SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 867
A Survey on Features and Techniques Description for Privacy of
Sensitive Information
Archana Singh1, Varun Singh2
1M.Tech. Scholar, Computer Science Dept. MIT College Rewa, M.P.
2Asst. Prof. Computer Science Dept. MIT College Rewa, M.P.
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - User privacy protection is of the utmost importance.
Privacy has been acknowledged as a human right that is beneficial
not only to each individual but also to society as a whole.SoPrivacy
protection has become a necessary requirement in many data
mining applications due to emerging privacy legislation and
regulations. A detailed survey of various researcher work is
summarized in this paper. Different techniques of privacy
preserving mining are explained with their restriction on various
systems of privacy preserving. This paper clarifydistinctivethreats
of data mining for the examination of the preserved dataset.
Key Words: Privacy Preserving Mining, Association Rule Mining,
Data Perturbation, Threats
1.INTRODUCTION
Every organization gather facts about their clients or users
for exploration or any other intent. Information being
collected may be audio, videos, images and text etc fig. 1.
Since privacy concerns related to a possible misuse of
knowledge discovered by means of data mining techniques
have been raised [3], many attempts have been made to
provide privacy preserving techniques for data mining [12,
7, 98]. Thus, a new (sub)domain of data mining, privacy
preserving data mining, emerged in the last decade. Inorder
to provide sufficient privacy protection in data mining,
several methods for incorporating privacy have been
developed. Privacy itself is not an easy term to define and
can be preserved on different levels in differentscenarios[8,
1]. In spite of enormous diversity in privacy aspects of data
mining, three main approaches can be distinguished:
heuristic-based, reconstruction-based and cryptography-
based [11].
In the first approach, the heuristic algorithms are used to
hide knowledge an organization does not want to reveal, for
instance, individual valuesindata arechangedaccordingtoa
heuristic algorithm to hide sensitive knowledge such as
important rules in the case of association rules mining.
The reconstruction-based approach is used to incorporate
privacy on an individual level bychangingoriginal individual
values (for instance, users’ answers) in a random way by
means of a randomization-based method and revealingonly
modified values.
Fig. 1. Types of data in the datasets.
The distorted data as well as parametersofa randomization-
based method used to distort them can be published or
passed to a third party. Knowing distorted individual values
and parameters of a randomization-based method, one is
able to perform data mining tasks. To this end, first original
distributions of values of attributes are reconstructed
(estimated) based on the distorted values and the
parameters of the distortion method, and a data mining
model is built based on the distorted data. The creation of a
model is carried out without the need to access original
individual data. The third approach, which is based on
cryptography,usessecuremultipartycomputations(SMC)to
carry out data mining tasks basedondistributeddata,that is,
data possessed by differentorganizationsthatdonot wantto
disclose their private input. Furthermore, encryption
techniques which enable one to perform computations over
encrypted data without being able to decrypt can be used in
privacy preserving. The heuristic approach is designed for
centralized data. The cryptography-based approach is used
for the distributed data, while the reconstruction-based
approach can be applied to both distributed and centralized
data.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 868
2 Privacy Preserving Technique
Data Swapping
In this techniques is data maintains as a order basicallydata
e evolve as a textual form, text data perturbation as a textual
data form .textual data means addition new values and may
not possible in all cases of textual datasets. so swapping
technology is better option for the same In which most
frequent values are observed and replace with the least or
lesser frequent values so that original values or decision
cannot be taken from the perturbed copy of the dataset.
In some case if the replacement of the single item is done for
the most frequent item then detection of that hidetechnique
can be easily breakable. So it is necessary to choose the item
from a set randomly for replacing the frequent one.
Suppression
In some data set have some information ,that information is
directly identify by the individuals personorindividual class
then those has to remove from the data set. So columns or
items are delete from the original data set ,the is such types
of sensitive data set, Suppression is used for protecting for
information ,As Example: We have data set contain a driving
license number, the only one person can detectable and we
cannot add or delete in driving license. as format of that
driving license number is define. So such data is removed
from the original dataset.
Noise Addition
In this approach data set change as a change in a numeric
value where amount is change is a sequence of random
value, that value reflected as a original values but not in
original data set order. In [5] noise is generatebya Gaussian
function that create number as a sequence form then add
there sequence in the original value. so a kind of variation is
develop over here for the privacy of the original one. While
data can add a single value but it can be detect easily or
observed also if intruder will present in data set.
There are different numericcategoryinvolving as:involving
percentiles, sums, conditional means etc. Some noise
addition techniques, Random Perturbation Technique,
Probabilistic Perturbation Technique , etc.
Data Perturbation
In data Perturbation on data set is transformed in to
perturbation and selecting random position data then add,
subtraction the value into the original in order produce new
value that is differ from the previous data. One is important
information is here whatever you want add or subtraction
delete from that value should not cross the limits of the
original lets understand an age value is perturbed by adding
or subtracting from original data but the resultant value or
the perturbed value should not be less then 0 or greater
then a normal life of 120. In order to perform perturbation
some kinds of random value that by original value change
randomly. There are generate two approaches.
First is probability distribution approach and Second is
Value distortion approach
 probability distribution approach :-Theapproachof
probability distribution, In this approach data
replace with another sample from the same
(estimated) distributionorbythedistributionitself.
 Value distortion approach:- The approach of Value
distribution, perturbed the value of data and
elements or directly by adding or multiplicative
some noise before releasing of the data.
3 Related Work
This paper addresses [10] secure miningofassociationrules
over horizontally partitioned data.Themethodsincorporate
cryptographic techniques to minimize the information
shared, while adding little overhead to the mining task.
Privacy concerns may prevent the parties from directly
sharing the data, and some types of information about the
data. That allow parties to choose their desired level of
security are needed, allowing efficient solutions that
maintain the desired security.
Tzung Pei et al presented Evolutionaryprivacypreservingin
data mining [4]. Collection of data,disseminationandmining
from large datasets introduced threats to the privacy of the
data. Some sensitive or private information about the
individuals and businesses or organizations had to be
masked before it is disclosed to users of data mining. An
evolutionary privacy preserving data mining method was
proposed to find about what transactions were to be hidden
from a database. Based on the reference and sensitivity of
the individuals data in the database different weights were
assigned to the attributes of the individuals. The concept of
pre large item sets was used to minimize the cost of
rescanning the entire database and speed up the evaluation
process of chromosomes. The proposed approach [4] was
used to make a good tradeoff between privacy preserving
and running time of the data mining algorithms.
This authors [3] presents a survey of different association
rule mining techniques for market basket analysis,
highlighting strengths of different association rule mining
techniques. As well as challenging issues need to be
addressed by an association rule mining technique. The
results of this evaluation will helpdecisionmakerformaking
important decisions for association analysis.
Y-H Wu et al. [11] proposed technique to decrease the
reactions in sterilized database, which are delivered by
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 869
different methodologies. They exhibit a novel approach that
deliberately alters a couple of exchanges in the exchange
database to diminish the backings or confidences of touchy
guidelines without creating the reactions.
In [12] In this paper, a novel ef_cient anonymization system
called PTA is proposed to not only anonymize transactional
data with a small information loss but also to reduce the
computational complexityoftheanonymizationprocess.The
PTA system consists of three modules, which are the Pre-
processing module, the TSP module, and the Anonymity
model, to anonymize transactional data and guaranteesthat
at least k-anonymity is achieved: a pre-processing module,a
traveling salesman problem module, and an anonymization
module.
A characterization of security protecting strategies is
displayed and significantcalculationsineachclassisstudied.
The benefits and bad marks of various strategies were
brought up [2]. The calculations for concealing touchy
affiliation rules like protection preserving guideline mining
utilizing hereditary calculation.
Chung-Min Chen, [8] introduce dithered B-tree, a B-tree file
structure that can fill in as a building obstruct for
acknowledging productive framework usage in the zone of
secure and private database outsourcing. The dithered tree
embed calculation [8] can be additionally upgraded to bring
about just a single traversal from the root to the leaf, rather
than two. The file structure from learning regardless of
whether the inquiry term (i.e., key) is available in the
database and check the information for secure and private
database outsourcing.
In Privacy Preserving Data Mining, information irritation is
an information security strategy that includes "clamor" to
databases to permit singular recordsecrecy.Thismethod [9]
enables clients to determine key rundown data about the
information while keeping a security rupture. Four
predisposition sorts have been proposed whichevaluatethe
adequacy of such a system. Be that as it may, these
predispositions manage basic total ideas (midpoints, and so
forth.) found in the database. The creator propose a fifth
kind of inclination that might be included by irritation
procedures (Data mining Bias), and observationally test for
its reality. In internet business applications, associationsare
occupied with applying information mining ways to deal
with databases to find extra learning about clients.
The creator idea in this paperisPrivacyPreservingminingof
incessant examples on scrambled outsourced Transaction
Database (TDB) [1]. They proposed an encryption plot and
including fake exchange in the first dataset. Their technique
proposed a system for incremental affixes and dropping of
old exchange clusters and decode dataset. They additionally
investigate the break likelihoodfor exchangesandexamples.
The Encryption/Decryption (E/D) module encodes the TDB
once which is sent to the server. Mining is directed over and
again at the server side and decoded each time by the E/D
[1] module. Accordingly, we have to contrast the
unscrambling time and the season of straightforwardly
executing from the earlier finished the first database.
4. Privacy Threats and Framework
The main goal of privacy threat is to disclosetheidentityand
personal information, which is sensitive for the respective
one. There are some kind of privacy threats which may
disclose ones sensitive information:
• Identity disclosure [8]: In identity disclosure threat,
intruder can get the individual identity from published data.
This threat is affined to direct identifier attribute.
• Attribute disclosure [9]: In attribute disclosure threat,
intruder can reveal individual’s sensitive information. This
threat is affined to sensitive attribute.
• Membership disclosure [10]: Any information concerning
individual is disclosed from data set, known as membership
disclosure. This mayhappen whendata isnotprotectedfrom
identity disclosure.
Plenty of privacy preserving techniques are existingto solve
the secrecy breaching problems. The general outline for
these techniques can be classified in five phases in which
data is goes through [11]: • Distribution: The distribution of
data can be either centralized or distributed. In centralized
distribution, all the data kept in repositoryoncentral server,
whereas all data are stored on different databases.
• Modification: This describes how data is modified for
concealing the original data. To fulfill this requirement,
various ways of modification applied on data like
perturbation, aggregation,swapping,sampling,suppression,
noise addition.
• Data Mining Algorithm: The data mining approaches
comprises the ways of generating decision making results
from the data. This phasestage deals with various
algorithms like decision tree, clustering, rough sets,
association rule, regression, classification.
• Data hiding: The data hiding entails raw knowledge or
aggregate data which desires to be hidden.
• Privacy Preservation Technique: The privacy preservation
approach includes different approaches to attain privacy,
which are, generalization, data distortion, data sanitation,
blocking, cryptographic and anonymization.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 870
5. CONCLUSIONS
This paper addresses the design issues for extracting
knowledge from large amounts of data without violating the
privacy of data owners. So for privacy preservingresearcher
first introduce an integrated baseline architecture, design
principle, and implementation techniques for privacy-
preserving data mining systems. Here detailed discussion of
different techniques and combination of those are done. In
few works both numeric andtextinformationwasprotected,
so the time and space required for those calculation is
similarly high. So a proper method need to develop for
anomaly detection and there thoroughlyinvestigationissues
related to the design of privacy-preserving data mining
techniques.
REFERENCES
[1]. Pedreschi, D., Ruggieri, S. & Turini, F. (2008).
Discrimination-aware data mining.Proc.ofthe14th
ACM International Conference on Knowledge
Discovery and Data Mining (KDD 2008), pp. 560-
568. ACM.
[2]. Hajian, S., Domingo-Ferrer,J. &Martinez-Ballesté,A.
(2011a). Discrimination prevention in data mining
for intrusion and crime detection. Proc. of the IEEE
Symposium on Computational IntelligenceinCyber
Security (CICS 2011), pp. 47-54. IEEE.
[3]. Verykios, V. & Gkoulalas-Divanis, A. (2008). A
survey of association rule hiding methods for
privacy. In C. C. Aggarwal and P. S. Yu (Eds.),
Privacy- Preserving Data Mining: Models and
Algorithms. Springer.
[4]. Meij, J. (2002) Dealing with the data flood; mining
data, text and multimedia, The Hague: STT
Netherlands Study Centre for Technology Trends.
[5]. Calders, T., & Verwer, S. (2010). Three naive Bayes
approaches for discrimination-free classification.
Data Mining and Knowledge Discovery, 21(2):277-
292.
[6]. Sara Hajian and Josep Domingo-Ferrer “A
Methodology for Direct and Indirect Discrimination
Prevention in Data Mining” IEEE TRANSACTIONS
ON KNOWLEDGE AND DATA ENGINEERING, VOL.
25, NO. 7, JULY 2013
[7]. Pedreschi, D., Ruggieri, S. & Turini, F. (2009a).
Measuring discrimination in socially-sensitive
decision records. Proc. of the 9th SIAM Data Mining
Conference (SDM 2009), pp. 581-592. SIAM
[8]. Hajian, S. & Domingo-Ferrer, J. (2012). A
methodology for direct and indirect discrimination
prevention in data mining. Manuscript.
[9]. C. Clifton. Privacy preserving data mining: How do
we mine data when we aren’t allowed to see it? In
Proc. of the ACM SIGKDD Int. Conf. on Knowledge
Discovery and Data Mining (KDD 2003), Tutorial,
Washington, DC (USA), 2003.
[10]. D. Pedreschi, S. Ruggieri and F. Turini,
"Discrimination-aware Data Mining," Proc. 14th
Conf. KDD 2008, pp. 560-568. ACM, 2008.
[11]. D. Pedreschi, S. Ruggieri and F. Turini, "Measuring
discrimination in socially-sensitive decision
records," SDM 2009, pp. 581-592. SIAM, 2009.
[12]. Jerry Chun-Wei Lin, (Member,Ieee)1, QiankunLiu1,
Philippe Fournier-Viger2, And Tzung-Pei Hong.
“Pta: An Efficient System For Transaction Database
Anonymization”. August 25, 2016, Date Of Current
Version October 31, 2016. Digital Object Identifier
10.1109/Access.2016.2596542.

More Related Content

What's hot

Data mining and privacy preserving in data mining
Data mining and privacy preserving in data miningData mining and privacy preserving in data mining
Data mining and privacy preserving in data miningNeeda Multani
 
Mining Of Big Data Using Map-Reduce Theorem
Mining Of Big Data Using Map-Reduce TheoremMining Of Big Data Using Map-Reduce Theorem
Mining Of Big Data Using Map-Reduce Theorem
IOSR Journals
 
130509
130509130509
I43055257
I43055257I43055257
I43055257
IJERA Editor
 
An Robust Outsourcing of Multi Party Dataset by Utilizing Super-Modularity an...
An Robust Outsourcing of Multi Party Dataset by Utilizing Super-Modularity an...An Robust Outsourcing of Multi Party Dataset by Utilizing Super-Modularity an...
An Robust Outsourcing of Multi Party Dataset by Utilizing Super-Modularity an...
IRJET Journal
 
Patent data clustering a measuring unit for innovators
Patent data clustering a measuring unit for innovatorsPatent data clustering a measuring unit for innovators
Patent data clustering a measuring unit for innovatorsiaemedu
 
Patent data clustering a measuring unit for innovators
Patent data clustering a measuring unit for innovatorsPatent data clustering a measuring unit for innovators
Patent data clustering a measuring unit for innovatorsIAEME Publication
 
A Novel Filtering based Scheme for Privacy Preserving Data Mining
A Novel Filtering based Scheme for Privacy Preserving Data MiningA Novel Filtering based Scheme for Privacy Preserving Data Mining
A Novel Filtering based Scheme for Privacy Preserving Data Mining
IRJET Journal
 
TUPLE VALUE BASED MULTIPLICATIVE DATA PERTURBATION APPROACH TO PRESERVE PRIVA...
TUPLE VALUE BASED MULTIPLICATIVE DATA PERTURBATION APPROACH TO PRESERVE PRIVA...TUPLE VALUE BASED MULTIPLICATIVE DATA PERTURBATION APPROACH TO PRESERVE PRIVA...
TUPLE VALUE BASED MULTIPLICATIVE DATA PERTURBATION APPROACH TO PRESERVE PRIVA...
IJDKP
 
Privacy Preservation and Restoration of Data Using Unrealized Data Sets
Privacy Preservation and Restoration of Data Using Unrealized Data SetsPrivacy Preservation and Restoration of Data Using Unrealized Data Sets
Privacy Preservation and Restoration of Data Using Unrealized Data Sets
IJERA Editor
 
Hu3414421448
Hu3414421448Hu3414421448
Hu3414421448
IJERA Editor
 
IRJET- Improving the Performance of Smart Heterogeneous Big Data
IRJET- Improving the Performance of Smart Heterogeneous Big DataIRJET- Improving the Performance of Smart Heterogeneous Big Data
IRJET- Improving the Performance of Smart Heterogeneous Big Data
IRJET Journal
 
The International Journal of Engineering and Science
The International Journal of Engineering and ScienceThe International Journal of Engineering and Science
The International Journal of Engineering and Sciencetheijes
 
Bj32809815
Bj32809815Bj32809815
Bj32809815IJMER
 
Data Mining: Mining ,associations, and correlations
Data Mining: Mining ,associations, and correlationsData Mining: Mining ,associations, and correlations
Data Mining: Mining ,associations, and correlations
DataminingTools Inc
 
NEW ALGORITHM FOR SENSITIVE RULE HIDING USING DATA DISTORTION TECHNIQUE
NEW ALGORITHM FOR SENSITIVE RULE HIDING USING DATA DISTORTION TECHNIQUENEW ALGORITHM FOR SENSITIVE RULE HIDING USING DATA DISTORTION TECHNIQUE
NEW ALGORITHM FOR SENSITIVE RULE HIDING USING DATA DISTORTION TECHNIQUE
cscpconf
 
Data masking techniques for Insurance
Data masking techniques for InsuranceData masking techniques for Insurance
Data masking techniques for Insurance
NIIT Technologies
 

What's hot (17)

Data mining and privacy preserving in data mining
Data mining and privacy preserving in data miningData mining and privacy preserving in data mining
Data mining and privacy preserving in data mining
 
Mining Of Big Data Using Map-Reduce Theorem
Mining Of Big Data Using Map-Reduce TheoremMining Of Big Data Using Map-Reduce Theorem
Mining Of Big Data Using Map-Reduce Theorem
 
130509
130509130509
130509
 
I43055257
I43055257I43055257
I43055257
 
An Robust Outsourcing of Multi Party Dataset by Utilizing Super-Modularity an...
An Robust Outsourcing of Multi Party Dataset by Utilizing Super-Modularity an...An Robust Outsourcing of Multi Party Dataset by Utilizing Super-Modularity an...
An Robust Outsourcing of Multi Party Dataset by Utilizing Super-Modularity an...
 
Patent data clustering a measuring unit for innovators
Patent data clustering a measuring unit for innovatorsPatent data clustering a measuring unit for innovators
Patent data clustering a measuring unit for innovators
 
Patent data clustering a measuring unit for innovators
Patent data clustering a measuring unit for innovatorsPatent data clustering a measuring unit for innovators
Patent data clustering a measuring unit for innovators
 
A Novel Filtering based Scheme for Privacy Preserving Data Mining
A Novel Filtering based Scheme for Privacy Preserving Data MiningA Novel Filtering based Scheme for Privacy Preserving Data Mining
A Novel Filtering based Scheme for Privacy Preserving Data Mining
 
TUPLE VALUE BASED MULTIPLICATIVE DATA PERTURBATION APPROACH TO PRESERVE PRIVA...
TUPLE VALUE BASED MULTIPLICATIVE DATA PERTURBATION APPROACH TO PRESERVE PRIVA...TUPLE VALUE BASED MULTIPLICATIVE DATA PERTURBATION APPROACH TO PRESERVE PRIVA...
TUPLE VALUE BASED MULTIPLICATIVE DATA PERTURBATION APPROACH TO PRESERVE PRIVA...
 
Privacy Preservation and Restoration of Data Using Unrealized Data Sets
Privacy Preservation and Restoration of Data Using Unrealized Data SetsPrivacy Preservation and Restoration of Data Using Unrealized Data Sets
Privacy Preservation and Restoration of Data Using Unrealized Data Sets
 
Hu3414421448
Hu3414421448Hu3414421448
Hu3414421448
 
IRJET- Improving the Performance of Smart Heterogeneous Big Data
IRJET- Improving the Performance of Smart Heterogeneous Big DataIRJET- Improving the Performance of Smart Heterogeneous Big Data
IRJET- Improving the Performance of Smart Heterogeneous Big Data
 
The International Journal of Engineering and Science
The International Journal of Engineering and ScienceThe International Journal of Engineering and Science
The International Journal of Engineering and Science
 
Bj32809815
Bj32809815Bj32809815
Bj32809815
 
Data Mining: Mining ,associations, and correlations
Data Mining: Mining ,associations, and correlationsData Mining: Mining ,associations, and correlations
Data Mining: Mining ,associations, and correlations
 
NEW ALGORITHM FOR SENSITIVE RULE HIDING USING DATA DISTORTION TECHNIQUE
NEW ALGORITHM FOR SENSITIVE RULE HIDING USING DATA DISTORTION TECHNIQUENEW ALGORITHM FOR SENSITIVE RULE HIDING USING DATA DISTORTION TECHNIQUE
NEW ALGORITHM FOR SENSITIVE RULE HIDING USING DATA DISTORTION TECHNIQUE
 
Data masking techniques for Insurance
Data masking techniques for InsuranceData masking techniques for Insurance
Data masking techniques for Insurance
 

Similar to A Survey on Features and Techniques Description for Privacy of Sensitive Information

SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...
SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...
SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...
Editor IJMTER
 
J017536064
J017536064J017536064
J017536064
IOSR Journals
 
130509
130509130509
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
IJERD Editor
 
Survey paper on Big Data Imputation and Privacy Algorithms
Survey paper on Big Data Imputation and Privacy AlgorithmsSurvey paper on Big Data Imputation and Privacy Algorithms
Survey paper on Big Data Imputation and Privacy Algorithms
IRJET Journal
 
IRJET- A Study of Privacy Preserving Data Mining and Techniques
IRJET- A Study of Privacy Preserving Data Mining and TechniquesIRJET- A Study of Privacy Preserving Data Mining and Techniques
IRJET- A Study of Privacy Preserving Data Mining and Techniques
IRJET Journal
 
IRJET - Coarse Grain Load Balance Algorithm for Detecting
IRJET - Coarse Grain Load Balance Algorithm for DetectingIRJET - Coarse Grain Load Balance Algorithm for Detecting
IRJET - Coarse Grain Load Balance Algorithm for Detecting
IRJET Journal
 
Preprocessing and secure computations for privacy preservation data mining
Preprocessing and secure computations for privacy preservation data miningPreprocessing and secure computations for privacy preservation data mining
Preprocessing and secure computations for privacy preservation data miningIAEME Publication
 
Privacy Preserving Approaches for High Dimensional Data
Privacy Preserving Approaches for High Dimensional DataPrivacy Preserving Approaches for High Dimensional Data
Privacy Preserving Approaches for High Dimensional Data
ijtsrd
 
K017167076
K017167076K017167076
K017167076
IOSR Journals
 
A Survey Paper on an Integrated Approach for Privacy Preserving In High Dimen...
A Survey Paper on an Integrated Approach for Privacy Preserving In High Dimen...A Survey Paper on an Integrated Approach for Privacy Preserving In High Dimen...
A Survey Paper on an Integrated Approach for Privacy Preserving In High Dimen...
IJSRD
 
IRJET- Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...
IRJET-  	  Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...IRJET-  	  Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...
IRJET- Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...
IRJET Journal
 
Privacy Preserving Data Mining Using Inverse Frequent ItemSet Mining Approach
Privacy Preserving Data Mining Using Inverse Frequent ItemSet Mining ApproachPrivacy Preserving Data Mining Using Inverse Frequent ItemSet Mining Approach
Privacy Preserving Data Mining Using Inverse Frequent ItemSet Mining Approach
IRJET Journal
 
Study of Data Mining Methods and its Applications
Study of  Data Mining Methods and its ApplicationsStudy of  Data Mining Methods and its Applications
Study of Data Mining Methods and its Applications
IRJET Journal
 
IRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud DataIRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud Data
IRJET Journal
 
Fundamentals of data mining and its applications
Fundamentals of data mining and its applicationsFundamentals of data mining and its applications
Fundamentals of data mining and its applicationsSubrat Swain
 
Efficient Privacy Preserving Clustering Based Multi Keyword Search
Efficient Privacy Preserving Clustering Based Multi Keyword Search        Efficient Privacy Preserving Clustering Based Multi Keyword Search
Efficient Privacy Preserving Clustering Based Multi Keyword Search
IRJET Journal
 
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET Journal
 
E04623438
E04623438E04623438
E04623438
IOSR-JEN
 
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
IRJET-  	  Efficient Privacy-Preserving using Novel Based Secure Protocol in SVMIRJET-  	  Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
IRJET Journal
 

Similar to A Survey on Features and Techniques Description for Privacy of Sensitive Information (20)

SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...
SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...
SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...
 
J017536064
J017536064J017536064
J017536064
 
130509
130509130509
130509
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
Survey paper on Big Data Imputation and Privacy Algorithms
Survey paper on Big Data Imputation and Privacy AlgorithmsSurvey paper on Big Data Imputation and Privacy Algorithms
Survey paper on Big Data Imputation and Privacy Algorithms
 
IRJET- A Study of Privacy Preserving Data Mining and Techniques
IRJET- A Study of Privacy Preserving Data Mining and TechniquesIRJET- A Study of Privacy Preserving Data Mining and Techniques
IRJET- A Study of Privacy Preserving Data Mining and Techniques
 
IRJET - Coarse Grain Load Balance Algorithm for Detecting
IRJET - Coarse Grain Load Balance Algorithm for DetectingIRJET - Coarse Grain Load Balance Algorithm for Detecting
IRJET - Coarse Grain Load Balance Algorithm for Detecting
 
Preprocessing and secure computations for privacy preservation data mining
Preprocessing and secure computations for privacy preservation data miningPreprocessing and secure computations for privacy preservation data mining
Preprocessing and secure computations for privacy preservation data mining
 
Privacy Preserving Approaches for High Dimensional Data
Privacy Preserving Approaches for High Dimensional DataPrivacy Preserving Approaches for High Dimensional Data
Privacy Preserving Approaches for High Dimensional Data
 
K017167076
K017167076K017167076
K017167076
 
A Survey Paper on an Integrated Approach for Privacy Preserving In High Dimen...
A Survey Paper on an Integrated Approach for Privacy Preserving In High Dimen...A Survey Paper on an Integrated Approach for Privacy Preserving In High Dimen...
A Survey Paper on an Integrated Approach for Privacy Preserving In High Dimen...
 
IRJET- Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...
IRJET-  	  Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...IRJET-  	  Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...
IRJET- Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...
 
Privacy Preserving Data Mining Using Inverse Frequent ItemSet Mining Approach
Privacy Preserving Data Mining Using Inverse Frequent ItemSet Mining ApproachPrivacy Preserving Data Mining Using Inverse Frequent ItemSet Mining Approach
Privacy Preserving Data Mining Using Inverse Frequent ItemSet Mining Approach
 
Study of Data Mining Methods and its Applications
Study of  Data Mining Methods and its ApplicationsStudy of  Data Mining Methods and its Applications
Study of Data Mining Methods and its Applications
 
IRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud DataIRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud Data
 
Fundamentals of data mining and its applications
Fundamentals of data mining and its applicationsFundamentals of data mining and its applications
Fundamentals of data mining and its applications
 
Efficient Privacy Preserving Clustering Based Multi Keyword Search
Efficient Privacy Preserving Clustering Based Multi Keyword Search        Efficient Privacy Preserving Clustering Based Multi Keyword Search
Efficient Privacy Preserving Clustering Based Multi Keyword Search
 
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
 
E04623438
E04623438E04623438
E04623438
 
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
IRJET-  	  Efficient Privacy-Preserving using Novel Based Secure Protocol in SVMIRJET-  	  Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
zwunae
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
Runway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptxRunway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptx
SupreethSP4
 

Recently uploaded (20)

Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
Runway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptxRunway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptx
 

A Survey on Features and Techniques Description for Privacy of Sensitive Information

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 867 A Survey on Features and Techniques Description for Privacy of Sensitive Information Archana Singh1, Varun Singh2 1M.Tech. Scholar, Computer Science Dept. MIT College Rewa, M.P. 2Asst. Prof. Computer Science Dept. MIT College Rewa, M.P. ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - User privacy protection is of the utmost importance. Privacy has been acknowledged as a human right that is beneficial not only to each individual but also to society as a whole.SoPrivacy protection has become a necessary requirement in many data mining applications due to emerging privacy legislation and regulations. A detailed survey of various researcher work is summarized in this paper. Different techniques of privacy preserving mining are explained with their restriction on various systems of privacy preserving. This paper clarifydistinctivethreats of data mining for the examination of the preserved dataset. Key Words: Privacy Preserving Mining, Association Rule Mining, Data Perturbation, Threats 1.INTRODUCTION Every organization gather facts about their clients or users for exploration or any other intent. Information being collected may be audio, videos, images and text etc fig. 1. Since privacy concerns related to a possible misuse of knowledge discovered by means of data mining techniques have been raised [3], many attempts have been made to provide privacy preserving techniques for data mining [12, 7, 98]. Thus, a new (sub)domain of data mining, privacy preserving data mining, emerged in the last decade. Inorder to provide sufficient privacy protection in data mining, several methods for incorporating privacy have been developed. Privacy itself is not an easy term to define and can be preserved on different levels in differentscenarios[8, 1]. In spite of enormous diversity in privacy aspects of data mining, three main approaches can be distinguished: heuristic-based, reconstruction-based and cryptography- based [11]. In the first approach, the heuristic algorithms are used to hide knowledge an organization does not want to reveal, for instance, individual valuesindata arechangedaccordingtoa heuristic algorithm to hide sensitive knowledge such as important rules in the case of association rules mining. The reconstruction-based approach is used to incorporate privacy on an individual level bychangingoriginal individual values (for instance, users’ answers) in a random way by means of a randomization-based method and revealingonly modified values. Fig. 1. Types of data in the datasets. The distorted data as well as parametersofa randomization- based method used to distort them can be published or passed to a third party. Knowing distorted individual values and parameters of a randomization-based method, one is able to perform data mining tasks. To this end, first original distributions of values of attributes are reconstructed (estimated) based on the distorted values and the parameters of the distortion method, and a data mining model is built based on the distorted data. The creation of a model is carried out without the need to access original individual data. The third approach, which is based on cryptography,usessecuremultipartycomputations(SMC)to carry out data mining tasks basedondistributeddata,that is, data possessed by differentorganizationsthatdonot wantto disclose their private input. Furthermore, encryption techniques which enable one to perform computations over encrypted data without being able to decrypt can be used in privacy preserving. The heuristic approach is designed for centralized data. The cryptography-based approach is used for the distributed data, while the reconstruction-based approach can be applied to both distributed and centralized data.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 868 2 Privacy Preserving Technique Data Swapping In this techniques is data maintains as a order basicallydata e evolve as a textual form, text data perturbation as a textual data form .textual data means addition new values and may not possible in all cases of textual datasets. so swapping technology is better option for the same In which most frequent values are observed and replace with the least or lesser frequent values so that original values or decision cannot be taken from the perturbed copy of the dataset. In some case if the replacement of the single item is done for the most frequent item then detection of that hidetechnique can be easily breakable. So it is necessary to choose the item from a set randomly for replacing the frequent one. Suppression In some data set have some information ,that information is directly identify by the individuals personorindividual class then those has to remove from the data set. So columns or items are delete from the original data set ,the is such types of sensitive data set, Suppression is used for protecting for information ,As Example: We have data set contain a driving license number, the only one person can detectable and we cannot add or delete in driving license. as format of that driving license number is define. So such data is removed from the original dataset. Noise Addition In this approach data set change as a change in a numeric value where amount is change is a sequence of random value, that value reflected as a original values but not in original data set order. In [5] noise is generatebya Gaussian function that create number as a sequence form then add there sequence in the original value. so a kind of variation is develop over here for the privacy of the original one. While data can add a single value but it can be detect easily or observed also if intruder will present in data set. There are different numericcategoryinvolving as:involving percentiles, sums, conditional means etc. Some noise addition techniques, Random Perturbation Technique, Probabilistic Perturbation Technique , etc. Data Perturbation In data Perturbation on data set is transformed in to perturbation and selecting random position data then add, subtraction the value into the original in order produce new value that is differ from the previous data. One is important information is here whatever you want add or subtraction delete from that value should not cross the limits of the original lets understand an age value is perturbed by adding or subtracting from original data but the resultant value or the perturbed value should not be less then 0 or greater then a normal life of 120. In order to perform perturbation some kinds of random value that by original value change randomly. There are generate two approaches. First is probability distribution approach and Second is Value distortion approach  probability distribution approach :-Theapproachof probability distribution, In this approach data replace with another sample from the same (estimated) distributionorbythedistributionitself.  Value distortion approach:- The approach of Value distribution, perturbed the value of data and elements or directly by adding or multiplicative some noise before releasing of the data. 3 Related Work This paper addresses [10] secure miningofassociationrules over horizontally partitioned data.Themethodsincorporate cryptographic techniques to minimize the information shared, while adding little overhead to the mining task. Privacy concerns may prevent the parties from directly sharing the data, and some types of information about the data. That allow parties to choose their desired level of security are needed, allowing efficient solutions that maintain the desired security. Tzung Pei et al presented Evolutionaryprivacypreservingin data mining [4]. Collection of data,disseminationandmining from large datasets introduced threats to the privacy of the data. Some sensitive or private information about the individuals and businesses or organizations had to be masked before it is disclosed to users of data mining. An evolutionary privacy preserving data mining method was proposed to find about what transactions were to be hidden from a database. Based on the reference and sensitivity of the individuals data in the database different weights were assigned to the attributes of the individuals. The concept of pre large item sets was used to minimize the cost of rescanning the entire database and speed up the evaluation process of chromosomes. The proposed approach [4] was used to make a good tradeoff between privacy preserving and running time of the data mining algorithms. This authors [3] presents a survey of different association rule mining techniques for market basket analysis, highlighting strengths of different association rule mining techniques. As well as challenging issues need to be addressed by an association rule mining technique. The results of this evaluation will helpdecisionmakerformaking important decisions for association analysis. Y-H Wu et al. [11] proposed technique to decrease the reactions in sterilized database, which are delivered by
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 869 different methodologies. They exhibit a novel approach that deliberately alters a couple of exchanges in the exchange database to diminish the backings or confidences of touchy guidelines without creating the reactions. In [12] In this paper, a novel ef_cient anonymization system called PTA is proposed to not only anonymize transactional data with a small information loss but also to reduce the computational complexityoftheanonymizationprocess.The PTA system consists of three modules, which are the Pre- processing module, the TSP module, and the Anonymity model, to anonymize transactional data and guaranteesthat at least k-anonymity is achieved: a pre-processing module,a traveling salesman problem module, and an anonymization module. A characterization of security protecting strategies is displayed and significantcalculationsineachclassisstudied. The benefits and bad marks of various strategies were brought up [2]. The calculations for concealing touchy affiliation rules like protection preserving guideline mining utilizing hereditary calculation. Chung-Min Chen, [8] introduce dithered B-tree, a B-tree file structure that can fill in as a building obstruct for acknowledging productive framework usage in the zone of secure and private database outsourcing. The dithered tree embed calculation [8] can be additionally upgraded to bring about just a single traversal from the root to the leaf, rather than two. The file structure from learning regardless of whether the inquiry term (i.e., key) is available in the database and check the information for secure and private database outsourcing. In Privacy Preserving Data Mining, information irritation is an information security strategy that includes "clamor" to databases to permit singular recordsecrecy.Thismethod [9] enables clients to determine key rundown data about the information while keeping a security rupture. Four predisposition sorts have been proposed whichevaluatethe adequacy of such a system. Be that as it may, these predispositions manage basic total ideas (midpoints, and so forth.) found in the database. The creator propose a fifth kind of inclination that might be included by irritation procedures (Data mining Bias), and observationally test for its reality. In internet business applications, associationsare occupied with applying information mining ways to deal with databases to find extra learning about clients. The creator idea in this paperisPrivacyPreservingminingof incessant examples on scrambled outsourced Transaction Database (TDB) [1]. They proposed an encryption plot and including fake exchange in the first dataset. Their technique proposed a system for incremental affixes and dropping of old exchange clusters and decode dataset. They additionally investigate the break likelihoodfor exchangesandexamples. The Encryption/Decryption (E/D) module encodes the TDB once which is sent to the server. Mining is directed over and again at the server side and decoded each time by the E/D [1] module. Accordingly, we have to contrast the unscrambling time and the season of straightforwardly executing from the earlier finished the first database. 4. Privacy Threats and Framework The main goal of privacy threat is to disclosetheidentityand personal information, which is sensitive for the respective one. There are some kind of privacy threats which may disclose ones sensitive information: • Identity disclosure [8]: In identity disclosure threat, intruder can get the individual identity from published data. This threat is affined to direct identifier attribute. • Attribute disclosure [9]: In attribute disclosure threat, intruder can reveal individual’s sensitive information. This threat is affined to sensitive attribute. • Membership disclosure [10]: Any information concerning individual is disclosed from data set, known as membership disclosure. This mayhappen whendata isnotprotectedfrom identity disclosure. Plenty of privacy preserving techniques are existingto solve the secrecy breaching problems. The general outline for these techniques can be classified in five phases in which data is goes through [11]: • Distribution: The distribution of data can be either centralized or distributed. In centralized distribution, all the data kept in repositoryoncentral server, whereas all data are stored on different databases. • Modification: This describes how data is modified for concealing the original data. To fulfill this requirement, various ways of modification applied on data like perturbation, aggregation,swapping,sampling,suppression, noise addition. • Data Mining Algorithm: The data mining approaches comprises the ways of generating decision making results from the data. This phasestage deals with various algorithms like decision tree, clustering, rough sets, association rule, regression, classification. • Data hiding: The data hiding entails raw knowledge or aggregate data which desires to be hidden. • Privacy Preservation Technique: The privacy preservation approach includes different approaches to attain privacy, which are, generalization, data distortion, data sanitation, blocking, cryptographic and anonymization.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 870 5. CONCLUSIONS This paper addresses the design issues for extracting knowledge from large amounts of data without violating the privacy of data owners. So for privacy preservingresearcher first introduce an integrated baseline architecture, design principle, and implementation techniques for privacy- preserving data mining systems. Here detailed discussion of different techniques and combination of those are done. In few works both numeric andtextinformationwasprotected, so the time and space required for those calculation is similarly high. So a proper method need to develop for anomaly detection and there thoroughlyinvestigationissues related to the design of privacy-preserving data mining techniques. REFERENCES [1]. Pedreschi, D., Ruggieri, S. & Turini, F. (2008). Discrimination-aware data mining.Proc.ofthe14th ACM International Conference on Knowledge Discovery and Data Mining (KDD 2008), pp. 560- 568. ACM. [2]. Hajian, S., Domingo-Ferrer,J. &Martinez-Ballesté,A. (2011a). Discrimination prevention in data mining for intrusion and crime detection. Proc. of the IEEE Symposium on Computational IntelligenceinCyber Security (CICS 2011), pp. 47-54. IEEE. [3]. Verykios, V. & Gkoulalas-Divanis, A. (2008). A survey of association rule hiding methods for privacy. In C. C. Aggarwal and P. S. Yu (Eds.), Privacy- Preserving Data Mining: Models and Algorithms. Springer. [4]. Meij, J. (2002) Dealing with the data flood; mining data, text and multimedia, The Hague: STT Netherlands Study Centre for Technology Trends. [5]. Calders, T., & Verwer, S. (2010). Three naive Bayes approaches for discrimination-free classification. Data Mining and Knowledge Discovery, 21(2):277- 292. [6]. Sara Hajian and Josep Domingo-Ferrer “A Methodology for Direct and Indirect Discrimination Prevention in Data Mining” IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 25, NO. 7, JULY 2013 [7]. Pedreschi, D., Ruggieri, S. & Turini, F. (2009a). Measuring discrimination in socially-sensitive decision records. Proc. of the 9th SIAM Data Mining Conference (SDM 2009), pp. 581-592. SIAM [8]. Hajian, S. & Domingo-Ferrer, J. (2012). A methodology for direct and indirect discrimination prevention in data mining. Manuscript. [9]. C. Clifton. Privacy preserving data mining: How do we mine data when we aren’t allowed to see it? In Proc. of the ACM SIGKDD Int. Conf. on Knowledge Discovery and Data Mining (KDD 2003), Tutorial, Washington, DC (USA), 2003. [10]. D. Pedreschi, S. Ruggieri and F. Turini, "Discrimination-aware Data Mining," Proc. 14th Conf. KDD 2008, pp. 560-568. ACM, 2008. [11]. D. Pedreschi, S. Ruggieri and F. Turini, "Measuring discrimination in socially-sensitive decision records," SDM 2009, pp. 581-592. SIAM, 2009. [12]. Jerry Chun-Wei Lin, (Member,Ieee)1, QiankunLiu1, Philippe Fournier-Viger2, And Tzung-Pei Hong. “Pta: An Efficient System For Transaction Database Anonymization”. August 25, 2016, Date Of Current Version October 31, 2016. Digital Object Identifier 10.1109/Access.2016.2596542.