SlideShare a Scribd company logo
International 
OPEN ACCESS Journal 
Of Modern Engineering Research (IJMER) 
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss.7| July. 2014 | 11| 
A Comparative Study on Privacy Preserving Datamining Techniques M. Nithya1, Dr. T. Sheela2, 1 Research scholar, Sathyabama University, Chennai & Assistant professor-II, Sri sairam engineering college, chennai 2 Professor, SriSairam engineering college, Chennai 
I. INTRODUCTION 
Data mining successfully extracts knowledge to support a variety of domains —marketing, weather forecasting, medical diagnosis, and national security —but it is still a challenge to mine certain kinds of data without violating the data owners’ privacy.1 For example, how to mine patients ’private data is an ongoing problem in health care applications .As data mining becomes more pervasive, such concerns are increasing. Online data collection systems are an example of new applications that threaten individual privacy. Already companies are sharing data mining models to obtain a richer set of data about mutual customers and their buying habits. A number of techniques such as classification, k-anonymity, association rule mining, clustering have been suggested in recent years in order to perform privacy preserving data mining. Furthermore, the problem has been discussed in multiple communities such as the database community, the statistical disclosure control community and the cryptography community. We analysis recent work on these topics, presenting general frameworks that we use to compare and contrast different approaches. We begin with the problem of focusing on different techniques of privacy preserving in section II,. In section III,we put rept attention to compare those methods and contrasted and finally we end up with conclusion and future work in subsequent sections. 
II. PRIVACY PRESERVING TECHNIQUES 
2.1 Anonymization Technique When releasing micro data for research purpose,one needs to limit disclosure risks to an acceptable level while maximizing data utility. To limit disclosure risk, Samarati et al. [1]; Sweeney [2] introduced the k- anonymity privacy requirement, which requires each record in an anonymized table to be indistinguishable with at least k-other records within the dataset, with respect to a set of quasi-identifier attributes. To achieve the k- anonymity requirement, they used both generalization and suppression for data anonymization. Unlike traditional privacy protection techniques such as data swapping and adding noise, information in a k-anonymous table through generalization and suppression remains truthful. In particular, a table is k- anonymous if the Ql values of each tuple are identical, to those of at least k other tuples. Table3 shows an example of 2-anonymous generalization for Table. With the help of table 1 and table 2 adversary can find the persons and their salary.in this case if we go for annoymiztion technique its somwhat difficult .If the adversary know the age and zipcode then easily he can find the salary of alice and carl with the help of tuple 1 and 3 in table3. In general, k anonymity guarantees that an individual can be associated with his real tuple with a probability at most 1/k. 
Abstract: Privacy protection is very important in the recent years for the reason of increasing in the ability to store data. In particular, recent advances in the data mining field have lead to increased concerns about privacy. Data in its original form, however, typically contains sensitive information about individuals, and publishing such data will violate individual privacy. The current practice in data publishing based on that what type of data can be released and use of that data. Recently, PPDM has received immersed attention in research communities, and many approaches have been proposed for different data publishing scenarios. In this comparative study we will systematically summarize and evaluate different approaches for PPDM, study the challenges ,differences and requirements that distinguish PPDM from other related problems, and propose future research directions. 
Keywords: PPDM, Privacy-preserving; randomization; k-anonymity;
A Comparative Study On Privacy Preserving Datamining Techniques 
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss.7| July. 2014 | 12| 
TABLE 1 MICRODATA 
Sex 
Zip Code 
Age 
Salary 
F 
40178 
26 
8000 
F 
40277 
30 
12000 
M 
40176 
32 
8000 
F 
40175 
51 
9000 
F 
40385 
28 
20000 
M 
40485 
43 
23000 
M 
40286 
50 
8000 
TABLE2 POPULATION CENSUS TABLE 3 A 2-AN0NYM0US TABLE 
Even k-anonymity protects against identity disclosure, it does not provide sufficient protection against attribute disclosure. There are two attacks: the homogeneity attack and the background knowledge attack. 
2.2. Data perturbation approach 
In this approach data will be modified so that it no longer represents the real world. Randomization and data swapping methods are two techniques which comes under this approach. Since this method does not reconstruct the original data values but only distributions, new algorithms need to be developed which use these reconstructed distribution in order to perform mining of the underlying data. This means that for each individual data problem such as classification, clustering, or association rule mining, a new distribution based data mining algorithm needs to be developed. For example, Agrawal [3] develops a new distribution-based data mining algorithm for the classification problem, whereas the techniques in Vaidya and Clifton and Rizvi and Haritsa[4] develop methods s for privacy-preserving association rule mining. While some clever approaches have been developed for distribution-based mining of data for particular problems such as association rules and classification, it is clear that using distributions instead of original records restricts the range of algorithmic techniques that can be used on the data [5]. In randomisation technique the noise will be added to the original data in randomly so that original record values cannot be guessed from the distorted data. Disadvantage in this method,it treats all records equally irrespective of their local density. Therefore, outlier records are more susceptible to adversarial attacks as compared to records in more dense regions in the data. For an example using this method ,randomly adding 50 with age attributes (instead of 26,26+50=72,80,82,etc) ,easily the adversary know that some of the noise added in that particular attribute. Second method in data perturbation method is data swapping ,in this method data values between attributes are randomly swapped .Using this method adversary can easily get the original records. 2.3 Cryptographic technique Cryptographic technique is also used to provide privacy preserving data mining . This method became hugely popular [6] for two main reasons: Firstly, cryptography is a well-defined model for providing privacy, which includes methodologies for confirming and enumerating it. Secondly, there exists a vast toolset of cryptographic algorithms and constructs to implement privacy-preserving data mining algorithms. However, recent work [7] has pointed that cryptography does not protect the output of a computation. Instead, it prevents privacy leaks in the process of computation. So this method is not useful for provide the complete security for sensitive data in data mining. 
Name 
Sex 
ZipCode 
Age 
Alice 
F 
40178 
26 
Betty 
F 
40277 
30 
Carl 
M 
40276 
32 
Diana 
F 
40175 
51 
Ella 
F 
40385 
28 
Finch 
M 
40485 
43 
Gavin 
M 
40286 
50 
Sex 
ZipCode 
Age 
Salary 
* 
4017- 
26-32 
8000 
* 
4027- 
26-32 
12000 
* 
4017- 
26-32 
8000 
* 
4017- 
35-55 
9000 
* 
4038- 
26-32 
20000 
* 
4048- 
35-53 
23000 
* 
4028- 
35-53 
8000
A Comparative Study On Privacy Preserving Datamining Techniques 
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss.7| July. 2014 | 13| 
2.4 Secure Multiparty Computation This method reveals nothing except the results between two parties who does not want to revel their data sources using this we can prevent our sensitive attribute. Anyhow this approach contains miniature drawbacks such as Trusted Third Party Model, Semi-honest Model. In Third party model data will be shared through the third party, so the third party comes to know the data sources. In Semi-honest Model, Consider a secure sum functionality which simply outputs the sum of the local input of the participants. With two parties, the output reveals the input of the other party. 
III. Several challenges with PPDM 
Iyengar [8] demonstrated that data can be transformed in such a way as to protect individual identity. He suggests that random data can replace any individually identifiable information. The author’s argument is that there is a tradeoff between privacy and information loss with this method. Thuraisingham [9] first suggested that privacy issues occur in data mining and that this is a generalization of the inference problem. The inference problem refers to an issue when a user can infer new knowledge by executing successive queries against a database. He also noted that this may cause ethical issues based on how the information is going to be used. Du and Zhan [10] proposed a randomized response technique to perturb data so that users cannot tell whether the data contains truthful information or false information. They used a decision-tree classifier along with randomization methods to perturb the data so that aggregate results still show some degree of accuracy, while at the same time maintain individual privacy. One drawback with this approach is that it only focused on Boolean data types to test their technique. Du and Zhan also neglected to define exactly what tolerances are acceptable during data mining with privacy preservation. Narayanan and Shmatikov [11] demonstrated that data can be encrypted in such a way that users can still use the information contained within it. Their study used provably secure techniques while permitting certain types of queries to be generated. A limitation to their study was that they only examined its use on small databases, not for larger databases. In order for their approach to work, they developed a new query language. Their approach may also be impractical if a user wanted to use widely available databases such as Microsoft SQL Server or Oracle. Generalization for k-anonymity losses considerable amount of information, especially for high-dimensional data due to the curse of dimensionality. In order for generalization to be effective, records in the same bucket must be close to each other so that generalizing the records would not lose too much information. Bucketization does not prevent membership disclosure. Because bucketization publishes the QI values in their original forms, an adversary can find out whether an individual has a record in the published data or not. Also bucketization requires a clear separation between QIs and SAs. However, in many data sets, it is unclear which attributes are QIs and which are SAs. By separating the sensitive attribute from the QI attributes, bucketization breaks the attribute correlations between the QIs and the SAs. To improve the attribute correlation slicing[12] technique has been introduced. Using slicing techniques can improve attribute correlation but it does not achieve 100 percent but it is better than k anonymity and l-diversity approaches. 
IV. Merits and Demerits of PPDM techniques 
PPDM Techniques 
Merits 
Demerits 
Anonymization technique 
This technique is used to protect user identities while releasing information. While k-anonymity protects against identity disclosure, it does not provide sufficient protection against sensitive attribute.100% accuracy can achieve. 
There are two attacks: The homogeneity attack and the background knowledge attack. 
Data perturbation approach 
Independently the noise can add to the attributes 
This method does not reconstruct the original data values ,to reconstruct the original data distribution, new algorithms have been developed . RANDOMIZED RESPONSE : Randomly the noise will be added and swapping technique have been used.
A Comparative Study On Privacy Preserving Datamining Techniques 
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss.7| July. 2014 | 14| 
Cryptographic 
Cryptography offers a well-defined model for privacy, which includes methodologies for proving and quantifying it. There exists a vast toolset of cryptographic algorithms and constructs to implement privacy preserving data mining algorithms. 
This approach is especially difficult to scale when more than a few parties are involved. Also, it does not address the question of whether the disclosure of the final data mining result may breach the privacy of individual records. 
Slicing 
More efficient and better data utility compare to anonymity and l diversity method 
Randomly generate the associations between column values of a Bucket. This may lose data utility. Random data transmission have been used. 
V. Conclusion 
With the development of data analysis and processing technique, the privacy disclosure problem about individual or company is inevitably exposed when releasing or sharing data to mine useful decision information and knowledge, then give the birth to the research field on privacy preserving data mining. In this paper, we presented different issues and reiterate privacy preserving methods to distribute ones and the methods for handling horizontally and vertically partitioned data. While all the purposed methods are only approximate to our goal of privacy preservation, we need to further perfect those approaches or develop some efficient methods. To address these issues, following problem should be widely studied. 1. In distributed privacy preserving data mining areas, efficiency is an important issue. We should try to develop more efficient algorithms and attain a balance between disclosure cost, computation cost 2. Privacy and accuracy is a pair of contradiction; improving one usually incurs a cost in the other. How to apply various optimizations to achieve a trade-off should be deeply researched. 3. Side-effects are inevitable in data cleansing process. How to reduce their negative impact on privacy preserving needs to be considered carefully. We also need to define some metrics for measuring the side- effects resulted from data processing. REFERENCES [1] J. Han and M. Kamber, Data Mining Concepts and Techniques, Morgan Kaufmann, 2001. [2] P. Samarati,(2001). Protecting respondent's privacy in micro data release. In IEEE Transaction on knowledge and Data Engineering,pp.010-027. [3] L. Sweeney, (2002)."k-anonymity: a model for protecting privacy ", International Journal on Uncertainty, Fuzziness and Knowledge based Systems, pp. 557-570. [4] Evfimievski, A.Srikant, R.Agrawal, and Gehrke J(2002),"Privacy preserving mining of association rules". In Proc.KDD02, pp. 217-228. [5] Hong, J.I. and J.A. Landay,(2004).Architecture for Privacy Sensitive Ubiquitous Computing", In Mobisys04, pp. 177- 189. [6] Laur, H. Lipmaa, and T. Mieli' ainen,(2006)."Cryptographically private support vector machines". In Twelfth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 618-624. [7] Ke Wang, Benjamin C. M. Fung1 and Philip S. Yu, (2005) "Template based privacy preservation in classification problems", InICDM, pp. 466-473. [8] Iyengar, V. (2002). Transforming data to satisfy privacy constraints. Proceedings of the 8th ACM SIGKDD International Conference on Knowledge Discovery in Data Mining, 279-288. [9] Verykios, V., Bertino, E., Fovino, I., Provenza, L., Saygin, Y., & Theodoridis, Y. (2004). State of- the-art in privacy preserving data mining. ACM SIGMOD Record, 33(1), 50-57. [10] Du, W., & Zhan, Z. (2003). Using randomized response techniques for privacy-preserving data mining. Proceedings of the 9th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 505-510. [11] Narayanan, A., & Shmatikov, V. (2005). Obfuscated databases and group privacy. Paper presented at the Proceedings of the 12th ACM Conference on Computer and Communications Security, Alexandria, VA. [12] ―Slicing: A New Approach for Privacy Preserving Data Publishing‖ - Tiancheng Li, Ninghui Li, Senior Member, IEEE, Jian Zhang, Member, IEEE, and Ian Molloy IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 24, NO. 3, MARCH 2012

More Related Content

What's hot

Privacy preservation techniques in data mining
Privacy preservation techniques in data miningPrivacy preservation techniques in data mining
Privacy preservation techniques in data mining
eSAT Publishing House
 
A Codon Frequency Obfuscation Heuristic for Raw Genomic Data Privacy
A Codon Frequency Obfuscation Heuristic for Raw Genomic Data PrivacyA Codon Frequency Obfuscation Heuristic for Raw Genomic Data Privacy
A Codon Frequency Obfuscation Heuristic for Raw Genomic Data Privacy
Kato Mivule
 
Implementation of Data Privacy and Security in an Online Student Health Recor...
Implementation of Data Privacy and Security in an Online Student Health Recor...Implementation of Data Privacy and Security in an Online Student Health Recor...
Implementation of Data Privacy and Security in an Online Student Health Recor...
Kato Mivule
 
LINK MINING PROCESS
LINK MINING PROCESSLINK MINING PROCESS
LINK MINING PROCESS
IJDKP
 
F046043234
F046043234F046043234
F046043234
IJERA Editor
 
Privacy preserving dm_ppt
Privacy preserving dm_pptPrivacy preserving dm_ppt
Privacy preserving dm_ppt
Sagar Verma
 
Privacy preserving in data mining with hybrid approach
Privacy preserving in data mining with hybrid approachPrivacy preserving in data mining with hybrid approach
Privacy preserving in data mining with hybrid approach
Narendra Dhadhal
 
78201919
7820191978201919
78201919
IJRAT
 
Privacy Preserving Data Mining
Privacy Preserving Data MiningPrivacy Preserving Data Mining
Privacy Preserving Data Mining
Vrushali Malvadkar
 
IRJET- Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...
IRJET-  	  Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...IRJET-  	  Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...
IRJET- Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...
IRJET Journal
 
Hu3414421448
Hu3414421448Hu3414421448
Hu3414421448
IJERA Editor
 
Data mining and privacy preserving in data mining
Data mining and privacy preserving in data miningData mining and privacy preserving in data mining
Data mining and privacy preserving in data mining
Needa Multani
 
Privacy Preserving Clustering on Distorted data
Privacy Preserving Clustering on Distorted dataPrivacy Preserving Clustering on Distorted data
Privacy Preserving Clustering on Distorted data
IOSR Journals
 
Privacy Preserving Data Mining Using Inverse Frequent ItemSet Mining Approach
Privacy Preserving Data Mining Using Inverse Frequent ItemSet Mining ApproachPrivacy Preserving Data Mining Using Inverse Frequent ItemSet Mining Approach
Privacy Preserving Data Mining Using Inverse Frequent ItemSet Mining Approach
IRJET Journal
 
Data Transformation Technique for Protecting Private Information in Privacy P...
Data Transformation Technique for Protecting Private Information in Privacy P...Data Transformation Technique for Protecting Private Information in Privacy P...
Data Transformation Technique for Protecting Private Information in Privacy P...
acijjournal
 
Misusability Measure Based Sanitization of Big Data for Privacy Preserving Ma...
Misusability Measure Based Sanitization of Big Data for Privacy Preserving Ma...Misusability Measure Based Sanitization of Big Data for Privacy Preserving Ma...
Misusability Measure Based Sanitization of Big Data for Privacy Preserving Ma...
IJECEIAES
 
Enabling Use of Dynamic Anonymization for Enhanced Security in Cloud
Enabling Use of Dynamic Anonymization for Enhanced Security in CloudEnabling Use of Dynamic Anonymization for Enhanced Security in Cloud
Enabling Use of Dynamic Anonymization for Enhanced Security in Cloud
IOSR Journals
 
A genetic based research framework 3
A genetic based research framework 3A genetic based research framework 3
A genetic based research framework 3
prj_publication
 
Privacy Preservation and Restoration of Data Using Unrealized Data Sets
Privacy Preservation and Restoration of Data Using Unrealized Data SetsPrivacy Preservation and Restoration of Data Using Unrealized Data Sets
Privacy Preservation and Restoration of Data Using Unrealized Data Sets
IJERA Editor
 

What's hot (19)

Privacy preservation techniques in data mining
Privacy preservation techniques in data miningPrivacy preservation techniques in data mining
Privacy preservation techniques in data mining
 
A Codon Frequency Obfuscation Heuristic for Raw Genomic Data Privacy
A Codon Frequency Obfuscation Heuristic for Raw Genomic Data PrivacyA Codon Frequency Obfuscation Heuristic for Raw Genomic Data Privacy
A Codon Frequency Obfuscation Heuristic for Raw Genomic Data Privacy
 
Implementation of Data Privacy and Security in an Online Student Health Recor...
Implementation of Data Privacy and Security in an Online Student Health Recor...Implementation of Data Privacy and Security in an Online Student Health Recor...
Implementation of Data Privacy and Security in an Online Student Health Recor...
 
LINK MINING PROCESS
LINK MINING PROCESSLINK MINING PROCESS
LINK MINING PROCESS
 
F046043234
F046043234F046043234
F046043234
 
Privacy preserving dm_ppt
Privacy preserving dm_pptPrivacy preserving dm_ppt
Privacy preserving dm_ppt
 
Privacy preserving in data mining with hybrid approach
Privacy preserving in data mining with hybrid approachPrivacy preserving in data mining with hybrid approach
Privacy preserving in data mining with hybrid approach
 
78201919
7820191978201919
78201919
 
Privacy Preserving Data Mining
Privacy Preserving Data MiningPrivacy Preserving Data Mining
Privacy Preserving Data Mining
 
IRJET- Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...
IRJET-  	  Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...IRJET-  	  Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...
IRJET- Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...
 
Hu3414421448
Hu3414421448Hu3414421448
Hu3414421448
 
Data mining and privacy preserving in data mining
Data mining and privacy preserving in data miningData mining and privacy preserving in data mining
Data mining and privacy preserving in data mining
 
Privacy Preserving Clustering on Distorted data
Privacy Preserving Clustering on Distorted dataPrivacy Preserving Clustering on Distorted data
Privacy Preserving Clustering on Distorted data
 
Privacy Preserving Data Mining Using Inverse Frequent ItemSet Mining Approach
Privacy Preserving Data Mining Using Inverse Frequent ItemSet Mining ApproachPrivacy Preserving Data Mining Using Inverse Frequent ItemSet Mining Approach
Privacy Preserving Data Mining Using Inverse Frequent ItemSet Mining Approach
 
Data Transformation Technique for Protecting Private Information in Privacy P...
Data Transformation Technique for Protecting Private Information in Privacy P...Data Transformation Technique for Protecting Private Information in Privacy P...
Data Transformation Technique for Protecting Private Information in Privacy P...
 
Misusability Measure Based Sanitization of Big Data for Privacy Preserving Ma...
Misusability Measure Based Sanitization of Big Data for Privacy Preserving Ma...Misusability Measure Based Sanitization of Big Data for Privacy Preserving Ma...
Misusability Measure Based Sanitization of Big Data for Privacy Preserving Ma...
 
Enabling Use of Dynamic Anonymization for Enhanced Security in Cloud
Enabling Use of Dynamic Anonymization for Enhanced Security in CloudEnabling Use of Dynamic Anonymization for Enhanced Security in Cloud
Enabling Use of Dynamic Anonymization for Enhanced Security in Cloud
 
A genetic based research framework 3
A genetic based research framework 3A genetic based research framework 3
A genetic based research framework 3
 
Privacy Preservation and Restoration of Data Using Unrealized Data Sets
Privacy Preservation and Restoration of Data Using Unrealized Data SetsPrivacy Preservation and Restoration of Data Using Unrealized Data Sets
Privacy Preservation and Restoration of Data Using Unrealized Data Sets
 

Viewers also liked

B04011 03 1318
B04011 03 1318B04011 03 1318
B04011 03 1318
IJMER
 
A Review of Issues in Environmentally Conscious Manufacturing and Product Re...
A Review of Issues in Environmentally Conscious Manufacturing  and Product Re...A Review of Issues in Environmentally Conscious Manufacturing  and Product Re...
A Review of Issues in Environmentally Conscious Manufacturing and Product Re...
IJMER
 
In Multi-Hop Routing identifying trusted paths through TARF in Wireless sens...
In Multi-Hop Routing identifying trusted paths through TARF in  Wireless sens...In Multi-Hop Routing identifying trusted paths through TARF in  Wireless sens...
In Multi-Hop Routing identifying trusted paths through TARF in Wireless sens...
IJMER
 
Ijmer 46053040
Ijmer 46053040Ijmer 46053040
Ijmer 46053040
IJMER
 
Bm32832838
Bm32832838Bm32832838
Bm32832838
IJMER
 
User Interactive Color Transformation between Images
User Interactive Color Transformation between ImagesUser Interactive Color Transformation between Images
User Interactive Color Transformation between Images
IJMER
 
Acquisition of Long Pseudo Code in Dsss Signal
Acquisition of Long Pseudo Code in Dsss SignalAcquisition of Long Pseudo Code in Dsss Signal
Acquisition of Long Pseudo Code in Dsss Signal
IJMER
 
Ba31163165
Ba31163165Ba31163165
Ba31163165
IJMER
 
Da31456462
Da31456462Da31456462
Da31456462
IJMER
 
Optimal Control Problem and Power-Efficient Medical Image Processing Using Puma
Optimal Control Problem and Power-Efficient Medical Image Processing Using PumaOptimal Control Problem and Power-Efficient Medical Image Processing Using Puma
Optimal Control Problem and Power-Efficient Medical Image Processing Using Puma
IJMER
 
Upgrading of Low Temperature Solar Heat with Cascade Vapor Compression and Ab...
Upgrading of Low Temperature Solar Heat with Cascade Vapor Compression and Ab...Upgrading of Low Temperature Solar Heat with Cascade Vapor Compression and Ab...
Upgrading of Low Temperature Solar Heat with Cascade Vapor Compression and Ab...
IJMER
 
Au2640944101
Au2640944101Au2640944101
Au2640944101
IJMER
 
Robust and Radial Image Comparison Using Reverse Image Search
Robust and Radial Image Comparison Using Reverse Image  Search Robust and Radial Image Comparison Using Reverse Image  Search
Robust and Radial Image Comparison Using Reverse Image Search
IJMER
 
Classification Rule Discovery Using Ant-Miner Algorithm: An Application Of N...
Classification Rule Discovery Using Ant-Miner Algorithm: An  Application Of N...Classification Rule Discovery Using Ant-Miner Algorithm: An  Application Of N...
Classification Rule Discovery Using Ant-Miner Algorithm: An Application Of N...
IJMER
 
Bh32793797
Bh32793797Bh32793797
Bh32793797
IJMER
 
Minimization of Shrinkage Porosity in A Sand Casting Process By Simulation I...
Minimization of Shrinkage Porosity in A Sand Casting Process  By Simulation I...Minimization of Shrinkage Porosity in A Sand Casting Process  By Simulation I...
Minimization of Shrinkage Porosity in A Sand Casting Process By Simulation I...
IJMER
 
AC-DC-AC-DC Converter Using Silicon Carbide Schottky Diode
AC-DC-AC-DC Converter Using Silicon Carbide Schottky DiodeAC-DC-AC-DC Converter Using Silicon Carbide Schottky Diode
AC-DC-AC-DC Converter Using Silicon Carbide Schottky Diode
IJMER
 
The Method of Repeated Application of a Quadrature Formula of Trapezoids and ...
The Method of Repeated Application of a Quadrature Formula of Trapezoids and ...The Method of Repeated Application of a Quadrature Formula of Trapezoids and ...
The Method of Repeated Application of a Quadrature Formula of Trapezoids and ...
IJMER
 
Remote Access and Dual Authentication for Cloud Storage
Remote Access and Dual Authentication for Cloud StorageRemote Access and Dual Authentication for Cloud Storage
Remote Access and Dual Authentication for Cloud Storage
IJMER
 
Optimal Converge cast Methods for Tree- Based WSNs
Optimal Converge cast Methods for Tree- Based WSNsOptimal Converge cast Methods for Tree- Based WSNs
Optimal Converge cast Methods for Tree- Based WSNs
IJMER
 

Viewers also liked (20)

B04011 03 1318
B04011 03 1318B04011 03 1318
B04011 03 1318
 
A Review of Issues in Environmentally Conscious Manufacturing and Product Re...
A Review of Issues in Environmentally Conscious Manufacturing  and Product Re...A Review of Issues in Environmentally Conscious Manufacturing  and Product Re...
A Review of Issues in Environmentally Conscious Manufacturing and Product Re...
 
In Multi-Hop Routing identifying trusted paths through TARF in Wireless sens...
In Multi-Hop Routing identifying trusted paths through TARF in  Wireless sens...In Multi-Hop Routing identifying trusted paths through TARF in  Wireless sens...
In Multi-Hop Routing identifying trusted paths through TARF in Wireless sens...
 
Ijmer 46053040
Ijmer 46053040Ijmer 46053040
Ijmer 46053040
 
Bm32832838
Bm32832838Bm32832838
Bm32832838
 
User Interactive Color Transformation between Images
User Interactive Color Transformation between ImagesUser Interactive Color Transformation between Images
User Interactive Color Transformation between Images
 
Acquisition of Long Pseudo Code in Dsss Signal
Acquisition of Long Pseudo Code in Dsss SignalAcquisition of Long Pseudo Code in Dsss Signal
Acquisition of Long Pseudo Code in Dsss Signal
 
Ba31163165
Ba31163165Ba31163165
Ba31163165
 
Da31456462
Da31456462Da31456462
Da31456462
 
Optimal Control Problem and Power-Efficient Medical Image Processing Using Puma
Optimal Control Problem and Power-Efficient Medical Image Processing Using PumaOptimal Control Problem and Power-Efficient Medical Image Processing Using Puma
Optimal Control Problem and Power-Efficient Medical Image Processing Using Puma
 
Upgrading of Low Temperature Solar Heat with Cascade Vapor Compression and Ab...
Upgrading of Low Temperature Solar Heat with Cascade Vapor Compression and Ab...Upgrading of Low Temperature Solar Heat with Cascade Vapor Compression and Ab...
Upgrading of Low Temperature Solar Heat with Cascade Vapor Compression and Ab...
 
Au2640944101
Au2640944101Au2640944101
Au2640944101
 
Robust and Radial Image Comparison Using Reverse Image Search
Robust and Radial Image Comparison Using Reverse Image  Search Robust and Radial Image Comparison Using Reverse Image  Search
Robust and Radial Image Comparison Using Reverse Image Search
 
Classification Rule Discovery Using Ant-Miner Algorithm: An Application Of N...
Classification Rule Discovery Using Ant-Miner Algorithm: An  Application Of N...Classification Rule Discovery Using Ant-Miner Algorithm: An  Application Of N...
Classification Rule Discovery Using Ant-Miner Algorithm: An Application Of N...
 
Bh32793797
Bh32793797Bh32793797
Bh32793797
 
Minimization of Shrinkage Porosity in A Sand Casting Process By Simulation I...
Minimization of Shrinkage Porosity in A Sand Casting Process  By Simulation I...Minimization of Shrinkage Porosity in A Sand Casting Process  By Simulation I...
Minimization of Shrinkage Porosity in A Sand Casting Process By Simulation I...
 
AC-DC-AC-DC Converter Using Silicon Carbide Schottky Diode
AC-DC-AC-DC Converter Using Silicon Carbide Schottky DiodeAC-DC-AC-DC Converter Using Silicon Carbide Schottky Diode
AC-DC-AC-DC Converter Using Silicon Carbide Schottky Diode
 
The Method of Repeated Application of a Quadrature Formula of Trapezoids and ...
The Method of Repeated Application of a Quadrature Formula of Trapezoids and ...The Method of Repeated Application of a Quadrature Formula of Trapezoids and ...
The Method of Repeated Application of a Quadrature Formula of Trapezoids and ...
 
Remote Access and Dual Authentication for Cloud Storage
Remote Access and Dual Authentication for Cloud StorageRemote Access and Dual Authentication for Cloud Storage
Remote Access and Dual Authentication for Cloud Storage
 
Optimal Converge cast Methods for Tree- Based WSNs
Optimal Converge cast Methods for Tree- Based WSNsOptimal Converge cast Methods for Tree- Based WSNs
Optimal Converge cast Methods for Tree- Based WSNs
 

Similar to A Comparative Study on Privacy Preserving Datamining Techniques

78201919
7820191978201919
78201919
IJRAT
 
Hy3414631468
Hy3414631468Hy3414631468
Hy3414631468
IJERA Editor
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Ib3514141422
Ib3514141422Ib3514141422
Ib3514141422
IJERA Editor
 
LINK MINING PROCESS
LINK MINING PROCESSLINK MINING PROCESS
LINK MINING PROCESS
IJDKP
 
A Review on Privacy Preservation in Data Mining
A Review on Privacy Preservation in Data MiningA Review on Privacy Preservation in Data Mining
A Review on Privacy Preservation in Data Mining
ijujournal
 
A Review on Privacy Preservation in Data Mining
A Review on Privacy Preservation in Data MiningA Review on Privacy Preservation in Data Mining
A Review on Privacy Preservation in Data Mining
ijujournal
 
A review on privacy preservation in data mining
A review on privacy preservation in data miningA review on privacy preservation in data mining
A review on privacy preservation in data mining
ijujournal
 
A Review on Privacy Preservation in Data Mining
A Review on Privacy Preservation in Data MiningA Review on Privacy Preservation in Data Mining
A Review on Privacy Preservation in Data Mining
ijujournal
 
130509
130509130509
130509
130509130509
J017536064
J017536064J017536064
J017536064
IOSR Journals
 
SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...
SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...
SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...
Editor IJMTER
 
A Survey Paper on an Integrated Approach for Privacy Preserving In High Dimen...
A Survey Paper on an Integrated Approach for Privacy Preserving In High Dimen...A Survey Paper on an Integrated Approach for Privacy Preserving In High Dimen...
A Survey Paper on an Integrated Approach for Privacy Preserving In High Dimen...
IJSRD
 
Multilevel Privacy Preserving by Linear and Non Linear Data Distortion
Multilevel Privacy Preserving by Linear and Non Linear Data DistortionMultilevel Privacy Preserving by Linear and Non Linear Data Distortion
Multilevel Privacy Preserving by Linear and Non Linear Data Distortion
IOSR Journals
 
Paper id 212014109
Paper id 212014109Paper id 212014109
Paper id 212014109
IJRAT
 
J046065457
J046065457J046065457
J046065457
IJERA Editor
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
IJERD Editor
 
A Study of Usability-aware Network Trace Anonymization
A Study of Usability-aware Network Trace Anonymization A Study of Usability-aware Network Trace Anonymization
A Study of Usability-aware Network Trace Anonymization
Kato Mivule
 
Bj32809815
Bj32809815Bj32809815
Bj32809815
IJMER
 

Similar to A Comparative Study on Privacy Preserving Datamining Techniques (20)

78201919
7820191978201919
78201919
 
Hy3414631468
Hy3414631468Hy3414631468
Hy3414631468
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Ib3514141422
Ib3514141422Ib3514141422
Ib3514141422
 
LINK MINING PROCESS
LINK MINING PROCESSLINK MINING PROCESS
LINK MINING PROCESS
 
A Review on Privacy Preservation in Data Mining
A Review on Privacy Preservation in Data MiningA Review on Privacy Preservation in Data Mining
A Review on Privacy Preservation in Data Mining
 
A Review on Privacy Preservation in Data Mining
A Review on Privacy Preservation in Data MiningA Review on Privacy Preservation in Data Mining
A Review on Privacy Preservation in Data Mining
 
A review on privacy preservation in data mining
A review on privacy preservation in data miningA review on privacy preservation in data mining
A review on privacy preservation in data mining
 
A Review on Privacy Preservation in Data Mining
A Review on Privacy Preservation in Data MiningA Review on Privacy Preservation in Data Mining
A Review on Privacy Preservation in Data Mining
 
130509
130509130509
130509
 
130509
130509130509
130509
 
J017536064
J017536064J017536064
J017536064
 
SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...
SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...
SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...
 
A Survey Paper on an Integrated Approach for Privacy Preserving In High Dimen...
A Survey Paper on an Integrated Approach for Privacy Preserving In High Dimen...A Survey Paper on an Integrated Approach for Privacy Preserving In High Dimen...
A Survey Paper on an Integrated Approach for Privacy Preserving In High Dimen...
 
Multilevel Privacy Preserving by Linear and Non Linear Data Distortion
Multilevel Privacy Preserving by Linear and Non Linear Data DistortionMultilevel Privacy Preserving by Linear and Non Linear Data Distortion
Multilevel Privacy Preserving by Linear and Non Linear Data Distortion
 
Paper id 212014109
Paper id 212014109Paper id 212014109
Paper id 212014109
 
J046065457
J046065457J046065457
J046065457
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
A Study of Usability-aware Network Trace Anonymization
A Study of Usability-aware Network Trace Anonymization A Study of Usability-aware Network Trace Anonymization
A Study of Usability-aware Network Trace Anonymization
 
Bj32809815
Bj32809815Bj32809815
Bj32809815
 

More from IJMER

A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...
IJMER
 
Developing Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingDeveloping Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed Delinting
IJMER
 
Study & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreStudy & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja Fibre
IJMER
 
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
IJMER
 
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
IJMER
 
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
IJMER
 
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
IJMER
 
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
IJMER
 
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationStatic Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
IJMER
 
High Speed Effortless Bicycle
High Speed Effortless BicycleHigh Speed Effortless Bicycle
High Speed Effortless Bicycle
IJMER
 
Integration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIntegration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise Applications
IJMER
 
Microcontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation SystemMicrocontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation System
IJMER
 
On some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological SpacesOn some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological Spaces
IJMER
 
Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...
IJMER
 
Natural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine LearningNatural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine Learning
IJMER
 
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessEvolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
IJMER
 
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersMaterial Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
IJMER
 
Studies On Energy Conservation And Audit
Studies On Energy Conservation And AuditStudies On Energy Conservation And Audit
Studies On Energy Conservation And Audit
IJMER
 
An Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDLAn Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDL
IJMER
 
Discrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One PreyDiscrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One Prey
IJMER
 

More from IJMER (20)

A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...
 
Developing Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingDeveloping Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed Delinting
 
Study & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreStudy & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja Fibre
 
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
 
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
 
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
 
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
 
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
 
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationStatic Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
 
High Speed Effortless Bicycle
High Speed Effortless BicycleHigh Speed Effortless Bicycle
High Speed Effortless Bicycle
 
Integration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIntegration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise Applications
 
Microcontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation SystemMicrocontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation System
 
On some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological SpacesOn some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological Spaces
 
Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...
 
Natural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine LearningNatural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine Learning
 
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessEvolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
 
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersMaterial Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
 
Studies On Energy Conservation And Audit
Studies On Energy Conservation And AuditStudies On Energy Conservation And Audit
Studies On Energy Conservation And Audit
 
An Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDLAn Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDL
 
Discrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One PreyDiscrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One Prey
 

Recently uploaded

Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
IJECEIAES
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
Hitesh Mohapatra
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
Victor Morales
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
gestioneergodomus
 
Series of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.pptSeries of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.ppt
PauloRodrigues104553
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
wisnuprabawa3
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
SyedAbiiAzazi1
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
Rahul
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
Dr Ramhari Poudyal
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
gerogepatton
 
digital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdfdigital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdf
drwaing
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Christina Lin
 
2. Operations Strategy in a Global Environment.ppt
2. Operations Strategy in a Global Environment.ppt2. Operations Strategy in a Global Environment.ppt
2. Operations Strategy in a Global Environment.ppt
PuktoonEngr
 
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
ihlasbinance2003
 
sieving analysis and results interpretation
sieving analysis and results interpretationsieving analysis and results interpretation
sieving analysis and results interpretation
ssuser36d3051
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
University of Maribor
 
PPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testingPPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testing
anoopmanoharan2
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
gerogepatton
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
IJECEIAES
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
ClaraZara1
 

Recently uploaded (20)

Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
 
Series of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.pptSeries of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.ppt
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
 
digital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdfdigital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdf
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
 
2. Operations Strategy in a Global Environment.ppt
2. Operations Strategy in a Global Environment.ppt2. Operations Strategy in a Global Environment.ppt
2. Operations Strategy in a Global Environment.ppt
 
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
 
sieving analysis and results interpretation
sieving analysis and results interpretationsieving analysis and results interpretation
sieving analysis and results interpretation
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
 
PPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testingPPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testing
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
 

A Comparative Study on Privacy Preserving Datamining Techniques

  • 1. International OPEN ACCESS Journal Of Modern Engineering Research (IJMER) | IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss.7| July. 2014 | 11| A Comparative Study on Privacy Preserving Datamining Techniques M. Nithya1, Dr. T. Sheela2, 1 Research scholar, Sathyabama University, Chennai & Assistant professor-II, Sri sairam engineering college, chennai 2 Professor, SriSairam engineering college, Chennai I. INTRODUCTION Data mining successfully extracts knowledge to support a variety of domains —marketing, weather forecasting, medical diagnosis, and national security —but it is still a challenge to mine certain kinds of data without violating the data owners’ privacy.1 For example, how to mine patients ’private data is an ongoing problem in health care applications .As data mining becomes more pervasive, such concerns are increasing. Online data collection systems are an example of new applications that threaten individual privacy. Already companies are sharing data mining models to obtain a richer set of data about mutual customers and their buying habits. A number of techniques such as classification, k-anonymity, association rule mining, clustering have been suggested in recent years in order to perform privacy preserving data mining. Furthermore, the problem has been discussed in multiple communities such as the database community, the statistical disclosure control community and the cryptography community. We analysis recent work on these topics, presenting general frameworks that we use to compare and contrast different approaches. We begin with the problem of focusing on different techniques of privacy preserving in section II,. In section III,we put rept attention to compare those methods and contrasted and finally we end up with conclusion and future work in subsequent sections. II. PRIVACY PRESERVING TECHNIQUES 2.1 Anonymization Technique When releasing micro data for research purpose,one needs to limit disclosure risks to an acceptable level while maximizing data utility. To limit disclosure risk, Samarati et al. [1]; Sweeney [2] introduced the k- anonymity privacy requirement, which requires each record in an anonymized table to be indistinguishable with at least k-other records within the dataset, with respect to a set of quasi-identifier attributes. To achieve the k- anonymity requirement, they used both generalization and suppression for data anonymization. Unlike traditional privacy protection techniques such as data swapping and adding noise, information in a k-anonymous table through generalization and suppression remains truthful. In particular, a table is k- anonymous if the Ql values of each tuple are identical, to those of at least k other tuples. Table3 shows an example of 2-anonymous generalization for Table. With the help of table 1 and table 2 adversary can find the persons and their salary.in this case if we go for annoymiztion technique its somwhat difficult .If the adversary know the age and zipcode then easily he can find the salary of alice and carl with the help of tuple 1 and 3 in table3. In general, k anonymity guarantees that an individual can be associated with his real tuple with a probability at most 1/k. Abstract: Privacy protection is very important in the recent years for the reason of increasing in the ability to store data. In particular, recent advances in the data mining field have lead to increased concerns about privacy. Data in its original form, however, typically contains sensitive information about individuals, and publishing such data will violate individual privacy. The current practice in data publishing based on that what type of data can be released and use of that data. Recently, PPDM has received immersed attention in research communities, and many approaches have been proposed for different data publishing scenarios. In this comparative study we will systematically summarize and evaluate different approaches for PPDM, study the challenges ,differences and requirements that distinguish PPDM from other related problems, and propose future research directions. Keywords: PPDM, Privacy-preserving; randomization; k-anonymity;
  • 2. A Comparative Study On Privacy Preserving Datamining Techniques | IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss.7| July. 2014 | 12| TABLE 1 MICRODATA Sex Zip Code Age Salary F 40178 26 8000 F 40277 30 12000 M 40176 32 8000 F 40175 51 9000 F 40385 28 20000 M 40485 43 23000 M 40286 50 8000 TABLE2 POPULATION CENSUS TABLE 3 A 2-AN0NYM0US TABLE Even k-anonymity protects against identity disclosure, it does not provide sufficient protection against attribute disclosure. There are two attacks: the homogeneity attack and the background knowledge attack. 2.2. Data perturbation approach In this approach data will be modified so that it no longer represents the real world. Randomization and data swapping methods are two techniques which comes under this approach. Since this method does not reconstruct the original data values but only distributions, new algorithms need to be developed which use these reconstructed distribution in order to perform mining of the underlying data. This means that for each individual data problem such as classification, clustering, or association rule mining, a new distribution based data mining algorithm needs to be developed. For example, Agrawal [3] develops a new distribution-based data mining algorithm for the classification problem, whereas the techniques in Vaidya and Clifton and Rizvi and Haritsa[4] develop methods s for privacy-preserving association rule mining. While some clever approaches have been developed for distribution-based mining of data for particular problems such as association rules and classification, it is clear that using distributions instead of original records restricts the range of algorithmic techniques that can be used on the data [5]. In randomisation technique the noise will be added to the original data in randomly so that original record values cannot be guessed from the distorted data. Disadvantage in this method,it treats all records equally irrespective of their local density. Therefore, outlier records are more susceptible to adversarial attacks as compared to records in more dense regions in the data. For an example using this method ,randomly adding 50 with age attributes (instead of 26,26+50=72,80,82,etc) ,easily the adversary know that some of the noise added in that particular attribute. Second method in data perturbation method is data swapping ,in this method data values between attributes are randomly swapped .Using this method adversary can easily get the original records. 2.3 Cryptographic technique Cryptographic technique is also used to provide privacy preserving data mining . This method became hugely popular [6] for two main reasons: Firstly, cryptography is a well-defined model for providing privacy, which includes methodologies for confirming and enumerating it. Secondly, there exists a vast toolset of cryptographic algorithms and constructs to implement privacy-preserving data mining algorithms. However, recent work [7] has pointed that cryptography does not protect the output of a computation. Instead, it prevents privacy leaks in the process of computation. So this method is not useful for provide the complete security for sensitive data in data mining. Name Sex ZipCode Age Alice F 40178 26 Betty F 40277 30 Carl M 40276 32 Diana F 40175 51 Ella F 40385 28 Finch M 40485 43 Gavin M 40286 50 Sex ZipCode Age Salary * 4017- 26-32 8000 * 4027- 26-32 12000 * 4017- 26-32 8000 * 4017- 35-55 9000 * 4038- 26-32 20000 * 4048- 35-53 23000 * 4028- 35-53 8000
  • 3. A Comparative Study On Privacy Preserving Datamining Techniques | IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss.7| July. 2014 | 13| 2.4 Secure Multiparty Computation This method reveals nothing except the results between two parties who does not want to revel their data sources using this we can prevent our sensitive attribute. Anyhow this approach contains miniature drawbacks such as Trusted Third Party Model, Semi-honest Model. In Third party model data will be shared through the third party, so the third party comes to know the data sources. In Semi-honest Model, Consider a secure sum functionality which simply outputs the sum of the local input of the participants. With two parties, the output reveals the input of the other party. III. Several challenges with PPDM Iyengar [8] demonstrated that data can be transformed in such a way as to protect individual identity. He suggests that random data can replace any individually identifiable information. The author’s argument is that there is a tradeoff between privacy and information loss with this method. Thuraisingham [9] first suggested that privacy issues occur in data mining and that this is a generalization of the inference problem. The inference problem refers to an issue when a user can infer new knowledge by executing successive queries against a database. He also noted that this may cause ethical issues based on how the information is going to be used. Du and Zhan [10] proposed a randomized response technique to perturb data so that users cannot tell whether the data contains truthful information or false information. They used a decision-tree classifier along with randomization methods to perturb the data so that aggregate results still show some degree of accuracy, while at the same time maintain individual privacy. One drawback with this approach is that it only focused on Boolean data types to test their technique. Du and Zhan also neglected to define exactly what tolerances are acceptable during data mining with privacy preservation. Narayanan and Shmatikov [11] demonstrated that data can be encrypted in such a way that users can still use the information contained within it. Their study used provably secure techniques while permitting certain types of queries to be generated. A limitation to their study was that they only examined its use on small databases, not for larger databases. In order for their approach to work, they developed a new query language. Their approach may also be impractical if a user wanted to use widely available databases such as Microsoft SQL Server or Oracle. Generalization for k-anonymity losses considerable amount of information, especially for high-dimensional data due to the curse of dimensionality. In order for generalization to be effective, records in the same bucket must be close to each other so that generalizing the records would not lose too much information. Bucketization does not prevent membership disclosure. Because bucketization publishes the QI values in their original forms, an adversary can find out whether an individual has a record in the published data or not. Also bucketization requires a clear separation between QIs and SAs. However, in many data sets, it is unclear which attributes are QIs and which are SAs. By separating the sensitive attribute from the QI attributes, bucketization breaks the attribute correlations between the QIs and the SAs. To improve the attribute correlation slicing[12] technique has been introduced. Using slicing techniques can improve attribute correlation but it does not achieve 100 percent but it is better than k anonymity and l-diversity approaches. IV. Merits and Demerits of PPDM techniques PPDM Techniques Merits Demerits Anonymization technique This technique is used to protect user identities while releasing information. While k-anonymity protects against identity disclosure, it does not provide sufficient protection against sensitive attribute.100% accuracy can achieve. There are two attacks: The homogeneity attack and the background knowledge attack. Data perturbation approach Independently the noise can add to the attributes This method does not reconstruct the original data values ,to reconstruct the original data distribution, new algorithms have been developed . RANDOMIZED RESPONSE : Randomly the noise will be added and swapping technique have been used.
  • 4. A Comparative Study On Privacy Preserving Datamining Techniques | IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss.7| July. 2014 | 14| Cryptographic Cryptography offers a well-defined model for privacy, which includes methodologies for proving and quantifying it. There exists a vast toolset of cryptographic algorithms and constructs to implement privacy preserving data mining algorithms. This approach is especially difficult to scale when more than a few parties are involved. Also, it does not address the question of whether the disclosure of the final data mining result may breach the privacy of individual records. Slicing More efficient and better data utility compare to anonymity and l diversity method Randomly generate the associations between column values of a Bucket. This may lose data utility. Random data transmission have been used. V. Conclusion With the development of data analysis and processing technique, the privacy disclosure problem about individual or company is inevitably exposed when releasing or sharing data to mine useful decision information and knowledge, then give the birth to the research field on privacy preserving data mining. In this paper, we presented different issues and reiterate privacy preserving methods to distribute ones and the methods for handling horizontally and vertically partitioned data. While all the purposed methods are only approximate to our goal of privacy preservation, we need to further perfect those approaches or develop some efficient methods. To address these issues, following problem should be widely studied. 1. In distributed privacy preserving data mining areas, efficiency is an important issue. We should try to develop more efficient algorithms and attain a balance between disclosure cost, computation cost 2. Privacy and accuracy is a pair of contradiction; improving one usually incurs a cost in the other. How to apply various optimizations to achieve a trade-off should be deeply researched. 3. Side-effects are inevitable in data cleansing process. How to reduce their negative impact on privacy preserving needs to be considered carefully. We also need to define some metrics for measuring the side- effects resulted from data processing. REFERENCES [1] J. Han and M. Kamber, Data Mining Concepts and Techniques, Morgan Kaufmann, 2001. [2] P. Samarati,(2001). Protecting respondent's privacy in micro data release. In IEEE Transaction on knowledge and Data Engineering,pp.010-027. [3] L. Sweeney, (2002)."k-anonymity: a model for protecting privacy ", International Journal on Uncertainty, Fuzziness and Knowledge based Systems, pp. 557-570. [4] Evfimievski, A.Srikant, R.Agrawal, and Gehrke J(2002),"Privacy preserving mining of association rules". In Proc.KDD02, pp. 217-228. [5] Hong, J.I. and J.A. Landay,(2004).Architecture for Privacy Sensitive Ubiquitous Computing", In Mobisys04, pp. 177- 189. [6] Laur, H. Lipmaa, and T. Mieli' ainen,(2006)."Cryptographically private support vector machines". In Twelfth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 618-624. [7] Ke Wang, Benjamin C. M. Fung1 and Philip S. Yu, (2005) "Template based privacy preservation in classification problems", InICDM, pp. 466-473. [8] Iyengar, V. (2002). Transforming data to satisfy privacy constraints. Proceedings of the 8th ACM SIGKDD International Conference on Knowledge Discovery in Data Mining, 279-288. [9] Verykios, V., Bertino, E., Fovino, I., Provenza, L., Saygin, Y., & Theodoridis, Y. (2004). State of- the-art in privacy preserving data mining. ACM SIGMOD Record, 33(1), 50-57. [10] Du, W., & Zhan, Z. (2003). Using randomized response techniques for privacy-preserving data mining. Proceedings of the 9th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 505-510. [11] Narayanan, A., & Shmatikov, V. (2005). Obfuscated databases and group privacy. Paper presented at the Proceedings of the 12th ACM Conference on Computer and Communications Security, Alexandria, VA. [12] ―Slicing: A New Approach for Privacy Preserving Data Publishing‖ - Tiancheng Li, Ninghui Li, Senior Member, IEEE, Jian Zhang, Member, IEEE, and Ian Molloy IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 24, NO. 3, MARCH 2012