. 1, No. 5,
October 2014.
[17] Günther Eibl, And Dominik Engel, “Influence Of Data Granularity On Smart Meter Privacy”, IEEE
Transactions On Smart Grid, Vol. 6, No. 2, March 2015.
[18] Fosca Giannotti, Laks V. S. Lakshmanan, Anna Monreale, Dino Pedreschi, And Hui (Wendy) Wang
“Privacy-Preserving Mining Of Association Rules From Outsourced Transaction Databases”, IEEE
Systems Journal, Vol. 7, No. 3, September 2013.
[19] Siyuan Liu, Qiang Qu, Lei Chen, And Lionel M. Ni, “SMC: A Practical Schema For Privacy-
Preserved Data Sharing Over Distributed Data Streams”, IEEE Transactions On Big Data, Vol. 1, No.
2, April-June 2015.
[20] Kanishka Bhaduri, Mark D. Stefanski, and Ashok N. Srivastava, “Privacy-Preserving Outlier Detection
Through Random Nonlinear Data Distortion”, IEEE Transactions On Systems, Man, And
Cybernetics—Part B: Cybernetics, Vol. 41, No. 1, February 2011.

More Related Content

Similar to A Review on Privacy Preservation in Data Mining

TUPLE VALUE BASED MULTIPLICATIVE DATA PERTURBATION APPROACH TO PRESERVE PRIVA...
TUPLE VALUE BASED MULTIPLICATIVE DATA PERTURBATION APPROACH TO PRESERVE PRIVA...TUPLE VALUE BASED MULTIPLICATIVE DATA PERTURBATION APPROACH TO PRESERVE PRIVA...
TUPLE VALUE BASED MULTIPLICATIVE DATA PERTURBATION APPROACH TO PRESERVE PRIVA...
IJDKP
 
journal for research
journal for researchjournal for research
journal for research
rikaseorika
 
IRJET- A Study of Privacy Preserving Data Mining and Techniques
IRJET- A Study of Privacy Preserving Data Mining and TechniquesIRJET- A Study of Privacy Preserving Data Mining and Techniques
IRJET- A Study of Privacy Preserving Data Mining and Techniques
IRJET Journal
 
Ib3514141422
Ib3514141422Ib3514141422
Ib3514141422
IJERA Editor
 
Ej24856861
Ej24856861Ej24856861
Ej24856861
IJERA Editor
 
J017536064
J017536064J017536064
J017536064
IOSR Journals
 
A novel ppdm protocol for distributed peer to peer information sources
A novel ppdm protocol for distributed peer to peer information sourcesA novel ppdm protocol for distributed peer to peer information sources
A novel ppdm protocol for distributed peer to peer information sourcesIAEME Publication
 
A privacy leakage upper bound constraint based approach for cost-effective pr...
A privacy leakage upper bound constraint based approach for cost-effective pr...A privacy leakage upper bound constraint based approach for cost-effective pr...
A privacy leakage upper bound constraint based approach for cost-effective pr...
JPINFOTECH JAYAPRAKASH
 
Fundamentals of data mining and its applications
Fundamentals of data mining and its applicationsFundamentals of data mining and its applications
Fundamentals of data mining and its applicationsSubrat Swain
 
Performance Analysis of Hybrid Approach for Privacy Preserving in Data Mining
Performance Analysis of Hybrid Approach for Privacy Preserving in Data MiningPerformance Analysis of Hybrid Approach for Privacy Preserving in Data Mining
Performance Analysis of Hybrid Approach for Privacy Preserving in Data Mining
idescitation
 
Bj32809815
Bj32809815Bj32809815
Bj32809815IJMER
 
Privacy Preserving Distributed Association Rule Mining Algorithm for Vertical...
Privacy Preserving Distributed Association Rule Mining Algorithm for Vertical...Privacy Preserving Distributed Association Rule Mining Algorithm for Vertical...
Privacy Preserving Distributed Association Rule Mining Algorithm for Vertical...
IJCSIS Research Publications
 
A Frame Work for Ontological Privacy Preserved Mining
A Frame Work for Ontological Privacy Preserved MiningA Frame Work for Ontological Privacy Preserved Mining
A Frame Work for Ontological Privacy Preserved Mining
IJNSA Journal
 
Additive gaussian noise based data perturbation in multi level trust privacy ...
Additive gaussian noise based data perturbation in multi level trust privacy ...Additive gaussian noise based data perturbation in multi level trust privacy ...
Additive gaussian noise based data perturbation in multi level trust privacy ...
IJDKP
 
Efficient technique for privacy preserving publishing of set valued data on c...
Efficient technique for privacy preserving publishing of set valued data on c...Efficient technique for privacy preserving publishing of set valued data on c...
Efficient technique for privacy preserving publishing of set valued data on c...
ElavarasaN GanesaN
 
Misusability Measure Based Sanitization of Big Data for Privacy Preserving Ma...
Misusability Measure Based Sanitization of Big Data for Privacy Preserving Ma...Misusability Measure Based Sanitization of Big Data for Privacy Preserving Ma...
Misusability Measure Based Sanitization of Big Data for Privacy Preserving Ma...
IJECEIAES
 
Privacy Preserving in Cloud Using Distinctive Elliptic Curve Cryptosystem (DECC)
Privacy Preserving in Cloud Using Distinctive Elliptic Curve Cryptosystem (DECC)Privacy Preserving in Cloud Using Distinctive Elliptic Curve Cryptosystem (DECC)
Privacy Preserving in Cloud Using Distinctive Elliptic Curve Cryptosystem (DECC)
ElavarasaN GanesaN
 
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT A privacy leakage upper bound con...
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT A privacy leakage upper bound con...JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT A privacy leakage upper bound con...
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT A privacy leakage upper bound con...
IEEEGLOBALSOFTTECHNOLOGIES
 
E04623438
E04623438E04623438
E04623438
IOSR-JEN
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
IJERD Editor
 

Similar to A Review on Privacy Preservation in Data Mining (20)

TUPLE VALUE BASED MULTIPLICATIVE DATA PERTURBATION APPROACH TO PRESERVE PRIVA...
TUPLE VALUE BASED MULTIPLICATIVE DATA PERTURBATION APPROACH TO PRESERVE PRIVA...TUPLE VALUE BASED MULTIPLICATIVE DATA PERTURBATION APPROACH TO PRESERVE PRIVA...
TUPLE VALUE BASED MULTIPLICATIVE DATA PERTURBATION APPROACH TO PRESERVE PRIVA...
 
journal for research
journal for researchjournal for research
journal for research
 
IRJET- A Study of Privacy Preserving Data Mining and Techniques
IRJET- A Study of Privacy Preserving Data Mining and TechniquesIRJET- A Study of Privacy Preserving Data Mining and Techniques
IRJET- A Study of Privacy Preserving Data Mining and Techniques
 
Ib3514141422
Ib3514141422Ib3514141422
Ib3514141422
 
Ej24856861
Ej24856861Ej24856861
Ej24856861
 
J017536064
J017536064J017536064
J017536064
 
A novel ppdm protocol for distributed peer to peer information sources
A novel ppdm protocol for distributed peer to peer information sourcesA novel ppdm protocol for distributed peer to peer information sources
A novel ppdm protocol for distributed peer to peer information sources
 
A privacy leakage upper bound constraint based approach for cost-effective pr...
A privacy leakage upper bound constraint based approach for cost-effective pr...A privacy leakage upper bound constraint based approach for cost-effective pr...
A privacy leakage upper bound constraint based approach for cost-effective pr...
 
Fundamentals of data mining and its applications
Fundamentals of data mining and its applicationsFundamentals of data mining and its applications
Fundamentals of data mining and its applications
 
Performance Analysis of Hybrid Approach for Privacy Preserving in Data Mining
Performance Analysis of Hybrid Approach for Privacy Preserving in Data MiningPerformance Analysis of Hybrid Approach for Privacy Preserving in Data Mining
Performance Analysis of Hybrid Approach for Privacy Preserving in Data Mining
 
Bj32809815
Bj32809815Bj32809815
Bj32809815
 
Privacy Preserving Distributed Association Rule Mining Algorithm for Vertical...
Privacy Preserving Distributed Association Rule Mining Algorithm for Vertical...Privacy Preserving Distributed Association Rule Mining Algorithm for Vertical...
Privacy Preserving Distributed Association Rule Mining Algorithm for Vertical...
 
A Frame Work for Ontological Privacy Preserved Mining
A Frame Work for Ontological Privacy Preserved MiningA Frame Work for Ontological Privacy Preserved Mining
A Frame Work for Ontological Privacy Preserved Mining
 
Additive gaussian noise based data perturbation in multi level trust privacy ...
Additive gaussian noise based data perturbation in multi level trust privacy ...Additive gaussian noise based data perturbation in multi level trust privacy ...
Additive gaussian noise based data perturbation in multi level trust privacy ...
 
Efficient technique for privacy preserving publishing of set valued data on c...
Efficient technique for privacy preserving publishing of set valued data on c...Efficient technique for privacy preserving publishing of set valued data on c...
Efficient technique for privacy preserving publishing of set valued data on c...
 
Misusability Measure Based Sanitization of Big Data for Privacy Preserving Ma...
Misusability Measure Based Sanitization of Big Data for Privacy Preserving Ma...Misusability Measure Based Sanitization of Big Data for Privacy Preserving Ma...
Misusability Measure Based Sanitization of Big Data for Privacy Preserving Ma...
 
Privacy Preserving in Cloud Using Distinctive Elliptic Curve Cryptosystem (DECC)
Privacy Preserving in Cloud Using Distinctive Elliptic Curve Cryptosystem (DECC)Privacy Preserving in Cloud Using Distinctive Elliptic Curve Cryptosystem (DECC)
Privacy Preserving in Cloud Using Distinctive Elliptic Curve Cryptosystem (DECC)
 
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT A privacy leakage upper bound con...
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT A privacy leakage upper bound con...JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT A privacy leakage upper bound con...
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT A privacy leakage upper bound con...
 
E04623438
E04623438E04623438
E04623438
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 

More from ijujournal

Users Approach on Providing Feedback for Smart Home Devices – Phase II
Users Approach on Providing Feedback for Smart Home Devices – Phase IIUsers Approach on Providing Feedback for Smart Home Devices – Phase II
Users Approach on Providing Feedback for Smart Home Devices – Phase II
ijujournal
 
Users Approach on Providing Feedback for Smart Home Devices – Phase II
Users Approach on Providing Feedback for Smart Home Devices – Phase IIUsers Approach on Providing Feedback for Smart Home Devices – Phase II
Users Approach on Providing Feedback for Smart Home Devices – Phase II
ijujournal
 
October 2023-Top Cited Articles in IJU.pdf
October 2023-Top Cited Articles in IJU.pdfOctober 2023-Top Cited Articles in IJU.pdf
October 2023-Top Cited Articles in IJU.pdf
ijujournal
 
ACCELERATION DETECTION OF LARGE (PROBABLY) PRIME NUMBERS
ACCELERATION DETECTION OF LARGE (PROBABLY) PRIME NUMBERSACCELERATION DETECTION OF LARGE (PROBABLY) PRIME NUMBERS
ACCELERATION DETECTION OF LARGE (PROBABLY) PRIME NUMBERS
ijujournal
 
A novel integrated approach for handling anomalies in RFID data
A novel integrated approach for handling anomalies in RFID dataA novel integrated approach for handling anomalies in RFID data
A novel integrated approach for handling anomalies in RFID data
ijujournal
 
UBIQUITOUS HEALTHCARE MONITORING SYSTEM USING INTEGRATED TRIAXIAL ACCELEROMET...
UBIQUITOUS HEALTHCARE MONITORING SYSTEM USING INTEGRATED TRIAXIAL ACCELEROMET...UBIQUITOUS HEALTHCARE MONITORING SYSTEM USING INTEGRATED TRIAXIAL ACCELEROMET...
UBIQUITOUS HEALTHCARE MONITORING SYSTEM USING INTEGRATED TRIAXIAL ACCELEROMET...
ijujournal
 
ENHANCING INDEPENDENT SENIOR LIVING THROUGH SMART HOME TECHNOLOGIES
ENHANCING INDEPENDENT SENIOR LIVING THROUGH SMART HOME TECHNOLOGIESENHANCING INDEPENDENT SENIOR LIVING THROUGH SMART HOME TECHNOLOGIES
ENHANCING INDEPENDENT SENIOR LIVING THROUGH SMART HOME TECHNOLOGIES
ijujournal
 
HMR LOG ANALYZER: ANALYZE WEB APPLICATION LOGS OVER HADOOP MAPREDUCE
HMR LOG ANALYZER: ANALYZE WEB APPLICATION LOGS OVER HADOOP MAPREDUCEHMR LOG ANALYZER: ANALYZE WEB APPLICATION LOGS OVER HADOOP MAPREDUCE
HMR LOG ANALYZER: ANALYZE WEB APPLICATION LOGS OVER HADOOP MAPREDUCE
ijujournal
 
SERVICE DISCOVERY – A SURVEY AND COMPARISON
SERVICE DISCOVERY – A SURVEY AND COMPARISONSERVICE DISCOVERY – A SURVEY AND COMPARISON
SERVICE DISCOVERY – A SURVEY AND COMPARISON
ijujournal
 
SIX DEGREES OF SEPARATION TO IMPROVE ROUTING IN OPPORTUNISTIC NETWORKS
SIX DEGREES OF SEPARATION TO IMPROVE ROUTING IN OPPORTUNISTIC NETWORKSSIX DEGREES OF SEPARATION TO IMPROVE ROUTING IN OPPORTUNISTIC NETWORKS
SIX DEGREES OF SEPARATION TO IMPROVE ROUTING IN OPPORTUNISTIC NETWORKS
ijujournal
 
International Journal of Ubiquitous Computing (IJU)
International Journal of Ubiquitous Computing (IJU)International Journal of Ubiquitous Computing (IJU)
International Journal of Ubiquitous Computing (IJU)
ijujournal
 
PERVASIVE COMPUTING APPLIED TO THE CARE OF PATIENTS WITH DEMENTIA IN HOMECARE...
PERVASIVE COMPUTING APPLIED TO THE CARE OF PATIENTS WITH DEMENTIA IN HOMECARE...PERVASIVE COMPUTING APPLIED TO THE CARE OF PATIENTS WITH DEMENTIA IN HOMECARE...
PERVASIVE COMPUTING APPLIED TO THE CARE OF PATIENTS WITH DEMENTIA IN HOMECARE...
ijujournal
 
A proposed Novel Approach for Sentiment Analysis and Opinion Mining
A proposed Novel Approach for Sentiment Analysis and Opinion MiningA proposed Novel Approach for Sentiment Analysis and Opinion Mining
A proposed Novel Approach for Sentiment Analysis and Opinion Mining
ijujournal
 
International Journal of Ubiquitous Computing (IJU)
International Journal of Ubiquitous Computing (IJU)International Journal of Ubiquitous Computing (IJU)
International Journal of Ubiquitous Computing (IJU)
ijujournal
 
USABILITY ENGINEERING OF GAMES: A COMPARATIVE ANALYSIS OF MEASURING EXCITEMEN...
USABILITY ENGINEERING OF GAMES: A COMPARATIVE ANALYSIS OF MEASURING EXCITEMEN...USABILITY ENGINEERING OF GAMES: A COMPARATIVE ANALYSIS OF MEASURING EXCITEMEN...
USABILITY ENGINEERING OF GAMES: A COMPARATIVE ANALYSIS OF MEASURING EXCITEMEN...
ijujournal
 
SECURED SMART SYSTEM DESING IN PERVASIVE COMPUTING ENVIRONMENT USING VCS
SECURED SMART SYSTEM DESING IN PERVASIVE COMPUTING ENVIRONMENT USING VCSSECURED SMART SYSTEM DESING IN PERVASIVE COMPUTING ENVIRONMENT USING VCS
SECURED SMART SYSTEM DESING IN PERVASIVE COMPUTING ENVIRONMENT USING VCS
ijujournal
 
PERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
PERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSPERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
PERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
ijujournal
 
PERFORMANCE COMPARISON OF OCR TOOLS
PERFORMANCE COMPARISON OF OCR TOOLSPERFORMANCE COMPARISON OF OCR TOOLS
PERFORMANCE COMPARISON OF OCR TOOLS
ijujournal
 
PERFORMANCE COMPARISON OF OCR TOOLS
PERFORMANCE COMPARISON OF OCR TOOLSPERFORMANCE COMPARISON OF OCR TOOLS
PERFORMANCE COMPARISON OF OCR TOOLS
ijujournal
 
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2RDETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
ijujournal
 

More from ijujournal (20)

Users Approach on Providing Feedback for Smart Home Devices – Phase II
Users Approach on Providing Feedback for Smart Home Devices – Phase IIUsers Approach on Providing Feedback for Smart Home Devices – Phase II
Users Approach on Providing Feedback for Smart Home Devices – Phase II
 
Users Approach on Providing Feedback for Smart Home Devices – Phase II
Users Approach on Providing Feedback for Smart Home Devices – Phase IIUsers Approach on Providing Feedback for Smart Home Devices – Phase II
Users Approach on Providing Feedback for Smart Home Devices – Phase II
 
October 2023-Top Cited Articles in IJU.pdf
October 2023-Top Cited Articles in IJU.pdfOctober 2023-Top Cited Articles in IJU.pdf
October 2023-Top Cited Articles in IJU.pdf
 
ACCELERATION DETECTION OF LARGE (PROBABLY) PRIME NUMBERS
ACCELERATION DETECTION OF LARGE (PROBABLY) PRIME NUMBERSACCELERATION DETECTION OF LARGE (PROBABLY) PRIME NUMBERS
ACCELERATION DETECTION OF LARGE (PROBABLY) PRIME NUMBERS
 
A novel integrated approach for handling anomalies in RFID data
A novel integrated approach for handling anomalies in RFID dataA novel integrated approach for handling anomalies in RFID data
A novel integrated approach for handling anomalies in RFID data
 
UBIQUITOUS HEALTHCARE MONITORING SYSTEM USING INTEGRATED TRIAXIAL ACCELEROMET...
UBIQUITOUS HEALTHCARE MONITORING SYSTEM USING INTEGRATED TRIAXIAL ACCELEROMET...UBIQUITOUS HEALTHCARE MONITORING SYSTEM USING INTEGRATED TRIAXIAL ACCELEROMET...
UBIQUITOUS HEALTHCARE MONITORING SYSTEM USING INTEGRATED TRIAXIAL ACCELEROMET...
 
ENHANCING INDEPENDENT SENIOR LIVING THROUGH SMART HOME TECHNOLOGIES
ENHANCING INDEPENDENT SENIOR LIVING THROUGH SMART HOME TECHNOLOGIESENHANCING INDEPENDENT SENIOR LIVING THROUGH SMART HOME TECHNOLOGIES
ENHANCING INDEPENDENT SENIOR LIVING THROUGH SMART HOME TECHNOLOGIES
 
HMR LOG ANALYZER: ANALYZE WEB APPLICATION LOGS OVER HADOOP MAPREDUCE
HMR LOG ANALYZER: ANALYZE WEB APPLICATION LOGS OVER HADOOP MAPREDUCEHMR LOG ANALYZER: ANALYZE WEB APPLICATION LOGS OVER HADOOP MAPREDUCE
HMR LOG ANALYZER: ANALYZE WEB APPLICATION LOGS OVER HADOOP MAPREDUCE
 
SERVICE DISCOVERY – A SURVEY AND COMPARISON
SERVICE DISCOVERY – A SURVEY AND COMPARISONSERVICE DISCOVERY – A SURVEY AND COMPARISON
SERVICE DISCOVERY – A SURVEY AND COMPARISON
 
SIX DEGREES OF SEPARATION TO IMPROVE ROUTING IN OPPORTUNISTIC NETWORKS
SIX DEGREES OF SEPARATION TO IMPROVE ROUTING IN OPPORTUNISTIC NETWORKSSIX DEGREES OF SEPARATION TO IMPROVE ROUTING IN OPPORTUNISTIC NETWORKS
SIX DEGREES OF SEPARATION TO IMPROVE ROUTING IN OPPORTUNISTIC NETWORKS
 
International Journal of Ubiquitous Computing (IJU)
International Journal of Ubiquitous Computing (IJU)International Journal of Ubiquitous Computing (IJU)
International Journal of Ubiquitous Computing (IJU)
 
PERVASIVE COMPUTING APPLIED TO THE CARE OF PATIENTS WITH DEMENTIA IN HOMECARE...
PERVASIVE COMPUTING APPLIED TO THE CARE OF PATIENTS WITH DEMENTIA IN HOMECARE...PERVASIVE COMPUTING APPLIED TO THE CARE OF PATIENTS WITH DEMENTIA IN HOMECARE...
PERVASIVE COMPUTING APPLIED TO THE CARE OF PATIENTS WITH DEMENTIA IN HOMECARE...
 
A proposed Novel Approach for Sentiment Analysis and Opinion Mining
A proposed Novel Approach for Sentiment Analysis and Opinion MiningA proposed Novel Approach for Sentiment Analysis and Opinion Mining
A proposed Novel Approach for Sentiment Analysis and Opinion Mining
 
International Journal of Ubiquitous Computing (IJU)
International Journal of Ubiquitous Computing (IJU)International Journal of Ubiquitous Computing (IJU)
International Journal of Ubiquitous Computing (IJU)
 
USABILITY ENGINEERING OF GAMES: A COMPARATIVE ANALYSIS OF MEASURING EXCITEMEN...
USABILITY ENGINEERING OF GAMES: A COMPARATIVE ANALYSIS OF MEASURING EXCITEMEN...USABILITY ENGINEERING OF GAMES: A COMPARATIVE ANALYSIS OF MEASURING EXCITEMEN...
USABILITY ENGINEERING OF GAMES: A COMPARATIVE ANALYSIS OF MEASURING EXCITEMEN...
 
SECURED SMART SYSTEM DESING IN PERVASIVE COMPUTING ENVIRONMENT USING VCS
SECURED SMART SYSTEM DESING IN PERVASIVE COMPUTING ENVIRONMENT USING VCSSECURED SMART SYSTEM DESING IN PERVASIVE COMPUTING ENVIRONMENT USING VCS
SECURED SMART SYSTEM DESING IN PERVASIVE COMPUTING ENVIRONMENT USING VCS
 
PERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
PERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSPERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
PERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
 
PERFORMANCE COMPARISON OF OCR TOOLS
PERFORMANCE COMPARISON OF OCR TOOLSPERFORMANCE COMPARISON OF OCR TOOLS
PERFORMANCE COMPARISON OF OCR TOOLS
 
PERFORMANCE COMPARISON OF OCR TOOLS
PERFORMANCE COMPARISON OF OCR TOOLSPERFORMANCE COMPARISON OF OCR TOOLS
PERFORMANCE COMPARISON OF OCR TOOLS
 
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2RDETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
 

Recently uploaded

Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
WENKENLI1
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
AmarGB2
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
zwunae
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 

Recently uploaded (20)

Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 

A Review on Privacy Preservation in Data Mining

  • 1. International Journal of UbiComp (IJU), Vol.7, No.3, July 2016 DOI:10.5121/iju.2016.7301 1 A Review on Privacy Preservation in Data Mining 1 T.Nandhini, 2 D. Vanathi, 3 Dr.P.Sengottuvelan 1 M.E.Scholar, Department of Computer Science & Engineering, Nandha Engineering College, Erode-638052, Tamil Nadu, India 2 Associate Professor, Department of Computer Science & Engineering, Nandha Engineering College, Erode-638052, Tamil Nadu, India 3 Associate Professor & Head, Department Of Computer Science, Periyar University PG Extension Cente, Darmapuri ABSTRACT The main focus of privacy preserving data publishing was to enhance traditional data mining techniques for masking sensitive information through data modification. The major issues were how to modify the data and how to recover the data mining result from the altered data. The reports were often tightly coupled with the data mining algorithms under consideration. Privacy preserving data publishing focuses on techniques for publishing data, not techniques for data mining. In case, it is expected that standard data mining techniques are applied on the published data. Anonymization of the data is done by hiding the identity of record owners, whereas privacy preserving data mining seeks to directly belie the sensitive data. This survey carries out the various privacy preservation techniques and algorithms. KEYWORDS Data mining, privacy preserving, Anonymization 1. INTRODUCTION The huge amount of data available in information databases becomes worthless until the useful information is extracted. Mining knowledge from the data is said to be data mining. The two steps are analyse and extract useful information from database is mandatory for further use in different work environments like market analysis, fraud detection, science exploration, etc. Information extraction carried out the following duties such as cleaning data, integration of data, transformation of data, pattern evaluation, and data presentation. The boom of data mining relies on the availability of high in data quality and effective sharing. The figure 1 explains the process of privacy preservation technique. Figure 1 privacy preservation technique
  • 2. International Journal of UbiComp (IJU), Vol.7, No.3, July 2016 2 The data mining works with generation of association rules, the modification in support and confidence of the association rule for masking sensitive rules is done. A concept named „not altering the support‟ is deployed to hide an association rule. There are two approaches in privacy preserving data mining. The data Perturbing values for preservation of customer privacy is the first approach. The other approach is Cryptographic tools to build data mining models. Privacy preserving [12] is said to be worked out when the attacker is not able to learn anything extra from the given data even though with the presence of his background knowledge obtained from other sources. 2. OVERVIEW Privacy preservation The main focus of privacy preserving data publishing was to enhance traditional data mining techniques which mask the sensitive information by modifying the data. The major issues were how to modify the data and how to rediscover the data mining result from the modified data. The data Perturbing values for preservation of customer privacy is the first approach. The other approach is Cryptographic tools to build data mining models. Privacy preserving [12] is preferred to be go out when the attacker is unable to know anything extra from the given data even though with the presence of his background knowledge obtained from other sources. Anonymization Anonymization of the data is done by hiding the identity of record owners, whereas privacy preserving data mining seeks to directly belie the sensitive data. The problem of privacy- preservation in social networks is a major problem. The goal is to arrive at an anonymized view of the network which is unified without flat out to any of the data holder‟s information apropos links amid nodes that are controlled by other data holders. The anonymization algorithm and SaNGreeA algorithm [1] used for sequential clustering. Anonymity parameters are used for sequential clustering algorithms for anonymizing social networks. 3. LITERATURE SURVEY Sequential Clustering for Anonymization of Centralized and Distributed Social Networks The complication of privacy-preservation in social networks is a major problem. The goal is to arrive at an anonymized view of the unified network without eloquent to any of the data holder‟s information about links between nodes that are controlled by other data holders. The anonymization algorithm and SaNGreeA algorithm [1] used for sequential clustering. Anonymity parameters are used for anonymizing social networks by using sequential clustering algorithms. Several algorithms produce anonymizations by means of clustering which have an efficient utility than those achieved by existing algorithms. On the Design and Analysis of the Privacy-Preserving SVM Classifier SVM classifier without exposing the private content of training data is preferably said as Privacy- Preserving SVM Classifier [2]. Data mining algorithm, Classification classifier for public use or deliver the SVM classifier to clients will bare the private content of support vectors. This violates the privacy-preserving needs for some legal or commercial account. Privacy violation problem, and propose an approach as a base technique for the SVM classifier to revamp it to a privacy- preserving classifier which does not announce the private content of support vectors.
  • 3. International Journal of UbiComp (IJU), Vol.7, No.3, July 2016 3 Improved MASK Algorithm for Privacy Preserving Association Rules on Data Mining A data perturbation strategy is implemented through the MASK algorithm, which leads to a debased privacy-preserving degree. In a while, it is challenging to handle the MASK algorithm into real time due to long execution time. A hybrid algorithm encapsulated with data perturbation and query restriction (DPQR) [3] to maximize the privacy-preserving degree by multi-parameters perturbation. Data Perturbation and Query Restriction (DPQR) algorithm are used to improve privacy-preserving degree and time-efficiency is achieved. The proposed DPQR is more suitable for Boolean data, and it cannot deal with numerical data or other types of data. Privacy-Preserving Gradient-Descent Methods Gradient descent [4] aims to minimize a target function in order to reach a local trace. In data mining, this function accords to a decision model that is to be discovered. The author present two technical approaches stochastic approach and least square approach. Languages modeling smoothing parameters, weight parameter are used to measure the performance of the system. The proposed secure building blocks are scalable and the proposed protocols permit us to determine an efficient secure protocol for the applications for each scenario.The author will extend PPGD to vertically partitioned data implementing the least square approach for N-number of parities. Crowd sourcing Database for K-Anonymity Author suggested integrating the crowdsourcing techniques [5] into the database engine. It addresses the privacy concern, as each crowdsourcing job requires revealing of some sensitive data to the anonymous human trader. In this paper, the study focused how to guarantee the data privacy in the crowdsourcing scenario. A probability-based matrix model is inaugurated to estimate the lower bound and upper bound of the crowdsourcing certainty for the anonymized data. The model exhibits that K-Anonymity approach needs to solve the trade-off between the privacy and the accuracy. Propose a novel K-Anonymity approach. Experiments show that the solution can cultivate high accuracy results for the crowdsourcing jobs. Privacy Preserving Decision Tree Learning Using Unrealized Data Sets Author suggested a privacy preserving approach that can be applied to decision tree learning [6], without loss of accuracy. It deploys the strategies to the preservation of the privacy of collected data samples. It converts the original sample data sets into a group of unreal data sets, from which the original samples cannot be, reestablish without the entire group of unreal data sets. In a while an unreal data sets which directly built an accurate decision tree. It can be applied directly to the stored data as soon as the first sample is collected. The approach is better than the other privacy preserving approaches, such as cryptography, for extra protection. Traffic Information Systems Based On Secure and Privacy-Preserving Smartphone Author leverage state-of-the-art cryptographic schemes [7] and readily available telecommunication infrastructure and presented a comprehensive outperform for traffic estimation on smartphone that is tried and true to be secure and privacy preserving. A localization algorithm, suitable for GPS location samples, and evaluated it through realistic simulations. Results confirm it is attainable to build accurate and trustworthy smartphone-based TIS.
  • 4. International Journal of UbiComp (IJU), Vol.7, No.3, July 2016 4 A Data Mining Perspective in Privacy Preserving Data Mining Systems The PPDM systems deployed the key exchange process by cryptographic manner and the key computation process accomplished by a third party. The Key Distribution-Less Privacy Preserving Data Mining (KDLPPDM) [9] system is designed. The system novelty is that no data is published in a same while the association rules are reported to achieve effective data mining results. Commutative RSA cryptographic algorithms are suggested for key exchanging process. It overcomes the sustentation arising due to key exchange and key computation by applying the cryptographic algorithm. Privacy-Preserving Data Analysis The existing PPDA techniques [12] cannot prevent participating parties from modifying their private inputs. It is difficult to check whether the parties participating are reliable about their private input data. Proposed model first develop key theorems, then based on these theorems, they analyze certain important privacy-preserving data analysis tasks that telling the truth is the optimized opinion for any participating party. Deterministically non-cooperatively computable (DNCC) parameter used for measure the system performance. Claim 5.1, as long as the last step in a PPDA task is in DNCC, it is always possible to make the entire PPDA task satisfying the DNCC model. Random Nonlinear Data Distortion for Privacy-Preserving Outlier Detection The data owner has some private or sensitive data and needs a data miner to access them for speculating important patterns by which the sensitive information [20] is not revealed. Privacy- preserving data mining desired to solve this problem by transforming randomly the data prior to be allowed to the data miners. Previous works only focused towards the case of linear data perturbations. Author defines nonlinear data distortion through nonlinear random data transformation. 4. COMPARISONS ON DIFFERENT PRIVACY PRESERVATION TECHNIQUES TITLE ALGORITHM PARAMETER CONCLUSION Anonymization of Centralized and Distributed Social Networks by Sequential Clustering Anonymization algorithm and SaNGreeA algorithm used for sequential clustering Clustering coefficient, Diameter,Average distance, Effective diameter, Epidemic threshold. The presented sequential clustering algorithms for anonymizing social networks. Those algorithms produce anonymizations by means of clustering with better utility. Data Mining for Privacy Preserving Association Rules Basedon Improved MASK Algorithm Data Perturbation and QueryRrestriction (DPQR) Multi-parameters perturbation The privacy-preserving degree and time- efficiency is achieved. The DPQR is more suitable for Boolean data.
  • 5. International Journal of UbiComp (IJU), Vol.7, No.3, July 2016 5 K-Anonymity for Crowdsourcing Database K-Anonymity algorithm No. Of Tuples And Data spaces are used for measure the performance of the system. The Outperforms standard K-Anonymity approaches on retaining the effectiveness of crowdsourcing. Privacy Preserving Decision Tree Learning Using Unrealized Data Sets Tree learning Algorithm, decision tree generation are used. Temperature Humidity, Wind Play. The decision tree algorithm is compatible with other privacy preserving approaches, such as cryptography, for extra protection. Secure and Privacy- Preserving Smartphone-Based Traffic Information Systems KeyGen(n) algorithm GSC(group signature center)Accuracy,Simulation, time stamp A localization algorithm, suitable for GPS location samples, and evaluated it through realistic simulations. On the Design and Analysis of the Privacy-Preserving SVM Classifier Data mining algorithm, Classification algorithm, kernal adatron algorithm and datafly algorithm. Cost parameter, Kernalparameter are used to measure the performance of the system. PPSVC can achieve similar classification accuracy to the original SVM classifier. By protecting the sensitive content of support vectors. Privacy-Preserving Gradient-Descent Methods Genetic Algorithms Languages modeling smoothing parameters, weight parameters are used to measure the performance of the system. The secure building blocks are scalable and the proposed protocols allow us to determine a better secure protocol for the applications for each scenario. A Data Mining Perspective in Privacy Preserving Data Mining Systems 1.C5.0 data mining algorithm, Commutative RSA cryptographic algorithm. Area covered by roc, curve data set id, sensitivity, specificity-1 Overcomes the overheads arising due to key exchange and key computation by adopting the cryptographic algorithm. Incentive Compatible Privacy-Preserving Data Analysis Data analysis algorithms Deterministically non- cooperatively computable (DNCC). Claim 5.1, as long as the last step in a PPDA task is in DNCC, it is always possible to make the entire PPDA task satisfying the DNCC model.
  • 6. International Journal of UbiComp (IJU), Vol.7, No.3, July 2016 6 Privacy and Quality Preserving Multimedia Data Aggregation for Participatory Sensing Systems Outlier detection anomaly detection algorithm, secure hash algorithm. Detection rate, data range. Indices, anomaly score A general method for computing the bounds on a nonlinear privacy- preserving data-mining technique with applications to anomaly detection. 5. CONCLUSION Review on data mining privacy preserving in social network. Main objective of this review on privacy preservative technique is to protect different users and their identities in the social network along with obtaining originality. To achieve this goal, there is a need to develop perfect privacy models to specify the expected loss of privacy under different attacks, and deployed anonymization techniques to the data. So, the various techniques are surveyed. REFERENCES [1] Tamir Tassa and Dror J. Cohen”Anonymization Of Centralized And Distributed Social Networks By Sequential Clustering”, IEEE Transactions On Knowledge And Data Engineering, Vol. 25, No. 2, February 2013. [2] Keng-Pei Lin and Ming-Syan Chen, “On The Design And Analysis Of The Privacy-Preserving SVM Classifier”, IEEE Transactions On Knowledge And Data Engineering, Vol. 23, No. 11, November 2011. [3] Haoliang Lou, Yunlong Ma, Feng Zhang, Min Liu, Weiming Shen “Data Mining For Privacy Preserving Association Rules Based On Improved Mask Algorithm” ,Proceedings Of The 2014 IEEE 18th International Conference On Computer Supported Cooperative Work In Design. [4] Shuguo Han, Wee Keong Ng, Li Wan, and Vincent C.S. Lee “Privacy-Preserving Gradient-Descent Methods” IEEE Transactions On Knowledge And Data Engineering, Vol. 22, No. 6, June 2010. [5] Sai Wu, Xiaoli Wang, Sheng Wang, Zhenjie Zhang, And Anthony K.H. Tung “K-Anonymity For Crowdsourcing Database”, IEEE Transactions On Knowledge And Data Engineering, Vol. 26, No. 9, September 2014. [6] Pui K. Fong And Jens H. Weber-Jahnke, “Privacy Preserving Decision Tree Learningusing Unrealized Data Sets”, IEEE Transactions On Knowledge And Data Engineering, Vol. 24, No. 2, February 2012. [7] Stylianos Gisdakis, Vasileios Manolopoulos, Sha Tao, Ana Rusu, And Panagiotis Papadimitratos, “Secure And Privacy-Preserving Smartphone-Based Traffic Information Systems”,IEEE Transactions On Intelligent Transportation Systems, Vol. 16, No. 3, June 2015. [8] Kinjal Parmar1, Vinita Shah2, “A Review On Data Anonymization In Privacy Preserving Data Mining”, International Journal Of Advanced Research In Computer And Communication Engineering, Vol. 5, Issue 2, February 2016. [9] Kumaraswamy Sȧ, Manjula S Hȧ, K R Venugopalȧ And L M Patnaikḃ “A Data Mining Perspective In Privacy Preserving Data Mining Systems”,International Journal Of Current Engineering And Technology India ,Accepted 20 March 2014, Available Online 01 April 2014, Vol.4, No.2 (April 2014) [10] Jordi Soria-Comas, Josep Domingo-Ferrer, David Sanchez And Sergio Martınez “T-Closeness Through Microaggregation: Strict Privacy With Enhanced Utility Preservation “,IEEE Transactions On Knowledge And Data Engineering, Vol. 27, No. 11, November 2015 . [11] Jung Yeon Hwang, Liqun Chen, Hyun Sook Cho, And Daehun Nyang”Short Dynamic Group Signature Scheme Supporting Controllable Linkability “,IEEE Transactions On Information Forensics And Security, Vol. 10, No. 6, June 2015.
  • 7. International Journal of UbiComp (IJU), Vol.7, No.3, July 2016 7 [12] Murat Kantarcioglu and Wei Jiang“Incentive Compatible Privacy-Preserving Data Analysis”, IEEE Transactions On Knowledge And Data Engineering, Vol. 25, No. 6, June 2013. [13] Lei Xu, Chunxiao Jiang, Yan Chen, Yong Ren, And K. J. Ray Liu, “Privacy Or Utility In Data Collection?A Contract Theoretic Approach” ,IEEE Journal Of Selected Topics In Signal Processing, Vol. 9, No. 7, October 2015. [14] Huang Lin and Yuguang Fang “Privacy-Aware Profiling And Statistical Data Extraction For Smart Sustainable Energy Systems”, IEEE Transactions On Smart Grid, Vol. 4, No. 1, March 2013. [15] Depeng Li, Zeyar Aung, John Williams, and Abel Sanchez “P3: Privacy Preservation Protocol For Automatic appliance Control Application In Smart Grid”, IEEE Internet Of Things Journal, Vol. 1, No. 5, October 2014. [16] Fudong Qi, Ieee, Fan Wu, Guihai Chen, “Privacy And Quality Preserving Multimedia Data Aggregation For Participatory Sensing Systems”,IEEE Internet Of Things Journal, Vol. 1, No. 5, October 2014. [17] Günther Eibl, And Dominik Engel, “Influence Of Data Granularity On Smart Meter Privacy”, IEEE Transactions On Smart Grid, Vol. 6, No. 2, March 2015. [18] Fosca Giannotti, Laks V. S. Lakshmanan, Anna Monreale, Dino Pedreschi, And Hui (Wendy) Wang “Privacy-Preserving Mining Of Association Rules From Outsourced Transaction Databases”, IEEE Systems Journal, Vol. 7, No. 3, September 2013. [19] Siyuan Liu, Qiang Qu, Lei Chen, And Lionel M. Ni, “SMC: A Practical Schema For Privacy- Preserved Data Sharing Over Distributed Data Streams”, IEEE Transactions On Big Data, Vol. 1, No. 2, April-June 2015. [20] Kanishka Bhaduri, Mark D. Stefanski, and Ashok N. Srivastava, “Privacy-Preserving Outlier Detection Through Random Nonlinear Data Distortion”, IEEE Transactions On Systems, Man, And Cybernetics—Part B: Cybernetics, Vol. 41, No. 1, February 2011.