SlideShare a Scribd company logo
1 of 3
Download to read offline
IJSRD - International Journal for Scientific Research & Development| Vol. 3, Issue 10, 2015 | ISSN (online): 2321-0613
All rights reserved by www.ijsrd.com 747
A Survey Paper on an Integrated Approach for Privacy Preserving in
High Dimensional Data using Randomized and SVD Algorithm
Tripti Singh Thakur1
Dr. Abha Choubey2
1
P.G. Scholar 2
Associate Professor
1,2
Department of Computer Science & Engineering
1,2
SSGI, SSTC, Bhilai(C.G.)
Abstract— Data mining is a technique which is used for
extraction of knowledge and information from large amount
of data collected by hospitals, government and individuals.
The term data mining is also referred as knowledge mining
from databases. The major challenge in data mining is
ensuring security and privacy of data in databases, because
data sharing is common at organizational level. The data in
databases comes from a number of sources like – medical,
financial, library, marketing, shopping record etc so it is
foremost task for anyone to keep secure that data. The
objective is to achieve fully privacy preserved data without
affecting the data utility in databases. i.e. how data is used
or transferred between organizations so that data integrity
remains in database but sensitive and confidential data is
preserved. This paper presents a brief study about different
PPDM techniques like- Randomization, perturbation,
Slicing, summarization etc. by use of which the data privacy
can be preserved. The technique for which the best
computational and theoretical outcome is achieved is chosen
for privacy preserving in high dimensional data.
Key words: Randomization; slicing; perturbation;
summarization; data integrity
I. INTRODUCTION
Data mining deals with extraction of hidden confidential
information from large data bases. For the process of
picking out relevant information some techniques like-
clustering, classification, associations are used. The concept
of privacy preserving data mining means preserving
personal information from data mining algorithms. For
privacy preservation of data sometimes data is altered before
delivery and sometimes it is altered after delivery (before
showing it to the third party) . Now days we have different
data mining applications for which security is a must for
example- stock market, finance etc. In data mining system
there are so many privacy preserving methods. The
objective of privacy preserving data mining is to search
some technique in which the original information is
transformed in some way so that the private data and private
knowledge remain confidential after the mining process.
Data cleansing only takes effect on certain type of
errors and cannot result in perfect data, eliminating noisy
data may lead to information loss. Noise corrupted data can
be modified by the use of noise [1] knowledge. Data privacy
can also be preserved by random non-linear data
transformation [4].SVM classifier is also applicable for
privacy preservation problems [5].WCNN algo is improved
SVD method which perform data perturbation, which is
more efficient in balancing data privacy and utility [6].
Enabling multilevel trust poses new challenges for
perturbation based PPDM. The key challenge lies in
preventing the data miners from combining the copies at
different trust levels to jointly reconstruct the original data
more accurate [8]. Privacy can also be preserved by decision
tree learning on unrealized data sets [9]. Sample selection
maintain ration of data between mixed data and original
data. The singular value decomposition prevents the loss of
mixed data and extracted data in decomposition of matrix
[10]. Because of the increasing capability to trace and gather
large amount of sensitive information privacy preserving in
data mining applications has become an important
concern[15].If data transformation and encryption
techniques are applied in combination then the data privacy
is preserved strongly [17].In Vector Quantization after
encoding one can not reveal the original data hence privacy
is preserved. The vector quantization methods are efficiently
applied in the development of speech recognition system
[20].
II. PROBLEM DEFINITION
Due to the increase in sensitive information in databases
privacy preservation is an important concern for each and
every data miner. The need for privacy is sometimes due to
law(for medical databases) or can be influenced by medical
interest. For scientific, economic and market oriented
databases confidentiality is an important issue. So it is
important to develop such a technique for privacy
preservation that the data utility and integrity remains
constant without affecting the data confidentiality.
III. METHODOLOGY
Main goal of privacy preserving data mining is to detect
such solution which will result data security with data
integrity with low computational complexity. We have the
following different techniques for privacy preservation data
mining which have been proposed after deep study of data
mining community-
A. Randomization Technique
In randomization technique the original data is hidden by
randomly modifying the data values. It provides some
deeper statistical approach to security and privacy. On
dataset randomization is applied either by adding or by
multiplying random values to original records.
Randomization technique is Easy to implement and it has a
very High search accuracy. It is computationally efficient
and Suitable for different user requirements. But it results
High information loss.
B. Perturbation Technique
This technique is also known as noise addition technique.
Here noise is introduced either to the data or to the result of
the queries. Perturbation is done by use of Gaussian and
uniform perturbing functions. Here each and every attribute
is treated independently but the Data Confidentiality has
been compromised sometimes.
A Survey Paper on an Integrated Approach for Privacy Preserving in High Dimensional Data using Randomized and SVD Algorithm
(IJSRD/Vol. 3/Issue 10/2015/162)
All rights reserved by www.ijsrd.com 748
C. Cryptographic Technique
In cryptographic technique data value is altered by some
encryption technique like secure sum, secure set union, and
secure size set intersection etc. on all data or only on
confidential data values. The output of a computation is not
protected by cryptographic techniques instead it prevents
privacy leaks during computation. It provide High search
Accuracy but with high Computational complexity.
D. Slicing
In this technique the data set is partitioned both vertically
and horizontally. The basic idea of slicing is to preserve the
association within each column and break association
between uncorrelated attributes, which are infrequent. Here
reduced data dimensionality is achieved with preserved data
utility. It preserves better utility in micro data but It is Not
used for high dimensional data.
E. Summarization
In this technique the data is released in the form of a
“summery” which only having some aggregate queries not
the confidential records. Summarization is applied either by
sampling or by tabular representation of data values. It is
mostly used for tabular data but privacy preservation is not
guaranteed.
F. Suppression
In this technique suppression is applied on sensitive data
before any computation. Use of suppression increases the
data utility and reduces the amount of sensitive data on
dataset. Here protection from discovery of certain statistical
characteristics, such as sensitive association rules is done.
G. SVD Technique
It is a matrix factorization technique which is most widely
used in PPDM. It perturbs every sample of data to the same
degree and Provide less information loss but for different
user requirements it is not suitable.
IV. RESULT
After studying different privacy preserving data mining
techniques the result we conclude is that If randomization is
used with perturbation technique and SVD technique Better
privacy may be achieved with increased data utility because
In the combination of these three techniques the cons of
each techniques are recovered by the pros of other two
techniques. The graphical representation of expected
outcome is shown below
Fig. 1: Graph .1: Graphical representation of expected
outcome
V. CONCLUSION
In this paper a wide survey has been done on different
approaches for privacy preserving data mining. In order to
find out better privacy and high data accuracy on high
dimensional data randomized noise based perturbation
technique with SVD is selected.
Our future work will decide that Privacy
preservation and knowledge discovery both goals can be
achieved by using these 3 methods.
REFERENCES
[1] Xingdong Wu and XingQuan Zhu “Mining with Noise
Knowledge: Error-Aware Data Mining” IEEE
Transaction on System, Man and Cybernatics- Part A:
Systems And Humans, Vol. 38 July 2008.
[2] Xindong Wu and Xingquan Zhu “ Mining With Noise
Knowledge: Error-Aware Data Mining.” IEEE
Transactions On Systems, man, and Cybernatics:
JULY 2008.
[3] Xiaolin Zhang, Hongjing Bi “Research on Privacy
Preserving classification , data mining based on
random perturbation.” IEEE international conference
on Information Networking and automation 2010.
[4] Kaniska Bhaduri, Member IEEE, Mark d. Stefanski,
and Ashok N. Shrivastava “Privacy-Preserving Outlier
Detection through Random Nonlinear Data
Distortion.” IEEE Transaction on System Man and
Cybernetics Vol. 41, Issue 1, Feb 2011.
[5] Keng-Pie Lin and Ming-Syan Chen “On the Design
and Analysis of the Privacy-Preserving SVM
classifier.” IEEE Transaction on Knowledge And Data
Engineering Vol.23, Issue 11, November 2011.
[6] Guang Li and Yadong Wang “Privacy preserving data
mining based on sample selection and singular value
decomposition.” IEEE international conference on
Internet computing and information services 2011.
[7] Guang Li and Yadong Wang “Privacy preserving
classification Method Based on singular value
decomposition.” International Arab Journal of
information Technology Vol.9, Issue 6, 2012.
[8] Yaping Li, MinghuaChen , Qiwei Li, and Wei Zhang
“Enabling Multilevel Trust in Privacy Preserving Data
Mining .” IEEE Transactions on Knowledge And Data
Engineering, Vol. 24 , Issue-9, September 2012.
[9] Pui k Fong and Jens H. Webber-Jahnke “Privacy
Preserving Decision Tree Learning Using Unrealized
Data Sets” IEEE Transactions on Knowledge and Data
Engineering Vol.24, Issue-2, February 2012.
[10]Priyank jain , pratibha Tapashetti , Dr. A. S.Umesh,
sweta sharma: “Privacy preserving processing of high
dimensional data classification based on sample
selection and SVD.” IEEE international conference on
control, Automation, robotics and embedded system
2013.
[11]Alxandre Evfimievski “Randomization in Privacy
Preserving Data Mining” SIGKDD Explorations
VOL.4 Issue-2 Pg-43-48.
[12]Charu C. Aggarwal “On the Analytical Properties of
High Dimensional Randomization.” IEEE Transaction
on Knowledge And Data engineering Vol. 25, Issue-7
July 2013.
A Survey Paper on an Integrated Approach for Privacy Preserving in High Dimensional Data using Randomized and SVD Algorithm
(IJSRD/Vol. 3/Issue 10/2015/162)
All rights reserved by www.ijsrd.com 749
[13]Mohnish Patel, Prashant Richarya, Anurag Shrivastava
“Privacy preserving Using Randomization And
Encryption Methods.” Scholars journal of Engineering
And technology(SJET) 2013, Issue-3 pg.117-121.
[14]Tiancheng Li, Ninghui li “Slicing: A new approach for
privacy preserving data publishing.” IEEE
Transactions on Knowledge and Data Engineering
Vol.24, Issue-3, March 2013.
[15]Nivetha.P.R, Thamarai selvi.K “A Survey on Privacy
preserving Data Mining Techniques.”International
Journal of Computer Science and Mobile Computing
Vol. 2 Issue-10, October 2013, pg.166-170.
[16]Wenjun Lu , Avinash L. Varna(Member IEEE) & Min
Wu “Confidentiality-preserving image Search : A
Comparative Study Between Homomorphic
Encryption and Distance-preserving Randomization.”
IEEE Vol-2 2014 pg. 125-141.
[17]Santosh Kumar Bhandare “Data transformation and
encryption based privacy preserving Data mining
System.” International Journal of Advanced Research
in Computer Science & Software Engineering Vol. 4,
Issue 7, July 2014.
[18]Dhivakar k, Mohana “A Survey on privacy
preservation approaches and techniques.” International
Journal of Innovative Research in Computer &
Communication Engineering Vol. 2, Issue 11,
November 2014.
[19]Sachin janbandhu, Dr. S.M. Chaware “Survey on Data
Mining with privacy preservation” International
Journal on Computer Science & Information
Technology Vol-5(4) 2014.
[20]S.Sasikala, S. Nathira banu “Privacy preserving data
mining using Piecewise Vector Quantization (PVQ).”
International journal of Advanced Research in
Computer Science and Technology 2014.
[21]Xiaohua Tong, Zhen Ye, Yusheng Xu , ShiJie Liu ,
LIngyun Li, Huan Xie, and Tianpeng Li “A Novel
Subpixel Phase Correlation Method Using Singular
Value Decomposition Method and Unified Random
Sample Consensus.” IEEE Transactions on
Geosciences and Remote Sensing Vol.53 Issue-8
August 2015.

More Related Content

What's hot

Cluster Based Access Privilege Management Scheme for Databases
Cluster Based Access Privilege Management Scheme for DatabasesCluster Based Access Privilege Management Scheme for Databases
Cluster Based Access Privilege Management Scheme for DatabasesEditor IJMTER
 
Towards A More Secure Web Based Tele Radiology System: A Steganographic Approach
Towards A More Secure Web Based Tele Radiology System: A Steganographic ApproachTowards A More Secure Web Based Tele Radiology System: A Steganographic Approach
Towards A More Secure Web Based Tele Radiology System: A Steganographic ApproachCSCJournals
 
An efficient data masking for securing medical data using DNA encoding and ch...
An efficient data masking for securing medical data using DNA encoding and ch...An efficient data masking for securing medical data using DNA encoding and ch...
An efficient data masking for securing medical data using DNA encoding and ch...IJECEIAES
 
AN EFFICIENT SOLUTION FOR PRIVACYPRESERVING, SECURE REMOTE ACCESS TO SENSITIV...
AN EFFICIENT SOLUTION FOR PRIVACYPRESERVING, SECURE REMOTE ACCESS TO SENSITIV...AN EFFICIENT SOLUTION FOR PRIVACYPRESERVING, SECURE REMOTE ACCESS TO SENSITIV...
AN EFFICIENT SOLUTION FOR PRIVACYPRESERVING, SECURE REMOTE ACCESS TO SENSITIV...cscpconf
 
A Frame Work for Ontological Privacy Preserved Mining
A Frame Work for Ontological Privacy Preserved MiningA Frame Work for Ontological Privacy Preserved Mining
A Frame Work for Ontological Privacy Preserved MiningIJNSA Journal
 
Privacy preserving dm_ppt
Privacy preserving dm_pptPrivacy preserving dm_ppt
Privacy preserving dm_pptSagar Verma
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Privacy Preserving Distributed Association Rule Mining Algorithm for Vertical...
Privacy Preserving Distributed Association Rule Mining Algorithm for Vertical...Privacy Preserving Distributed Association Rule Mining Algorithm for Vertical...
Privacy Preserving Distributed Association Rule Mining Algorithm for Vertical...IJCSIS Research Publications
 
A survey on privacy preserving data publishing
A survey on privacy preserving data publishingA survey on privacy preserving data publishing
A survey on privacy preserving data publishingijcisjournal
 
An Integrated Algorithm supporting Confidentiality and Integrity for secured ...
An Integrated Algorithm supporting Confidentiality and Integrity for secured ...An Integrated Algorithm supporting Confidentiality and Integrity for secured ...
An Integrated Algorithm supporting Confidentiality and Integrity for secured ...CSCJournals
 
Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...
Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...
Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...CSCJournals
 
Safe machinelearning
Safe machinelearningSafe machinelearning
Safe machinelearningMansiChowkkar
 
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT A privacy leakage upper bound con...
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT A privacy leakage upper bound con...JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT A privacy leakage upper bound con...
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT A privacy leakage upper bound con...IEEEGLOBALSOFTTECHNOLOGIES
 
Framework for reversible data hiding using cost-effective encoding system for...
Framework for reversible data hiding using cost-effective encoding system for...Framework for reversible data hiding using cost-effective encoding system for...
Framework for reversible data hiding using cost-effective encoding system for...IJECEIAES
 
IRJET- Steganographic Scheme for Outsourced Biomedical Time Series Data u...
IRJET-  	  Steganographic Scheme for Outsourced Biomedical Time Series Data u...IRJET-  	  Steganographic Scheme for Outsourced Biomedical Time Series Data u...
IRJET- Steganographic Scheme for Outsourced Biomedical Time Series Data u...IRJET Journal
 

What's hot (20)

Cluster Based Access Privilege Management Scheme for Databases
Cluster Based Access Privilege Management Scheme for DatabasesCluster Based Access Privilege Management Scheme for Databases
Cluster Based Access Privilege Management Scheme for Databases
 
Towards A More Secure Web Based Tele Radiology System: A Steganographic Approach
Towards A More Secure Web Based Tele Radiology System: A Steganographic ApproachTowards A More Secure Web Based Tele Radiology System: A Steganographic Approach
Towards A More Secure Web Based Tele Radiology System: A Steganographic Approach
 
Ej24856861
Ej24856861Ej24856861
Ej24856861
 
Ib3514141422
Ib3514141422Ib3514141422
Ib3514141422
 
An efficient data masking for securing medical data using DNA encoding and ch...
An efficient data masking for securing medical data using DNA encoding and ch...An efficient data masking for securing medical data using DNA encoding and ch...
An efficient data masking for securing medical data using DNA encoding and ch...
 
AN EFFICIENT SOLUTION FOR PRIVACYPRESERVING, SECURE REMOTE ACCESS TO SENSITIV...
AN EFFICIENT SOLUTION FOR PRIVACYPRESERVING, SECURE REMOTE ACCESS TO SENSITIV...AN EFFICIENT SOLUTION FOR PRIVACYPRESERVING, SECURE REMOTE ACCESS TO SENSITIV...
AN EFFICIENT SOLUTION FOR PRIVACYPRESERVING, SECURE REMOTE ACCESS TO SENSITIV...
 
19_2
19_219_2
19_2
 
A Frame Work for Ontological Privacy Preserved Mining
A Frame Work for Ontological Privacy Preserved MiningA Frame Work for Ontological Privacy Preserved Mining
A Frame Work for Ontological Privacy Preserved Mining
 
Privacy preserving dm_ppt
Privacy preserving dm_pptPrivacy preserving dm_ppt
Privacy preserving dm_ppt
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Privacy Preserving Distributed Association Rule Mining Algorithm for Vertical...
Privacy Preserving Distributed Association Rule Mining Algorithm for Vertical...Privacy Preserving Distributed Association Rule Mining Algorithm for Vertical...
Privacy Preserving Distributed Association Rule Mining Algorithm for Vertical...
 
J018116973
J018116973J018116973
J018116973
 
A survey on privacy preserving data publishing
A survey on privacy preserving data publishingA survey on privacy preserving data publishing
A survey on privacy preserving data publishing
 
An Integrated Algorithm supporting Confidentiality and Integrity for secured ...
An Integrated Algorithm supporting Confidentiality and Integrity for secured ...An Integrated Algorithm supporting Confidentiality and Integrity for secured ...
An Integrated Algorithm supporting Confidentiality and Integrity for secured ...
 
Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...
Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...
Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...
 
Safe machinelearning
Safe machinelearningSafe machinelearning
Safe machinelearning
 
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT A privacy leakage upper bound con...
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT A privacy leakage upper bound con...JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT A privacy leakage upper bound con...
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT A privacy leakage upper bound con...
 
Data attribute security and privacy in Collaborative distributed database Pub...
Data attribute security and privacy in Collaborative distributed database Pub...Data attribute security and privacy in Collaborative distributed database Pub...
Data attribute security and privacy in Collaborative distributed database Pub...
 
Framework for reversible data hiding using cost-effective encoding system for...
Framework for reversible data hiding using cost-effective encoding system for...Framework for reversible data hiding using cost-effective encoding system for...
Framework for reversible data hiding using cost-effective encoding system for...
 
IRJET- Steganographic Scheme for Outsourced Biomedical Time Series Data u...
IRJET-  	  Steganographic Scheme for Outsourced Biomedical Time Series Data u...IRJET-  	  Steganographic Scheme for Outsourced Biomedical Time Series Data u...
IRJET- Steganographic Scheme for Outsourced Biomedical Time Series Data u...
 

Similar to A Survey Paper on an Integrated Approach for Privacy Preserving In High Dimensional Data Using Randomized and SVD Algorithm

Privacy Preservation and Restoration of Data Using Unrealized Data Sets
Privacy Preservation and Restoration of Data Using Unrealized Data SetsPrivacy Preservation and Restoration of Data Using Unrealized Data Sets
Privacy Preservation and Restoration of Data Using Unrealized Data SetsIJERA Editor
 
A Review on Privacy Preservation in Data Mining
A Review on Privacy Preservation in Data MiningA Review on Privacy Preservation in Data Mining
A Review on Privacy Preservation in Data Miningijujournal
 
A Review on Privacy Preservation in Data Mining
A Review on Privacy Preservation in Data MiningA Review on Privacy Preservation in Data Mining
A Review on Privacy Preservation in Data Miningijujournal
 
SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...
SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...
SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...Editor IJMTER
 
78201919
7820191978201919
78201919IJRAT
 
78201919
7820191978201919
78201919IJRAT
 
Data Transformation Technique for Protecting Private Information in Privacy P...
Data Transformation Technique for Protecting Private Information in Privacy P...Data Transformation Technique for Protecting Private Information in Privacy P...
Data Transformation Technique for Protecting Private Information in Privacy P...acijjournal
 
Performance analysis of perturbation-based privacy preserving techniques: an ...
Performance analysis of perturbation-based privacy preserving techniques: an ...Performance analysis of perturbation-based privacy preserving techniques: an ...
Performance analysis of perturbation-based privacy preserving techniques: an ...IJECEIAES
 
A Review Study on the Privacy Preserving Data Mining Techniques and Approaches
A Review Study on the Privacy Preserving Data Mining Techniques and ApproachesA Review Study on the Privacy Preserving Data Mining Techniques and Approaches
A Review Study on the Privacy Preserving Data Mining Techniques and Approaches14894
 
Bj32809815
Bj32809815Bj32809815
Bj32809815IJMER
 
A Survey on Features and Techniques Description for Privacy of Sensitive Info...
A Survey on Features and Techniques Description for Privacy of Sensitive Info...A Survey on Features and Techniques Description for Privacy of Sensitive Info...
A Survey on Features and Techniques Description for Privacy of Sensitive Info...IRJET Journal
 
Paper id 212014109
Paper id 212014109Paper id 212014109
Paper id 212014109IJRAT
 
Multilevel Privacy Preserving by Linear and Non Linear Data Distortion
Multilevel Privacy Preserving by Linear and Non Linear Data DistortionMultilevel Privacy Preserving by Linear and Non Linear Data Distortion
Multilevel Privacy Preserving by Linear and Non Linear Data DistortionIOSR Journals
 
Efficient technique for privacy preserving publishing of set valued data on c...
Efficient technique for privacy preserving publishing of set valued data on c...Efficient technique for privacy preserving publishing of set valued data on c...
Efficient technique for privacy preserving publishing of set valued data on c...ElavarasaN GanesaN
 
IRJET- Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...
IRJET-  	  Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...IRJET-  	  Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...
IRJET- Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...IRJET Journal
 
Privacy Preserving Approaches for High Dimensional Data
Privacy Preserving Approaches for High Dimensional DataPrivacy Preserving Approaches for High Dimensional Data
Privacy Preserving Approaches for High Dimensional Dataijtsrd
 
Maintaining Data Confidentiality in Association Rule Mining in Distributed En...
Maintaining Data Confidentiality in Association Rule Mining in Distributed En...Maintaining Data Confidentiality in Association Rule Mining in Distributed En...
Maintaining Data Confidentiality in Association Rule Mining in Distributed En...IJSRD
 

Similar to A Survey Paper on an Integrated Approach for Privacy Preserving In High Dimensional Data Using Randomized and SVD Algorithm (20)

Privacy Preservation and Restoration of Data Using Unrealized Data Sets
Privacy Preservation and Restoration of Data Using Unrealized Data SetsPrivacy Preservation and Restoration of Data Using Unrealized Data Sets
Privacy Preservation and Restoration of Data Using Unrealized Data Sets
 
A Review on Privacy Preservation in Data Mining
A Review on Privacy Preservation in Data MiningA Review on Privacy Preservation in Data Mining
A Review on Privacy Preservation in Data Mining
 
A Review on Privacy Preservation in Data Mining
A Review on Privacy Preservation in Data MiningA Review on Privacy Preservation in Data Mining
A Review on Privacy Preservation in Data Mining
 
1699 1704
1699 17041699 1704
1699 1704
 
J017536064
J017536064J017536064
J017536064
 
SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...
SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...
SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...
 
78201919
7820191978201919
78201919
 
78201919
7820191978201919
78201919
 
Data Transformation Technique for Protecting Private Information in Privacy P...
Data Transformation Technique for Protecting Private Information in Privacy P...Data Transformation Technique for Protecting Private Information in Privacy P...
Data Transformation Technique for Protecting Private Information in Privacy P...
 
Performance analysis of perturbation-based privacy preserving techniques: an ...
Performance analysis of perturbation-based privacy preserving techniques: an ...Performance analysis of perturbation-based privacy preserving techniques: an ...
Performance analysis of perturbation-based privacy preserving techniques: an ...
 
A Review Study on the Privacy Preserving Data Mining Techniques and Approaches
A Review Study on the Privacy Preserving Data Mining Techniques and ApproachesA Review Study on the Privacy Preserving Data Mining Techniques and Approaches
A Review Study on the Privacy Preserving Data Mining Techniques and Approaches
 
Bj32809815
Bj32809815Bj32809815
Bj32809815
 
A Survey on Features and Techniques Description for Privacy of Sensitive Info...
A Survey on Features and Techniques Description for Privacy of Sensitive Info...A Survey on Features and Techniques Description for Privacy of Sensitive Info...
A Survey on Features and Techniques Description for Privacy of Sensitive Info...
 
E04623438
E04623438E04623438
E04623438
 
Paper id 212014109
Paper id 212014109Paper id 212014109
Paper id 212014109
 
Multilevel Privacy Preserving by Linear and Non Linear Data Distortion
Multilevel Privacy Preserving by Linear and Non Linear Data DistortionMultilevel Privacy Preserving by Linear and Non Linear Data Distortion
Multilevel Privacy Preserving by Linear and Non Linear Data Distortion
 
Efficient technique for privacy preserving publishing of set valued data on c...
Efficient technique for privacy preserving publishing of set valued data on c...Efficient technique for privacy preserving publishing of set valued data on c...
Efficient technique for privacy preserving publishing of set valued data on c...
 
IRJET- Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...
IRJET-  	  Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...IRJET-  	  Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...
IRJET- Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...
 
Privacy Preserving Approaches for High Dimensional Data
Privacy Preserving Approaches for High Dimensional DataPrivacy Preserving Approaches for High Dimensional Data
Privacy Preserving Approaches for High Dimensional Data
 
Maintaining Data Confidentiality in Association Rule Mining in Distributed En...
Maintaining Data Confidentiality in Association Rule Mining in Distributed En...Maintaining Data Confidentiality in Association Rule Mining in Distributed En...
Maintaining Data Confidentiality in Association Rule Mining in Distributed En...
 

More from IJSRD

#IJSRD #Research Paper Publication
#IJSRD #Research Paper Publication#IJSRD #Research Paper Publication
#IJSRD #Research Paper PublicationIJSRD
 
Maintaining Data Confidentiality in Association Rule Mining in Distributed En...
Maintaining Data Confidentiality in Association Rule Mining in Distributed En...Maintaining Data Confidentiality in Association Rule Mining in Distributed En...
Maintaining Data Confidentiality in Association Rule Mining in Distributed En...IJSRD
 
Performance and Emission characteristics of a Single Cylinder Four Stroke Die...
Performance and Emission characteristics of a Single Cylinder Four Stroke Die...Performance and Emission characteristics of a Single Cylinder Four Stroke Die...
Performance and Emission characteristics of a Single Cylinder Four Stroke Die...IJSRD
 
Preclusion of High and Low Pressure In Boiler by Using LABVIEW
Preclusion of High and Low Pressure In Boiler by Using LABVIEWPreclusion of High and Low Pressure In Boiler by Using LABVIEW
Preclusion of High and Low Pressure In Boiler by Using LABVIEWIJSRD
 
Prevention and Detection of Man in the Middle Attack on AODV Protocol
Prevention and Detection of Man in the Middle Attack on AODV ProtocolPrevention and Detection of Man in the Middle Attack on AODV Protocol
Prevention and Detection of Man in the Middle Attack on AODV ProtocolIJSRD
 
Comparative Analysis of PAPR Reduction Techniques in OFDM Using Precoding Tec...
Comparative Analysis of PAPR Reduction Techniques in OFDM Using Precoding Tec...Comparative Analysis of PAPR Reduction Techniques in OFDM Using Precoding Tec...
Comparative Analysis of PAPR Reduction Techniques in OFDM Using Precoding Tec...IJSRD
 
Evaluation the Effect of Machining Parameters on MRR of Mild Steel
Evaluation the Effect of Machining Parameters on MRR of Mild SteelEvaluation the Effect of Machining Parameters on MRR of Mild Steel
Evaluation the Effect of Machining Parameters on MRR of Mild SteelIJSRD
 
Filter unwanted messages from walls and blocking nonlegitimate user in osn
Filter unwanted messages from walls and blocking nonlegitimate user in osnFilter unwanted messages from walls and blocking nonlegitimate user in osn
Filter unwanted messages from walls and blocking nonlegitimate user in osnIJSRD
 
Keystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management SystemKeystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management SystemIJSRD
 
Diagnosing lungs cancer Using Neural Networks
Diagnosing lungs cancer Using Neural NetworksDiagnosing lungs cancer Using Neural Networks
Diagnosing lungs cancer Using Neural NetworksIJSRD
 
A Survey on Sentiment Analysis and Opinion Mining
A Survey on Sentiment Analysis and Opinion MiningA Survey on Sentiment Analysis and Opinion Mining
A Survey on Sentiment Analysis and Opinion MiningIJSRD
 
A Defect Prediction Model for Software Product based on ANFIS
A Defect Prediction Model for Software Product based on ANFISA Defect Prediction Model for Software Product based on ANFIS
A Defect Prediction Model for Software Product based on ANFISIJSRD
 
Experimental Investigation of Granulated Blast Furnace Slag ond Quarry Dust a...
Experimental Investigation of Granulated Blast Furnace Slag ond Quarry Dust a...Experimental Investigation of Granulated Blast Furnace Slag ond Quarry Dust a...
Experimental Investigation of Granulated Blast Furnace Slag ond Quarry Dust a...IJSRD
 
Product Quality Analysis based on online Reviews
Product Quality Analysis based on online ReviewsProduct Quality Analysis based on online Reviews
Product Quality Analysis based on online ReviewsIJSRD
 
Solving Fuzzy Matrix Games Defuzzificated by Trapezoidal Parabolic Fuzzy Numbers
Solving Fuzzy Matrix Games Defuzzificated by Trapezoidal Parabolic Fuzzy NumbersSolving Fuzzy Matrix Games Defuzzificated by Trapezoidal Parabolic Fuzzy Numbers
Solving Fuzzy Matrix Games Defuzzificated by Trapezoidal Parabolic Fuzzy NumbersIJSRD
 
Study of Clustering of Data Base in Education Sector Using Data Mining
Study of Clustering of Data Base in Education Sector Using Data MiningStudy of Clustering of Data Base in Education Sector Using Data Mining
Study of Clustering of Data Base in Education Sector Using Data MiningIJSRD
 
Fault Tolerance in Big Data Processing Using Heartbeat Messages and Data Repl...
Fault Tolerance in Big Data Processing Using Heartbeat Messages and Data Repl...Fault Tolerance in Big Data Processing Using Heartbeat Messages and Data Repl...
Fault Tolerance in Big Data Processing Using Heartbeat Messages and Data Repl...IJSRD
 
Investigation of Effect of Process Parameters on Maximum Temperature during F...
Investigation of Effect of Process Parameters on Maximum Temperature during F...Investigation of Effect of Process Parameters on Maximum Temperature during F...
Investigation of Effect of Process Parameters on Maximum Temperature during F...IJSRD
 
Review Paper on Computer Aided Design & Analysis of Rotor Shaft of a Rotavator
Review Paper on Computer Aided Design & Analysis of Rotor Shaft of a RotavatorReview Paper on Computer Aided Design & Analysis of Rotor Shaft of a Rotavator
Review Paper on Computer Aided Design & Analysis of Rotor Shaft of a RotavatorIJSRD
 
A Survey on Data Mining Techniques for Crime Hotspots Prediction
A Survey on Data Mining Techniques for Crime Hotspots PredictionA Survey on Data Mining Techniques for Crime Hotspots Prediction
A Survey on Data Mining Techniques for Crime Hotspots PredictionIJSRD
 

More from IJSRD (20)

#IJSRD #Research Paper Publication
#IJSRD #Research Paper Publication#IJSRD #Research Paper Publication
#IJSRD #Research Paper Publication
 
Maintaining Data Confidentiality in Association Rule Mining in Distributed En...
Maintaining Data Confidentiality in Association Rule Mining in Distributed En...Maintaining Data Confidentiality in Association Rule Mining in Distributed En...
Maintaining Data Confidentiality in Association Rule Mining in Distributed En...
 
Performance and Emission characteristics of a Single Cylinder Four Stroke Die...
Performance and Emission characteristics of a Single Cylinder Four Stroke Die...Performance and Emission characteristics of a Single Cylinder Four Stroke Die...
Performance and Emission characteristics of a Single Cylinder Four Stroke Die...
 
Preclusion of High and Low Pressure In Boiler by Using LABVIEW
Preclusion of High and Low Pressure In Boiler by Using LABVIEWPreclusion of High and Low Pressure In Boiler by Using LABVIEW
Preclusion of High and Low Pressure In Boiler by Using LABVIEW
 
Prevention and Detection of Man in the Middle Attack on AODV Protocol
Prevention and Detection of Man in the Middle Attack on AODV ProtocolPrevention and Detection of Man in the Middle Attack on AODV Protocol
Prevention and Detection of Man in the Middle Attack on AODV Protocol
 
Comparative Analysis of PAPR Reduction Techniques in OFDM Using Precoding Tec...
Comparative Analysis of PAPR Reduction Techniques in OFDM Using Precoding Tec...Comparative Analysis of PAPR Reduction Techniques in OFDM Using Precoding Tec...
Comparative Analysis of PAPR Reduction Techniques in OFDM Using Precoding Tec...
 
Evaluation the Effect of Machining Parameters on MRR of Mild Steel
Evaluation the Effect of Machining Parameters on MRR of Mild SteelEvaluation the Effect of Machining Parameters on MRR of Mild Steel
Evaluation the Effect of Machining Parameters on MRR of Mild Steel
 
Filter unwanted messages from walls and blocking nonlegitimate user in osn
Filter unwanted messages from walls and blocking nonlegitimate user in osnFilter unwanted messages from walls and blocking nonlegitimate user in osn
Filter unwanted messages from walls and blocking nonlegitimate user in osn
 
Keystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management SystemKeystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management System
 
Diagnosing lungs cancer Using Neural Networks
Diagnosing lungs cancer Using Neural NetworksDiagnosing lungs cancer Using Neural Networks
Diagnosing lungs cancer Using Neural Networks
 
A Survey on Sentiment Analysis and Opinion Mining
A Survey on Sentiment Analysis and Opinion MiningA Survey on Sentiment Analysis and Opinion Mining
A Survey on Sentiment Analysis and Opinion Mining
 
A Defect Prediction Model for Software Product based on ANFIS
A Defect Prediction Model for Software Product based on ANFISA Defect Prediction Model for Software Product based on ANFIS
A Defect Prediction Model for Software Product based on ANFIS
 
Experimental Investigation of Granulated Blast Furnace Slag ond Quarry Dust a...
Experimental Investigation of Granulated Blast Furnace Slag ond Quarry Dust a...Experimental Investigation of Granulated Blast Furnace Slag ond Quarry Dust a...
Experimental Investigation of Granulated Blast Furnace Slag ond Quarry Dust a...
 
Product Quality Analysis based on online Reviews
Product Quality Analysis based on online ReviewsProduct Quality Analysis based on online Reviews
Product Quality Analysis based on online Reviews
 
Solving Fuzzy Matrix Games Defuzzificated by Trapezoidal Parabolic Fuzzy Numbers
Solving Fuzzy Matrix Games Defuzzificated by Trapezoidal Parabolic Fuzzy NumbersSolving Fuzzy Matrix Games Defuzzificated by Trapezoidal Parabolic Fuzzy Numbers
Solving Fuzzy Matrix Games Defuzzificated by Trapezoidal Parabolic Fuzzy Numbers
 
Study of Clustering of Data Base in Education Sector Using Data Mining
Study of Clustering of Data Base in Education Sector Using Data MiningStudy of Clustering of Data Base in Education Sector Using Data Mining
Study of Clustering of Data Base in Education Sector Using Data Mining
 
Fault Tolerance in Big Data Processing Using Heartbeat Messages and Data Repl...
Fault Tolerance in Big Data Processing Using Heartbeat Messages and Data Repl...Fault Tolerance in Big Data Processing Using Heartbeat Messages and Data Repl...
Fault Tolerance in Big Data Processing Using Heartbeat Messages and Data Repl...
 
Investigation of Effect of Process Parameters on Maximum Temperature during F...
Investigation of Effect of Process Parameters on Maximum Temperature during F...Investigation of Effect of Process Parameters on Maximum Temperature during F...
Investigation of Effect of Process Parameters on Maximum Temperature during F...
 
Review Paper on Computer Aided Design & Analysis of Rotor Shaft of a Rotavator
Review Paper on Computer Aided Design & Analysis of Rotor Shaft of a RotavatorReview Paper on Computer Aided Design & Analysis of Rotor Shaft of a Rotavator
Review Paper on Computer Aided Design & Analysis of Rotor Shaft of a Rotavator
 
A Survey on Data Mining Techniques for Crime Hotspots Prediction
A Survey on Data Mining Techniques for Crime Hotspots PredictionA Survey on Data Mining Techniques for Crime Hotspots Prediction
A Survey on Data Mining Techniques for Crime Hotspots Prediction
 

Recently uploaded

Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 

Recently uploaded (20)

Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 

A Survey Paper on an Integrated Approach for Privacy Preserving In High Dimensional Data Using Randomized and SVD Algorithm

  • 1. IJSRD - International Journal for Scientific Research & Development| Vol. 3, Issue 10, 2015 | ISSN (online): 2321-0613 All rights reserved by www.ijsrd.com 747 A Survey Paper on an Integrated Approach for Privacy Preserving in High Dimensional Data using Randomized and SVD Algorithm Tripti Singh Thakur1 Dr. Abha Choubey2 1 P.G. Scholar 2 Associate Professor 1,2 Department of Computer Science & Engineering 1,2 SSGI, SSTC, Bhilai(C.G.) Abstract— Data mining is a technique which is used for extraction of knowledge and information from large amount of data collected by hospitals, government and individuals. The term data mining is also referred as knowledge mining from databases. The major challenge in data mining is ensuring security and privacy of data in databases, because data sharing is common at organizational level. The data in databases comes from a number of sources like – medical, financial, library, marketing, shopping record etc so it is foremost task for anyone to keep secure that data. The objective is to achieve fully privacy preserved data without affecting the data utility in databases. i.e. how data is used or transferred between organizations so that data integrity remains in database but sensitive and confidential data is preserved. This paper presents a brief study about different PPDM techniques like- Randomization, perturbation, Slicing, summarization etc. by use of which the data privacy can be preserved. The technique for which the best computational and theoretical outcome is achieved is chosen for privacy preserving in high dimensional data. Key words: Randomization; slicing; perturbation; summarization; data integrity I. INTRODUCTION Data mining deals with extraction of hidden confidential information from large data bases. For the process of picking out relevant information some techniques like- clustering, classification, associations are used. The concept of privacy preserving data mining means preserving personal information from data mining algorithms. For privacy preservation of data sometimes data is altered before delivery and sometimes it is altered after delivery (before showing it to the third party) . Now days we have different data mining applications for which security is a must for example- stock market, finance etc. In data mining system there are so many privacy preserving methods. The objective of privacy preserving data mining is to search some technique in which the original information is transformed in some way so that the private data and private knowledge remain confidential after the mining process. Data cleansing only takes effect on certain type of errors and cannot result in perfect data, eliminating noisy data may lead to information loss. Noise corrupted data can be modified by the use of noise [1] knowledge. Data privacy can also be preserved by random non-linear data transformation [4].SVM classifier is also applicable for privacy preservation problems [5].WCNN algo is improved SVD method which perform data perturbation, which is more efficient in balancing data privacy and utility [6]. Enabling multilevel trust poses new challenges for perturbation based PPDM. The key challenge lies in preventing the data miners from combining the copies at different trust levels to jointly reconstruct the original data more accurate [8]. Privacy can also be preserved by decision tree learning on unrealized data sets [9]. Sample selection maintain ration of data between mixed data and original data. The singular value decomposition prevents the loss of mixed data and extracted data in decomposition of matrix [10]. Because of the increasing capability to trace and gather large amount of sensitive information privacy preserving in data mining applications has become an important concern[15].If data transformation and encryption techniques are applied in combination then the data privacy is preserved strongly [17].In Vector Quantization after encoding one can not reveal the original data hence privacy is preserved. The vector quantization methods are efficiently applied in the development of speech recognition system [20]. II. PROBLEM DEFINITION Due to the increase in sensitive information in databases privacy preservation is an important concern for each and every data miner. The need for privacy is sometimes due to law(for medical databases) or can be influenced by medical interest. For scientific, economic and market oriented databases confidentiality is an important issue. So it is important to develop such a technique for privacy preservation that the data utility and integrity remains constant without affecting the data confidentiality. III. METHODOLOGY Main goal of privacy preserving data mining is to detect such solution which will result data security with data integrity with low computational complexity. We have the following different techniques for privacy preservation data mining which have been proposed after deep study of data mining community- A. Randomization Technique In randomization technique the original data is hidden by randomly modifying the data values. It provides some deeper statistical approach to security and privacy. On dataset randomization is applied either by adding or by multiplying random values to original records. Randomization technique is Easy to implement and it has a very High search accuracy. It is computationally efficient and Suitable for different user requirements. But it results High information loss. B. Perturbation Technique This technique is also known as noise addition technique. Here noise is introduced either to the data or to the result of the queries. Perturbation is done by use of Gaussian and uniform perturbing functions. Here each and every attribute is treated independently but the Data Confidentiality has been compromised sometimes.
  • 2. A Survey Paper on an Integrated Approach for Privacy Preserving in High Dimensional Data using Randomized and SVD Algorithm (IJSRD/Vol. 3/Issue 10/2015/162) All rights reserved by www.ijsrd.com 748 C. Cryptographic Technique In cryptographic technique data value is altered by some encryption technique like secure sum, secure set union, and secure size set intersection etc. on all data or only on confidential data values. The output of a computation is not protected by cryptographic techniques instead it prevents privacy leaks during computation. It provide High search Accuracy but with high Computational complexity. D. Slicing In this technique the data set is partitioned both vertically and horizontally. The basic idea of slicing is to preserve the association within each column and break association between uncorrelated attributes, which are infrequent. Here reduced data dimensionality is achieved with preserved data utility. It preserves better utility in micro data but It is Not used for high dimensional data. E. Summarization In this technique the data is released in the form of a “summery” which only having some aggregate queries not the confidential records. Summarization is applied either by sampling or by tabular representation of data values. It is mostly used for tabular data but privacy preservation is not guaranteed. F. Suppression In this technique suppression is applied on sensitive data before any computation. Use of suppression increases the data utility and reduces the amount of sensitive data on dataset. Here protection from discovery of certain statistical characteristics, such as sensitive association rules is done. G. SVD Technique It is a matrix factorization technique which is most widely used in PPDM. It perturbs every sample of data to the same degree and Provide less information loss but for different user requirements it is not suitable. IV. RESULT After studying different privacy preserving data mining techniques the result we conclude is that If randomization is used with perturbation technique and SVD technique Better privacy may be achieved with increased data utility because In the combination of these three techniques the cons of each techniques are recovered by the pros of other two techniques. The graphical representation of expected outcome is shown below Fig. 1: Graph .1: Graphical representation of expected outcome V. CONCLUSION In this paper a wide survey has been done on different approaches for privacy preserving data mining. In order to find out better privacy and high data accuracy on high dimensional data randomized noise based perturbation technique with SVD is selected. Our future work will decide that Privacy preservation and knowledge discovery both goals can be achieved by using these 3 methods. REFERENCES [1] Xingdong Wu and XingQuan Zhu “Mining with Noise Knowledge: Error-Aware Data Mining” IEEE Transaction on System, Man and Cybernatics- Part A: Systems And Humans, Vol. 38 July 2008. [2] Xindong Wu and Xingquan Zhu “ Mining With Noise Knowledge: Error-Aware Data Mining.” IEEE Transactions On Systems, man, and Cybernatics: JULY 2008. [3] Xiaolin Zhang, Hongjing Bi “Research on Privacy Preserving classification , data mining based on random perturbation.” IEEE international conference on Information Networking and automation 2010. [4] Kaniska Bhaduri, Member IEEE, Mark d. Stefanski, and Ashok N. Shrivastava “Privacy-Preserving Outlier Detection through Random Nonlinear Data Distortion.” IEEE Transaction on System Man and Cybernetics Vol. 41, Issue 1, Feb 2011. [5] Keng-Pie Lin and Ming-Syan Chen “On the Design and Analysis of the Privacy-Preserving SVM classifier.” IEEE Transaction on Knowledge And Data Engineering Vol.23, Issue 11, November 2011. [6] Guang Li and Yadong Wang “Privacy preserving data mining based on sample selection and singular value decomposition.” IEEE international conference on Internet computing and information services 2011. [7] Guang Li and Yadong Wang “Privacy preserving classification Method Based on singular value decomposition.” International Arab Journal of information Technology Vol.9, Issue 6, 2012. [8] Yaping Li, MinghuaChen , Qiwei Li, and Wei Zhang “Enabling Multilevel Trust in Privacy Preserving Data Mining .” IEEE Transactions on Knowledge And Data Engineering, Vol. 24 , Issue-9, September 2012. [9] Pui k Fong and Jens H. Webber-Jahnke “Privacy Preserving Decision Tree Learning Using Unrealized Data Sets” IEEE Transactions on Knowledge and Data Engineering Vol.24, Issue-2, February 2012. [10]Priyank jain , pratibha Tapashetti , Dr. A. S.Umesh, sweta sharma: “Privacy preserving processing of high dimensional data classification based on sample selection and SVD.” IEEE international conference on control, Automation, robotics and embedded system 2013. [11]Alxandre Evfimievski “Randomization in Privacy Preserving Data Mining” SIGKDD Explorations VOL.4 Issue-2 Pg-43-48. [12]Charu C. Aggarwal “On the Analytical Properties of High Dimensional Randomization.” IEEE Transaction on Knowledge And Data engineering Vol. 25, Issue-7 July 2013.
  • 3. A Survey Paper on an Integrated Approach for Privacy Preserving in High Dimensional Data using Randomized and SVD Algorithm (IJSRD/Vol. 3/Issue 10/2015/162) All rights reserved by www.ijsrd.com 749 [13]Mohnish Patel, Prashant Richarya, Anurag Shrivastava “Privacy preserving Using Randomization And Encryption Methods.” Scholars journal of Engineering And technology(SJET) 2013, Issue-3 pg.117-121. [14]Tiancheng Li, Ninghui li “Slicing: A new approach for privacy preserving data publishing.” IEEE Transactions on Knowledge and Data Engineering Vol.24, Issue-3, March 2013. [15]Nivetha.P.R, Thamarai selvi.K “A Survey on Privacy preserving Data Mining Techniques.”International Journal of Computer Science and Mobile Computing Vol. 2 Issue-10, October 2013, pg.166-170. [16]Wenjun Lu , Avinash L. Varna(Member IEEE) & Min Wu “Confidentiality-preserving image Search : A Comparative Study Between Homomorphic Encryption and Distance-preserving Randomization.” IEEE Vol-2 2014 pg. 125-141. [17]Santosh Kumar Bhandare “Data transformation and encryption based privacy preserving Data mining System.” International Journal of Advanced Research in Computer Science & Software Engineering Vol. 4, Issue 7, July 2014. [18]Dhivakar k, Mohana “A Survey on privacy preservation approaches and techniques.” International Journal of Innovative Research in Computer & Communication Engineering Vol. 2, Issue 11, November 2014. [19]Sachin janbandhu, Dr. S.M. Chaware “Survey on Data Mining with privacy preservation” International Journal on Computer Science & Information Technology Vol-5(4) 2014. [20]S.Sasikala, S. Nathira banu “Privacy preserving data mining using Piecewise Vector Quantization (PVQ).” International journal of Advanced Research in Computer Science and Technology 2014. [21]Xiaohua Tong, Zhen Ye, Yusheng Xu , ShiJie Liu , LIngyun Li, Huan Xie, and Tianpeng Li “A Novel Subpixel Phase Correlation Method Using Singular Value Decomposition Method and Unified Random Sample Consensus.” IEEE Transactions on Geosciences and Remote Sensing Vol.53 Issue-8 August 2015.