SlideShare a Scribd company logo
1 of 5
Download to read offline
International Journal of Computer Science and Telecommunications [Volume 4, Issue 9, September 2013] 42 
Manish Sharma1, Atul Chaudhary2, Manish Mathuria3 and Shalini Chaudhary4 
Journal Homepage: www.ijcst.org 
1,3,4Department of CSE, Govt. Engineering College, Ajmer 
2Department of I.T, Govt. Engineering College, Ajmer 
1manu13raj@gmail.com, 2atul.chaudhary83@gmail.com, 3manish.4589@gmail.com, 4cshalini14@yahoo.in 
Abstract– With the extensive amount of data stored in 
databases and other repositories it is very important to develop a 
powerful and effective mean for analysis and interpretation of 
such data for extracting the interesting and useful knowledge 
that could help in decision making. Data mining is such a 
technique which extracts the useful information from the large 
repositories. Knowledge discovery in database (KDD) is another 
name of data mining. Privacy preserving data mining techniques 
are introduced with the aim of extract the relevant knowledge 
from the large amount of data while protecting the sensible 
information at the same time. In this paper we review on the 
various privacy preserving data mining techniques like data 
modification and secure multiparty computation based on the 
different aspects. We also analyze the comparative study of all 
techniques followed by the future research work. 
Index Terms– Privacy and Security, Data Mining, Privacy 
Preserving, Secure Multiparty Computation (SMC) and Data 
Modification 
I. INTRODUCTION 
N today’s scenario we have E-Commerce, E- Governance 
and personal data is distributed online, privacy of data is 
become the most important issue. All the distributed 
information system contains most important property as 
privacy. The information found in mining can be sensitive or 
it can be misuse by anyone. We consider a scenario in which 
two or more parties own their confidential databases wishes to 
run a data mining algorithm on the union of their database 
without revealing any private information. For example, 
consider separate medical institutes that wish to conduct a 
join medical research while preserving the privacy records of 
their patients. In this condition it is required to protect the 
sensitive information, but it is also required to enable its use 
for future research work. Involving parties are realizing that 
combining their data gives mutual benefit but none of them is 
willing to reveal its database to other parties. For this reason 
various privacy preserving techniques are applied with data 
mining algorithm in order to protect the extraction of sensitive 
information during the knowledge finding. 
Main research objective of privacy preserving data mining 
(PPDM) is how to protect the sensitive information or private 
knowledge from leaking in the mining process, meanwhile 
obtain the accurate results of data mining. 
The privacy preserving data mining is divided into two 
levels [1]: 
 First level of PPDM is focus on protecting the sensitive 
data such as id, name, address and other sensitive 
information. 
 Second level of PPDM is focus on protecting the sensitive 
knowledge which is showed by data mining. 
Many privacy preserving techniques are using some form of 
transformation to achieve privacy. Privacy preserving is 
mainly focused on data distortion, data reconstruction and 
data encryption technology. The implementation of PPDM 
techniques has become the demand of the moment. The goal 
of this paper is to present the review on privacy preserving 
techniques which is very helpful while mining process over 
large data sets with reasonable efficiency and preserve 
security. 
II. PRIVACY ISSUES RELATED TO DATA MINING 
As we know that data mining is a widely accepted 
technique for vast range of organizations. Data mining is 
included in day to day operational activities of every 
organization. During the whole process of data mining (from 
collection of data to discovery of knowledge) we get the data. 
These data may contain sensitive information of individual 
one. This information may expose to several other entities 
including data collector, users and miners. Disclosure of such 
information is results breaking the individual privacy. We 
take a simple ex: exposed credit card details of a user will 
affect its social and economic life. Private information can 
also be disclosed by linking multiple databases belong to 
giant data warehouse [2] and accessing web data [3]. 
A malicious data miner can learn sensitive data values or 
attributes such as income ($8500) or disease type (HIV 
Positive) of a certain individual through re-identification of 
record from an exposed data set. The combination of other 
attributes also provides help to the intruders to identify the 
I 
A Review Study on the Privacy Preserving Data Mining 
Techniques and Approaches 
ISSN 2047-3338
Manish Sharma et al. 43 
sensitive data values. If we remove other attributes then it’s 
not guaranteed to provide the confidentiality of private 
information. Sufficient supplementary knowledge is also 
helpful for intruders to identify sensitive data values. 
A. Public Awareness 
Now days secondary use of data become very common. 
Secondary use of data means data is used for some other 
purpose not for which data is collected initially. The potential 
misuse of personal information of public is increasing rapidly. 
The scope of sensitive data is not limited to medical or 
financial records it may be phone calls made by an individual, 
buying patterns and many more. No one wants that his/her 
personal data is sold to any other party without their prior 
consent. Some individuals become hesitant to share their 
information which results additional difficulty to obtaining 
correct information. Public awareness is so much important if 
private information is shared between different entities. Public 
awareness about privacy and lack of public trust in 
organization may introduce additional complexity to data 
collection. Strong public concern may force government and 
law forcing agencies to introduce new privacy protecting 
regulations. For example federal employees being prepossess, 
on the basis of protected genetic information, according to US 
Executive Order (2000) [4]. 
B. Privacy Preserving Data Mining 
Due to the tremendous benefit of data mining and high 
public concern regarding individual data privacy, 
implementation of privacy preserving data mining has 
become demand of today’s environment. This technique 
provides individual privacy while at the same time allowing 
extraction of useful knowledge from data. 
There are several methods which can be used to enable 
privacy preserving data mining. Most of the techniques use 
some form of transformation or modification. These 
techniques modified the collected data set before its release in 
an attempt to protect individual records from being re-identified 
[5]. A malicious data miner or intruder even with 
additional knowledge cannot be certain about the correctness 
of a re-identification, even when the data set has been 
modified. Apart from the context of data mining it is 
important to maintain patterns in data set. 
High data quality with privacy/security is the major 
requirement of good privacy preserving techniques. 
III. CLASSIFICATION SCHEME AND EVALUATION 
CRITERIA FOR PRIVACY PRESERVING DATA 
MINING TECHNIQUES 
There are various techniques for privacy preserving data 
mining. Each of the technique is suitable for particular type of 
scenario and objectives. We are here presented a classification 
scheme and evaluation criteria for those techniques. However 
these schemes and criteria build on the classification scheme 
and evaluation criteria proposed in [1]. 
A. Classification Scheme 
Privacy preserving techniques can be classified based on 
following characteristics: 
 Data Mining Scenario 
 Data Mining Tasks 
 Data Distribution 
 Data Types 
 Privacy Definition 
 Protection Method 
We describe these classifications characteristics as follows: 
1) Data Mining Scenario: There are basically two major 
data mining scenario present. In the first one organization 
release their data sets for data mining and allowing 
unrestricted access to it. Data modification is used to achieve 
the privacy in this scenario. In the second one organization do 
not release their data sets but still allow data mining tasks. 
Cryptographic techniques are basically used for privacy 
preserving. 
2) Data Mining Task: Data set contains various patterns. 
These patterns are taken out through different types of data 
mining tasks like classification, association rule mining, 
outlier analysis, clustering and evolution analysis [6]. 
Basically, all privacy preserving techniques should maintain 
data quality to support all possible data mining tasks and 
statistical analysis but it usually maintain data quality to 
support only a group of data mining tasks. Basis on that task 
we categorize the privacy preserving techniques. 
3) Data Distribution: Data sets used for data mining can be 
either distributed or centralized. It is not depending on the 
physical location where data is stored but to the 
availability/ownership of data. The centralized data set is 
owned by a single party. It is either available at computational 
site or it can be sent to the site. However, distributed data set 
is shared between two or more parties which do not 
necessarily trust each other private data but interested to 
perform data mining on joint data. The data set can be 
heterogeneous means vertically partitioned where each party 
owns the same set of attributes but different subset of 
attributes. Alternatively it can be homogeneous means 
horizontally partitioned where each party owns the same set 
of attributes but different subset of records. In Fig. 1 we 
shows the classification based on distribution. 
Data Set 
Centralized Distributed 
Horizontally 
Partitioned 
Vertically 
Partitioned 
Fig. 1: Classification of Different Dataset Based on Distribution
International Journal of Computer Science and Telecommunications [Volume 4, Issue 9, September 2013] 44 
1) Data Types: There are basically two attributes in data 
set: Numerical and Categorical. Boolean data are the special 
case of categorical data which takes two possible values 0 and 
1. Categorical values lack natural ordering in them. This is the 
basic difference between categorical and numerical values and 
its force the privacy preservation technique to take different 
approaches for them. 
2) Privacy Definition: The definitions of privacy are 
different in different context. In some scenario individuals 
data values are private, whereas in other scenario certain 
association or classification rules are private.. Depend on the 
privacy definition we work on different privacy preserving 
techniques. 
3) Protection Methods: Privacy in data mining is protected 
through different methods such as data modification and 
secure multiparty computation (SMC). On the basis of 
protection method we can also categorize the privacy 
preserving techniques. The classification is shown in Fig. 2. 
Fig. 2: A Classification of Privacy Preserving Techniques 
We see the detailed study of all the techniques in the later 
section. 
Now we discuss the evaluation criteria as follows: 
B. Evaluation Criteria 
It is important to determine the evaluation criteria and 
related benchmarks. Some evaluation criteria are: 
1) Versatility: It refers to the ability of the techniques to 
cater for various data mining task, privacy requirements and 
types of data set. The technique is more useful if it is more 
versatile. Versatility includes the following: 
 Private: Data vs. Patterns 
 Data Sets: Distributed or Centralized (Vertical or 
horizontal) 
 Attributes: Numerical or Categorical 
 Data Mining Tasks 
2) Disclosure Risks: It refers to the chances of sensitive 
information being inferred by a malicious data miner. It’s 
inversely proportional to the level of security which is offered 
by the technique. Development of the disclosure risks is 
difficult task, since it depends on many factors like 
supplementary knowledge of an intruder and nature of the 
techniques. Primary objective of privacy preservation 
technique is minimizing the disclosure risk, so risk evaluation 
is essential. 
3) Information Loss: Information loss is usually 
proportional to the amount of noise added and level of 
security. It is inversely proportional to data quality. The 
primary requirement of privacy preserving technique is to 
maintain high data quality in released data sets. If data quality 
is not maintained then high security will be useless. 
4) Cost: Cost refers to both computation cost and 
communication cost between the collaborating parties [1]. 
Computational costs contain both preprocessing cost (e.g., 
initial perturbation of values) and running cost (e.g., 
processing overhead). If data set is distributed then 
communication cost becomes important issue. The higher the 
cost, the lower the efficiency of the technique. 
IV. TECHNIQUES OF PRIVACY PRESERVING 
Now we see some techniques of privacy preserving data 
mining: 
A. Data Modification 
Existing privacy preserving techniques method for 
centralized databases can be categorized in three main groups 
based on the approaches they take, such as query restriction, 
output perturbation and data modification [7]. From all these 
techniques data modification is a straightforward technique to 
implement. In data modification before the release of a dataset 
for various data mining tasks and analysis, it modifies the data 
set for protection of individual privacy while the quality of 
released data remains high. After this modification of the data 
we can use any off the shelf software such as See5 to manage 
or analyze the data. It’s not with the case of query restriction 
and output perturbation. The simplicity of this technique 
made it attractive and widely used in the context of statistical 
database in data mining. There are number of ways of doing 
data modification such as suppression, swapping, aggregation 
and noise addition. The basic idea of these techniques is given 
below. 
1) Data Swapping: Data swapping technique were first 
introduced by Dalenius and Reiss in 1982, for categorical 
values modification in the context of secure statistical 
databases [8]. The main idea of the method was it keeps all 
original value in the data set, while at the same time makes 
the record re-identification very complex. This method 
actually replace the original data set by another one where 
some original values belonging to a sensitive attributes are 
exchanged between them. An introduction to existing data 
swapping technique can be found in [9], [10]. 
Inspired by existing techniques a new data swapping 
techniques is introduced for privacy preserving data mining. 
This technique focus on the pattern preservation instead of 
obtaining unbiased statistical parameters. Basically it 
preserves the most classification rule even if they are obtained 
by different classification algorithm. 
2) Aggregation: Aggregation is also known as 
generalization or global recording. It is used for protecting an 
Privacy Technique 
Data Modification Secure Multi- 
Party 
Computation 
Noise 
Addition 
Data 
Swapping 
Aggregation Suppression
Manish Sharma et al. 45 
individual privacy in a released data set by perturbing the 
original data set before its releasing. Aggregation change k 
no. of records of a data by representative records. The value 
of an attribute in such a representative record is generally 
derived by taking the average of all values, for the attributes, 
belonging to the records that are replaced. Another method of 
aggregation or generalization is transformation of attribute 
values. For ex- an exact birth date can be changed by the year 
of birth. Such a generalization makes an attribute value less 
informatics. For ex- if exact birth date is changed by the 
century of birth then the released data can became useless to 
data miners [11]. 
3) Suppression: In this technique sensitive data value are 
deleted or suppressed prior to the release of a micro data. 
Suppression is used to protect an individual privacy from 
intruders attempt to accurately predict a suppressed value. To 
predict a sensitive value an intruder can use various 
approaches. An important issue in suppression is to minimize 
the information loss by minimizing the number of values 
suppressed. For some applications, such as medical, 
suppression is preferred mainly over noise addition in order to 
reduce the chance of having misleading pattern in perturbed 
data set. Suppression technique is also been used for 
association and classification rule confusion [12], [13]. 
4) Noise Addition in Data Mining: Noise addition is usually 
adds a random number (noise) to numerical attributes. This 
random number is generally drawn from a normal distribution 
with zero mean or standard deviation. Noise is added in a 
controlled way so as to maintain variance, co-variance and 
means of the attributes of a data set. Due to the absence of 
natural ordering in categorical values, addition of noise in 
categorical attributes is not straightforward as like addition of 
noise in numerical attributes. Many techniques proposed for 
noise addition in data mining. Evfimievski et al. proposed a 
novel noise addition technique for privacy preserving 
association rule mining in 2002 [14]. Agarwal and Srikant 
proposed a noise addition technique in 2000 which is based 
on addition of random noise to attribute values in such a way 
that the distributions of data values belonging to original and 
perturbed data set were very difficult [5]. Du and Zhan 
presented a decision tree building algorithm which is used to 
perturb multiple attributes [15]. In 2004 Zhu and lieu [16] 
proposed a general framework for randomization using a well 
studied statistical model called mixture model. According to 
this scheme data are generated from a distribution that 
depends on some factors including original data as well. Their 
randomization framework supports privacy preserving density 
estimation. 
C. Secure Multiparty Computation (SMC) 
A Secure Multi-party Computation (SMC) technique 
encrypts the data sets, while still allowing data mining 
operations. SMC techniques are not supposed to disclose any 
new information other than the final result of the computation 
to a participating party. These techniques are typically based 
on cryptographic protocols and are applied to distributed data 
sets. Parties involved in a distributed data mining encrypt 
their data and send to others parties. These encrypted data are 
used to compute the aggregate data, belonging to the joint 
data set, which is used for data mining purpose. Secure 
Multipart Computation was originally introduced by Yao in 
1982 [17]. Basically, SMC is supposed to reveal to a party 
just the result of the computation and the data owned by the 
party. There are various SMC algorithms developed. Most of 
the algorithms make use of some primitive computations such 
as secure sum, secure set union, secure size of set intersection 
and secure scalar product. 
V. COMPARATIVE STUDY 
Now we present the comparative study of all the privacy 
preservation techniques on the basis of evaluation criteria 
which we already discussed above. This comparative study 
gives us the clear idea about which technique is better in 
which scenario. We present the comparative study in the 
tabular form which is shown in Table 1: 
TABLE 1: PRIVACY PRESERVING TECHNIQUES – COMPARATIVE STUDY 
Name 
Versatility 
Disclosure 
Private: Cost 
Risk 
Data/Rules 
Information 
Loss 
Dataset: 
Central/Distributed 
(Vertical/Horizontal) 
Attributes: 
Categorical/ 
Numerical/ 
Boolean 
Data Mining 
Task 
Outlier Detection Data (Both) Distributed Both Outliers Very Low None High 
Association 
Data Distributed (Vertical) Boolean Association 
Rules 
Rules 
Very Low None Moderate 
Randomized 
Noise 
Data Both Numerical Classification Low Moderate Low 
Correlated Noise Data Centralized Numerical Clustering, 
Classification 
Moderate Low Low 
Decision Tree 
Noise 
Data Centralized Both Classification Moderate Low Low 
Randomized 
Response 
Data Both Numerical Density 
Estimation 
Low Moderate Low 
Secure Multiparty 
Computation 
(SMC) 
Data Distributed (Vertical) Numerical Association 
Rules 
Very Low None Moderate
International Journal of Computer Science and Telecommunications [Volume 4, Issue 9, September 2013] 46 
Generally Secure Multiparty Computation techniques tend 
to incur a significantly higher running cost, but also to 
provide much higher level of security. It does not disclose 
anything other than the final results such as the classification 
rules, cluster and association rules. Therefore, it is suitable in 
a particular scenario where multiple parties agree to cooperate 
for just the final result extraction from their combined data 
set. However, in a scenario where a data set is supposed to be 
released to facilitate to various research and extract general 
knowledge, Data modification is the obvious choice. Data 
Modification usually incurs less computational cost and less 
information loss as well. 
VI. CONCLUSION 
In this paper we present the detailed study about the privacy 
preserving data mining and briefly review the techniques Data 
Modification and Secure Multiparty Computation. We tried to 
present the comparative study of privacy preserving 
techniques which is helpful to understand that which 
technique is better in which scenario or environment. Privacy 
preserving data mining is an important need for all the 
organization because every organization has their own 
personal data and they care about their data. All the methods 
discussed here are only approximate to our goal of privacy 
preservation now we need to further refine those approaches 
or develop some efficient techniques. For considering these 
issues, following problem should be widely studied: 
 As we know data mining is a very important issue in 
distributed privacy preserving data mining. We should 
try to develop more efficient algorithms and achieve a 
balance between computation, communication and 
disclosure cost. 
 Accuracy and privacy are closely related to each other. If 
we tried to improving one then other effected accordingly. 
So how to achieving tradeoff between both is an important 
research. 
REFERENCES 
[1] V.S. Verykios, E. Bertino, I. N. Fovino, L. P. Provonza, 
Y.Saygin and Y. Theodoridis. State-of-the-art in privacy 
preserving data mining. SIGMOD Record, 33 (1): 50-57, 2004. 
[2] S. E. Fienberg. Privacy and confidentiality in an e-commerce 
world: Data mining, data warehousing, matching and 
disclosure limitation. Statistical Science, 21:143-154, 2006. 
[3] B. M. Thuraisingham. Data mining, national security, privacy, 
and civil liberties. SIGKDD Explorations, 4 (2): 1-5, 2002. 
[4] US Department of Labor. Executive order 13145. Available 
from http://www.dol.gov/oasam/regs/statutes/eo13145.htm, 
Feb 8, 2000. 
[5] R. Agarwal and R. Srikant. Privacy –preserving data mining. 
In Proc. Of the ACM SIGMOD Conference of Management of 
Data, pages 439-450. ACM Press, May 2000. 
[6] J. Han and M. Kamber. Data Mining Concepts and 
Techniques. Morgan Kaufmann Publishers, San Diego, CA 
92101-4495, USA, 2001. 
[7] N. Adam and J. C. Wortmann. Security control methods for 
statistical databases: A comparative study. ACM Computing 
Surveys, 21 (4): 515-556, 1999. 
[8] T. Dalenius and S. P. Reiss. Data Swapping: A technique for 
disclosure control. Journal of Statistical Planning and 
Inference, 6(1):73-85, 1982. 
[9] S. E. Fienberg and J. McIntyre. Data swapping: Variations on 
a theme by Dalenius and Reiss. Journal of Official Statistics, 
21:309-323, 2005. 
[10] K. Murlidhar and R. Sarathy. Data Shuffling – a new masking 
approach for numerical data. Management Science, 
Forthcoming, 2006. 
[11] V. S. Iyenger. Transforming data to satisfy privacy constraints. 
In Proc. Of SIGKDD’02, Edmonton, Alberta, Canada, 2002. 
[12] S. Rizvi and J.R Hartisa. Maintaining data privacy in 
association rule mining. In Proc. of the 28th VLDB 
Conference, pages 682-693, Hong-Kong, China, 2002. 
[13] Y. Saygin, V. S. Verykios and A. K. Elmagarmid. Privacy 
preserving association rule mining. In RIDE, pages 151-158, 
2002. 
[14] A. V. Evfimievski, R. Srikant, R. Agarwal and J. Gehrke. 
Privacy preserving mining of association rules. In Proc. Of the 
Eighth ACM SIGKDD International Conference on 
Knowledge and Data Mining, pages 217-228, 2002. 
[15] W. Du and Z. Zhan. Using randomized response techniques 
for privacy preserving data mining. In Proc. of the Ninth ACM 
SIGKDD International Conference on Knowledge Discovery 
and Data Mining, pages 515-510, Washington DC, USA, 
August 2003. 
[16] Y. Zhu and L. Liu. Optimal randomization for privacy 
preserving data mining. In Proc. of the Tenth ACM SIGKDD 
International Conference on Knowledge Discovery and Data 
Mining, pages 761-766, Seattle, Washington, USA, August 
2004. 
[17] A. C Yao. Protocols for secure computations. In Proc. of the 
23rd Annual IEEE Symposium on Foundation of Computer 
Science, 1982. 
[18] M. Kantarcioglu and C. Clifton. Privacy preserving distributed 
mining of association rules on horizontally partitioned data. 
IEEE Trans. Knowl. Data Eng. , 16 (9):1026: 1036, 2004. 
[19] M. Kantardzic. Data Mining Concepts, Models, Methods and 
Algorithms. IEEE Press, NJ, USA, 2003. 
[20] H. Kargupta, S. Datta, Q. Wang and K. Sivakumar. Random 
data perturbation techniques and privacy preserving data 
mining. Knowledge and Information Systems, 7:387-414, 
2005.

More Related Content

What's hot

Cryptography for privacy preserving data mining
Cryptography for privacy preserving data miningCryptography for privacy preserving data mining
Cryptography for privacy preserving data miningMesbah Uddin Khan
 
Privacy Preserving DB Systems
Privacy Preserving DB SystemsPrivacy Preserving DB Systems
Privacy Preserving DB SystemsAshraf Bashir
 
Cluster Based Access Privilege Management Scheme for Databases
Cluster Based Access Privilege Management Scheme for DatabasesCluster Based Access Privilege Management Scheme for Databases
Cluster Based Access Privilege Management Scheme for DatabasesEditor IJMTER
 
Current trends in data security nursing research ppt
Current trends in data security nursing research pptCurrent trends in data security nursing research ppt
Current trends in data security nursing research pptNursing Path
 
SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...
SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...
SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...Editor IJMTER
 
Privacy Preserving Distributed Association Rule Mining Algorithm for Vertical...
Privacy Preserving Distributed Association Rule Mining Algorithm for Vertical...Privacy Preserving Distributed Association Rule Mining Algorithm for Vertical...
Privacy Preserving Distributed Association Rule Mining Algorithm for Vertical...IJCSIS Research Publications
 
IRJET- Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...
IRJET-  	  Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...IRJET-  	  Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...
IRJET- Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...IRJET Journal
 
Privacy Preserving Data Mining Using Inverse Frequent ItemSet Mining Approach
Privacy Preserving Data Mining Using Inverse Frequent ItemSet Mining ApproachPrivacy Preserving Data Mining Using Inverse Frequent ItemSet Mining Approach
Privacy Preserving Data Mining Using Inverse Frequent ItemSet Mining ApproachIRJET Journal
 
data mining privacy concerns ppt presentation
data mining privacy concerns ppt presentationdata mining privacy concerns ppt presentation
data mining privacy concerns ppt presentationiWriteEssays
 
A review on privacy preservation in data mining
A review on privacy preservation in data miningA review on privacy preservation in data mining
A review on privacy preservation in data miningijujournal
 
A Review on Privacy Preservation in Data Mining
A Review on Privacy Preservation in Data MiningA Review on Privacy Preservation in Data Mining
A Review on Privacy Preservation in Data Miningijujournal
 
78201919
7820191978201919
78201919IJRAT
 
Multilevel Privacy Preserving by Linear and Non Linear Data Distortion
Multilevel Privacy Preserving by Linear and Non Linear Data DistortionMultilevel Privacy Preserving by Linear and Non Linear Data Distortion
Multilevel Privacy Preserving by Linear and Non Linear Data DistortionIOSR Journals
 
Enabling Use of Dynamic Anonymization for Enhanced Security in Cloud
Enabling Use of Dynamic Anonymization for Enhanced Security in CloudEnabling Use of Dynamic Anonymization for Enhanced Security in Cloud
Enabling Use of Dynamic Anonymization for Enhanced Security in CloudIOSR Journals
 
Privacy Preservation and Restoration of Data Using Unrealized Data Sets
Privacy Preservation and Restoration of Data Using Unrealized Data SetsPrivacy Preservation and Restoration of Data Using Unrealized Data Sets
Privacy Preservation and Restoration of Data Using Unrealized Data SetsIJERA Editor
 
A Survey on Features and Techniques Description for Privacy of Sensitive Info...
A Survey on Features and Techniques Description for Privacy of Sensitive Info...A Survey on Features and Techniques Description for Privacy of Sensitive Info...
A Survey on Features and Techniques Description for Privacy of Sensitive Info...IRJET Journal
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
A Comparative Study on Privacy Preserving Datamining Techniques
A Comparative Study on Privacy Preserving Datamining  TechniquesA Comparative Study on Privacy Preserving Datamining  Techniques
A Comparative Study on Privacy Preserving Datamining TechniquesIJMER
 

What's hot (20)

Cryptography for privacy preserving data mining
Cryptography for privacy preserving data miningCryptography for privacy preserving data mining
Cryptography for privacy preserving data mining
 
Privacy Preserving DB Systems
Privacy Preserving DB SystemsPrivacy Preserving DB Systems
Privacy Preserving DB Systems
 
Cluster Based Access Privilege Management Scheme for Databases
Cluster Based Access Privilege Management Scheme for DatabasesCluster Based Access Privilege Management Scheme for Databases
Cluster Based Access Privilege Management Scheme for Databases
 
Ib3514141422
Ib3514141422Ib3514141422
Ib3514141422
 
Current trends in data security nursing research ppt
Current trends in data security nursing research pptCurrent trends in data security nursing research ppt
Current trends in data security nursing research ppt
 
SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...
SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...
SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...
 
Privacy Preserving Distributed Association Rule Mining Algorithm for Vertical...
Privacy Preserving Distributed Association Rule Mining Algorithm for Vertical...Privacy Preserving Distributed Association Rule Mining Algorithm for Vertical...
Privacy Preserving Distributed Association Rule Mining Algorithm for Vertical...
 
IRJET- Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...
IRJET-  	  Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...IRJET-  	  Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...
IRJET- Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...
 
Privacy Preserving Data Mining Using Inverse Frequent ItemSet Mining Approach
Privacy Preserving Data Mining Using Inverse Frequent ItemSet Mining ApproachPrivacy Preserving Data Mining Using Inverse Frequent ItemSet Mining Approach
Privacy Preserving Data Mining Using Inverse Frequent ItemSet Mining Approach
 
data mining privacy concerns ppt presentation
data mining privacy concerns ppt presentationdata mining privacy concerns ppt presentation
data mining privacy concerns ppt presentation
 
A review on privacy preservation in data mining
A review on privacy preservation in data miningA review on privacy preservation in data mining
A review on privacy preservation in data mining
 
A Review on Privacy Preservation in Data Mining
A Review on Privacy Preservation in Data MiningA Review on Privacy Preservation in Data Mining
A Review on Privacy Preservation in Data Mining
 
78201919
7820191978201919
78201919
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
Multilevel Privacy Preserving by Linear and Non Linear Data Distortion
Multilevel Privacy Preserving by Linear and Non Linear Data DistortionMultilevel Privacy Preserving by Linear and Non Linear Data Distortion
Multilevel Privacy Preserving by Linear and Non Linear Data Distortion
 
Enabling Use of Dynamic Anonymization for Enhanced Security in Cloud
Enabling Use of Dynamic Anonymization for Enhanced Security in CloudEnabling Use of Dynamic Anonymization for Enhanced Security in Cloud
Enabling Use of Dynamic Anonymization for Enhanced Security in Cloud
 
Privacy Preservation and Restoration of Data Using Unrealized Data Sets
Privacy Preservation and Restoration of Data Using Unrealized Data SetsPrivacy Preservation and Restoration of Data Using Unrealized Data Sets
Privacy Preservation and Restoration of Data Using Unrealized Data Sets
 
A Survey on Features and Techniques Description for Privacy of Sensitive Info...
A Survey on Features and Techniques Description for Privacy of Sensitive Info...A Survey on Features and Techniques Description for Privacy of Sensitive Info...
A Survey on Features and Techniques Description for Privacy of Sensitive Info...
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
A Comparative Study on Privacy Preserving Datamining Techniques
A Comparative Study on Privacy Preserving Datamining  TechniquesA Comparative Study on Privacy Preserving Datamining  Techniques
A Comparative Study on Privacy Preserving Datamining Techniques
 

Viewers also liked

slides
slidesslides
slidesbutest
 
Hiding Sensitive Association Rules
Hiding Sensitive Association Rules Hiding Sensitive Association Rules
Hiding Sensitive Association Rules Vinayreddy Polati
 
Protecting patients privacy slide presentation
Protecting patients privacy slide presentationProtecting patients privacy slide presentation
Protecting patients privacy slide presentationplunkk
 
Data Privacy and Anonymization
Data Privacy and AnonymizationData Privacy and Anonymization
Data Privacy and AnonymizationJeffrey Wang
 
Data Privacy in India and data theft
Data Privacy in India and data theftData Privacy in India and data theft
Data Privacy in India and data theftAmber Gupta
 
ARX - a comprehensive tool for anonymizing / de-identifying biomedical data
ARX - a comprehensive tool for anonymizing / de-identifying biomedical dataARX - a comprehensive tool for anonymizing / de-identifying biomedical data
ARX - a comprehensive tool for anonymizing / de-identifying biomedical dataarx-deidentifier
 
ARX - a comprehensive tool for anonymizing / de-identifying biomedical data
ARX - a comprehensive tool for anonymizing / de-identifying biomedical dataARX - a comprehensive tool for anonymizing / de-identifying biomedical data
ARX - a comprehensive tool for anonymizing / de-identifying biomedical dataarx-deidentifier
 
Privacy Preserved Distributed Data Sharing with Load Balancing Scheme
Privacy Preserved Distributed Data Sharing with Load Balancing SchemePrivacy Preserved Distributed Data Sharing with Load Balancing Scheme
Privacy Preserved Distributed Data Sharing with Load Balancing SchemeEditor IJMTER
 
Brisbane Health-y Data: Queensland Data Linkage Framework
Brisbane Health-y Data: Queensland Data Linkage FrameworkBrisbane Health-y Data: Queensland Data Linkage Framework
Brisbane Health-y Data: Queensland Data Linkage FrameworkARDC
 
Approximate Protocol for Privacy Preserving Associate Rule Mining
Approximate Protocol for Privacy Preserving Associate Rule MiningApproximate Protocol for Privacy Preserving Associate Rule Mining
Approximate Protocol for Privacy Preserving Associate Rule MiningPushpalanka Jayawardhana
 
Predictive Models and data linkage
Predictive Models and data linkagePredictive Models and data linkage
Predictive Models and data linkageNuffield Trust
 
Data Privacy: Anonymization & Re-Identification
Data Privacy: Anonymization & Re-IdentificationData Privacy: Anonymization & Re-Identification
Data Privacy: Anonymization & Re-IdentificationMike Nowakowski
 
Indexing Techniques for Scalable Record Linkage and Deduplication
Indexing Techniques for Scalable Record Linkage and DeduplicationIndexing Techniques for Scalable Record Linkage and Deduplication
Indexing Techniques for Scalable Record Linkage and DeduplicationPradeeban Kathiravelu, Ph.D.
 
Approximation Algorithms Part Four: APTAS
Approximation Algorithms Part Four: APTASApproximation Algorithms Part Four: APTAS
Approximation Algorithms Part Four: APTASBenjamin Sach
 
Engineering data privacy - The ARX data anonymization tool
Engineering data privacy - The ARX data anonymization toolEngineering data privacy - The ARX data anonymization tool
Engineering data privacy - The ARX data anonymization toolarx-deidentifier
 

Viewers also liked (19)

slides
slidesslides
slides
 
Hiding Sensitive Association Rules
Hiding Sensitive Association Rules Hiding Sensitive Association Rules
Hiding Sensitive Association Rules
 
Protecting patients privacy slide presentation
Protecting patients privacy slide presentationProtecting patients privacy slide presentation
Protecting patients privacy slide presentation
 
Data Privacy and Anonymization
Data Privacy and AnonymizationData Privacy and Anonymization
Data Privacy and Anonymization
 
Data Privacy in India and data theft
Data Privacy in India and data theftData Privacy in India and data theft
Data Privacy in India and data theft
 
ARX - a comprehensive tool for anonymizing / de-identifying biomedical data
ARX - a comprehensive tool for anonymizing / de-identifying biomedical dataARX - a comprehensive tool for anonymizing / de-identifying biomedical data
ARX - a comprehensive tool for anonymizing / de-identifying biomedical data
 
ARX - a comprehensive tool for anonymizing / de-identifying biomedical data
ARX - a comprehensive tool for anonymizing / de-identifying biomedical dataARX - a comprehensive tool for anonymizing / de-identifying biomedical data
ARX - a comprehensive tool for anonymizing / de-identifying biomedical data
 
Privacy Preserved Distributed Data Sharing with Load Balancing Scheme
Privacy Preserved Distributed Data Sharing with Load Balancing SchemePrivacy Preserved Distributed Data Sharing with Load Balancing Scheme
Privacy Preserved Distributed Data Sharing with Load Balancing Scheme
 
Brisbane Health-y Data: Queensland Data Linkage Framework
Brisbane Health-y Data: Queensland Data Linkage FrameworkBrisbane Health-y Data: Queensland Data Linkage Framework
Brisbane Health-y Data: Queensland Data Linkage Framework
 
Approximate Protocol for Privacy Preserving Associate Rule Mining
Approximate Protocol for Privacy Preserving Associate Rule MiningApproximate Protocol for Privacy Preserving Associate Rule Mining
Approximate Protocol for Privacy Preserving Associate Rule Mining
 
Data Linkage
Data LinkageData Linkage
Data Linkage
 
Predictive Models and data linkage
Predictive Models and data linkagePredictive Models and data linkage
Predictive Models and data linkage
 
Data protection and linkage
Data protection and linkageData protection and linkage
Data protection and linkage
 
Data anonymization
Data anonymizationData anonymization
Data anonymization
 
Data Privacy: Anonymization & Re-Identification
Data Privacy: Anonymization & Re-IdentificationData Privacy: Anonymization & Re-Identification
Data Privacy: Anonymization & Re-Identification
 
Indexing Techniques for Scalable Record Linkage and Deduplication
Indexing Techniques for Scalable Record Linkage and DeduplicationIndexing Techniques for Scalable Record Linkage and Deduplication
Indexing Techniques for Scalable Record Linkage and Deduplication
 
Approximation Algorithms Part Four: APTAS
Approximation Algorithms Part Four: APTASApproximation Algorithms Part Four: APTAS
Approximation Algorithms Part Four: APTAS
 
Engineering data privacy - The ARX data anonymization tool
Engineering data privacy - The ARX data anonymization toolEngineering data privacy - The ARX data anonymization tool
Engineering data privacy - The ARX data anonymization tool
 
Privacy act
Privacy actPrivacy act
Privacy act
 

Similar to A Review Study on the Privacy Preserving Data Mining Techniques and Approaches

A Survey Paper on an Integrated Approach for Privacy Preserving In High Dimen...
A Survey Paper on an Integrated Approach for Privacy Preserving In High Dimen...A Survey Paper on an Integrated Approach for Privacy Preserving In High Dimen...
A Survey Paper on an Integrated Approach for Privacy Preserving In High Dimen...IJSRD
 
Data Transformation Technique for Protecting Private Information in Privacy P...
Data Transformation Technique for Protecting Private Information in Privacy P...Data Transformation Technique for Protecting Private Information in Privacy P...
Data Transformation Technique for Protecting Private Information in Privacy P...acijjournal
 
The Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI WebinarThe Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI WebinarEryk Budi Pratama
 
A survey on privacy preserving data publishing
A survey on privacy preserving data publishingA survey on privacy preserving data publishing
A survey on privacy preserving data publishingijcisjournal
 
The Survey of Data Mining Applications And Feature Scope
The Survey of Data Mining Applications  And Feature Scope The Survey of Data Mining Applications  And Feature Scope
The Survey of Data Mining Applications And Feature Scope IJCSEIT Journal
 
Two-Phase TDS Approach for Data Anonymization To Preserving Bigdata Privacy
Two-Phase TDS Approach for Data Anonymization To Preserving Bigdata PrivacyTwo-Phase TDS Approach for Data Anonymization To Preserving Bigdata Privacy
Two-Phase TDS Approach for Data Anonymization To Preserving Bigdata Privacydbpublications
 
78201919
7820191978201919
78201919IJRAT
 
Maintaining Data Confidentiality in Association Rule Mining in Distributed En...
Maintaining Data Confidentiality in Association Rule Mining in Distributed En...Maintaining Data Confidentiality in Association Rule Mining in Distributed En...
Maintaining Data Confidentiality in Association Rule Mining in Distributed En...IJSRD
 
Maintaining Data Confidentiality in Association Rule Mining in Distributed En...
Maintaining Data Confidentiality in Association Rule Mining in Distributed En...Maintaining Data Confidentiality in Association Rule Mining in Distributed En...
Maintaining Data Confidentiality in Association Rule Mining in Distributed En...IJSRD
 
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTIONETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTIONPranav Godse
 
ETHICAL ISSUES RELATED TO DATA COLLECTION.pptx
ETHICAL ISSUES RELATED TO DATA COLLECTION.pptxETHICAL ISSUES RELATED TO DATA COLLECTION.pptx
ETHICAL ISSUES RELATED TO DATA COLLECTION.pptxurvashipundir04
 
A SURVEY ON PRIVACY PRESERVING ASSOCIATION RULE MINING
A SURVEY ON PRIVACY PRESERVING ASSOCIATION RULE MININGA SURVEY ON PRIVACY PRESERVING ASSOCIATION RULE MINING
A SURVEY ON PRIVACY PRESERVING ASSOCIATION RULE MININGijdkp
 
Fundamentals of data mining and its applications
Fundamentals of data mining and its applicationsFundamentals of data mining and its applications
Fundamentals of data mining and its applicationsSubrat Swain
 
Running Head DATA BREACH .docx
Running Head DATA BREACH                                        .docxRunning Head DATA BREACH                                        .docx
Running Head DATA BREACH .docxtodd271
 

Similar to A Review Study on the Privacy Preserving Data Mining Techniques and Approaches (20)

A Survey Paper on an Integrated Approach for Privacy Preserving In High Dimen...
A Survey Paper on an Integrated Approach for Privacy Preserving In High Dimen...A Survey Paper on an Integrated Approach for Privacy Preserving In High Dimen...
A Survey Paper on an Integrated Approach for Privacy Preserving In High Dimen...
 
Data security and privacy
Data security and privacyData security and privacy
Data security and privacy
 
J017536064
J017536064J017536064
J017536064
 
Data Transformation Technique for Protecting Private Information in Privacy P...
Data Transformation Technique for Protecting Private Information in Privacy P...Data Transformation Technique for Protecting Private Information in Privacy P...
Data Transformation Technique for Protecting Private Information in Privacy P...
 
The Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI WebinarThe Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI Webinar
 
A survey on privacy preserving data publishing
A survey on privacy preserving data publishingA survey on privacy preserving data publishing
A survey on privacy preserving data publishing
 
The Survey of Data Mining Applications And Feature Scope
The Survey of Data Mining Applications  And Feature Scope The Survey of Data Mining Applications  And Feature Scope
The Survey of Data Mining Applications And Feature Scope
 
Two-Phase TDS Approach for Data Anonymization To Preserving Bigdata Privacy
Two-Phase TDS Approach for Data Anonymization To Preserving Bigdata PrivacyTwo-Phase TDS Approach for Data Anonymization To Preserving Bigdata Privacy
Two-Phase TDS Approach for Data Anonymization To Preserving Bigdata Privacy
 
Ej24856861
Ej24856861Ej24856861
Ej24856861
 
78201919
7820191978201919
78201919
 
E04623438
E04623438E04623438
E04623438
 
Maintaining Data Confidentiality in Association Rule Mining in Distributed En...
Maintaining Data Confidentiality in Association Rule Mining in Distributed En...Maintaining Data Confidentiality in Association Rule Mining in Distributed En...
Maintaining Data Confidentiality in Association Rule Mining in Distributed En...
 
Maintaining Data Confidentiality in Association Rule Mining in Distributed En...
Maintaining Data Confidentiality in Association Rule Mining in Distributed En...Maintaining Data Confidentiality in Association Rule Mining in Distributed En...
Maintaining Data Confidentiality in Association Rule Mining in Distributed En...
 
Data Security
Data SecurityData Security
Data Security
 
Data attribute security and privacy in Collaborative distributed database Pub...
Data attribute security and privacy in Collaborative distributed database Pub...Data attribute security and privacy in Collaborative distributed database Pub...
Data attribute security and privacy in Collaborative distributed database Pub...
 
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTIONETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
 
ETHICAL ISSUES RELATED TO DATA COLLECTION.pptx
ETHICAL ISSUES RELATED TO DATA COLLECTION.pptxETHICAL ISSUES RELATED TO DATA COLLECTION.pptx
ETHICAL ISSUES RELATED TO DATA COLLECTION.pptx
 
A SURVEY ON PRIVACY PRESERVING ASSOCIATION RULE MINING
A SURVEY ON PRIVACY PRESERVING ASSOCIATION RULE MININGA SURVEY ON PRIVACY PRESERVING ASSOCIATION RULE MINING
A SURVEY ON PRIVACY PRESERVING ASSOCIATION RULE MINING
 
Fundamentals of data mining and its applications
Fundamentals of data mining and its applicationsFundamentals of data mining and its applications
Fundamentals of data mining and its applications
 
Running Head DATA BREACH .docx
Running Head DATA BREACH                                        .docxRunning Head DATA BREACH                                        .docx
Running Head DATA BREACH .docx
 

Recently uploaded

Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfkalichargn70th171
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyFrank van der Linden
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
Introduction to Decentralized Applications (dApps)
Introduction to Decentralized Applications (dApps)Introduction to Decentralized Applications (dApps)
Introduction to Decentralized Applications (dApps)Intelisync
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about usDynamic Netsoft
 

Recently uploaded (20)

Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The Ugly
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
Introduction to Decentralized Applications (dApps)
Introduction to Decentralized Applications (dApps)Introduction to Decentralized Applications (dApps)
Introduction to Decentralized Applications (dApps)
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about us
 

A Review Study on the Privacy Preserving Data Mining Techniques and Approaches

  • 1. International Journal of Computer Science and Telecommunications [Volume 4, Issue 9, September 2013] 42 Manish Sharma1, Atul Chaudhary2, Manish Mathuria3 and Shalini Chaudhary4 Journal Homepage: www.ijcst.org 1,3,4Department of CSE, Govt. Engineering College, Ajmer 2Department of I.T, Govt. Engineering College, Ajmer 1manu13raj@gmail.com, 2atul.chaudhary83@gmail.com, 3manish.4589@gmail.com, 4cshalini14@yahoo.in Abstract– With the extensive amount of data stored in databases and other repositories it is very important to develop a powerful and effective mean for analysis and interpretation of such data for extracting the interesting and useful knowledge that could help in decision making. Data mining is such a technique which extracts the useful information from the large repositories. Knowledge discovery in database (KDD) is another name of data mining. Privacy preserving data mining techniques are introduced with the aim of extract the relevant knowledge from the large amount of data while protecting the sensible information at the same time. In this paper we review on the various privacy preserving data mining techniques like data modification and secure multiparty computation based on the different aspects. We also analyze the comparative study of all techniques followed by the future research work. Index Terms– Privacy and Security, Data Mining, Privacy Preserving, Secure Multiparty Computation (SMC) and Data Modification I. INTRODUCTION N today’s scenario we have E-Commerce, E- Governance and personal data is distributed online, privacy of data is become the most important issue. All the distributed information system contains most important property as privacy. The information found in mining can be sensitive or it can be misuse by anyone. We consider a scenario in which two or more parties own their confidential databases wishes to run a data mining algorithm on the union of their database without revealing any private information. For example, consider separate medical institutes that wish to conduct a join medical research while preserving the privacy records of their patients. In this condition it is required to protect the sensitive information, but it is also required to enable its use for future research work. Involving parties are realizing that combining their data gives mutual benefit but none of them is willing to reveal its database to other parties. For this reason various privacy preserving techniques are applied with data mining algorithm in order to protect the extraction of sensitive information during the knowledge finding. Main research objective of privacy preserving data mining (PPDM) is how to protect the sensitive information or private knowledge from leaking in the mining process, meanwhile obtain the accurate results of data mining. The privacy preserving data mining is divided into two levels [1]:  First level of PPDM is focus on protecting the sensitive data such as id, name, address and other sensitive information.  Second level of PPDM is focus on protecting the sensitive knowledge which is showed by data mining. Many privacy preserving techniques are using some form of transformation to achieve privacy. Privacy preserving is mainly focused on data distortion, data reconstruction and data encryption technology. The implementation of PPDM techniques has become the demand of the moment. The goal of this paper is to present the review on privacy preserving techniques which is very helpful while mining process over large data sets with reasonable efficiency and preserve security. II. PRIVACY ISSUES RELATED TO DATA MINING As we know that data mining is a widely accepted technique for vast range of organizations. Data mining is included in day to day operational activities of every organization. During the whole process of data mining (from collection of data to discovery of knowledge) we get the data. These data may contain sensitive information of individual one. This information may expose to several other entities including data collector, users and miners. Disclosure of such information is results breaking the individual privacy. We take a simple ex: exposed credit card details of a user will affect its social and economic life. Private information can also be disclosed by linking multiple databases belong to giant data warehouse [2] and accessing web data [3]. A malicious data miner can learn sensitive data values or attributes such as income ($8500) or disease type (HIV Positive) of a certain individual through re-identification of record from an exposed data set. The combination of other attributes also provides help to the intruders to identify the I A Review Study on the Privacy Preserving Data Mining Techniques and Approaches ISSN 2047-3338
  • 2. Manish Sharma et al. 43 sensitive data values. If we remove other attributes then it’s not guaranteed to provide the confidentiality of private information. Sufficient supplementary knowledge is also helpful for intruders to identify sensitive data values. A. Public Awareness Now days secondary use of data become very common. Secondary use of data means data is used for some other purpose not for which data is collected initially. The potential misuse of personal information of public is increasing rapidly. The scope of sensitive data is not limited to medical or financial records it may be phone calls made by an individual, buying patterns and many more. No one wants that his/her personal data is sold to any other party without their prior consent. Some individuals become hesitant to share their information which results additional difficulty to obtaining correct information. Public awareness is so much important if private information is shared between different entities. Public awareness about privacy and lack of public trust in organization may introduce additional complexity to data collection. Strong public concern may force government and law forcing agencies to introduce new privacy protecting regulations. For example federal employees being prepossess, on the basis of protected genetic information, according to US Executive Order (2000) [4]. B. Privacy Preserving Data Mining Due to the tremendous benefit of data mining and high public concern regarding individual data privacy, implementation of privacy preserving data mining has become demand of today’s environment. This technique provides individual privacy while at the same time allowing extraction of useful knowledge from data. There are several methods which can be used to enable privacy preserving data mining. Most of the techniques use some form of transformation or modification. These techniques modified the collected data set before its release in an attempt to protect individual records from being re-identified [5]. A malicious data miner or intruder even with additional knowledge cannot be certain about the correctness of a re-identification, even when the data set has been modified. Apart from the context of data mining it is important to maintain patterns in data set. High data quality with privacy/security is the major requirement of good privacy preserving techniques. III. CLASSIFICATION SCHEME AND EVALUATION CRITERIA FOR PRIVACY PRESERVING DATA MINING TECHNIQUES There are various techniques for privacy preserving data mining. Each of the technique is suitable for particular type of scenario and objectives. We are here presented a classification scheme and evaluation criteria for those techniques. However these schemes and criteria build on the classification scheme and evaluation criteria proposed in [1]. A. Classification Scheme Privacy preserving techniques can be classified based on following characteristics:  Data Mining Scenario  Data Mining Tasks  Data Distribution  Data Types  Privacy Definition  Protection Method We describe these classifications characteristics as follows: 1) Data Mining Scenario: There are basically two major data mining scenario present. In the first one organization release their data sets for data mining and allowing unrestricted access to it. Data modification is used to achieve the privacy in this scenario. In the second one organization do not release their data sets but still allow data mining tasks. Cryptographic techniques are basically used for privacy preserving. 2) Data Mining Task: Data set contains various patterns. These patterns are taken out through different types of data mining tasks like classification, association rule mining, outlier analysis, clustering and evolution analysis [6]. Basically, all privacy preserving techniques should maintain data quality to support all possible data mining tasks and statistical analysis but it usually maintain data quality to support only a group of data mining tasks. Basis on that task we categorize the privacy preserving techniques. 3) Data Distribution: Data sets used for data mining can be either distributed or centralized. It is not depending on the physical location where data is stored but to the availability/ownership of data. The centralized data set is owned by a single party. It is either available at computational site or it can be sent to the site. However, distributed data set is shared between two or more parties which do not necessarily trust each other private data but interested to perform data mining on joint data. The data set can be heterogeneous means vertically partitioned where each party owns the same set of attributes but different subset of attributes. Alternatively it can be homogeneous means horizontally partitioned where each party owns the same set of attributes but different subset of records. In Fig. 1 we shows the classification based on distribution. Data Set Centralized Distributed Horizontally Partitioned Vertically Partitioned Fig. 1: Classification of Different Dataset Based on Distribution
  • 3. International Journal of Computer Science and Telecommunications [Volume 4, Issue 9, September 2013] 44 1) Data Types: There are basically two attributes in data set: Numerical and Categorical. Boolean data are the special case of categorical data which takes two possible values 0 and 1. Categorical values lack natural ordering in them. This is the basic difference between categorical and numerical values and its force the privacy preservation technique to take different approaches for them. 2) Privacy Definition: The definitions of privacy are different in different context. In some scenario individuals data values are private, whereas in other scenario certain association or classification rules are private.. Depend on the privacy definition we work on different privacy preserving techniques. 3) Protection Methods: Privacy in data mining is protected through different methods such as data modification and secure multiparty computation (SMC). On the basis of protection method we can also categorize the privacy preserving techniques. The classification is shown in Fig. 2. Fig. 2: A Classification of Privacy Preserving Techniques We see the detailed study of all the techniques in the later section. Now we discuss the evaluation criteria as follows: B. Evaluation Criteria It is important to determine the evaluation criteria and related benchmarks. Some evaluation criteria are: 1) Versatility: It refers to the ability of the techniques to cater for various data mining task, privacy requirements and types of data set. The technique is more useful if it is more versatile. Versatility includes the following:  Private: Data vs. Patterns  Data Sets: Distributed or Centralized (Vertical or horizontal)  Attributes: Numerical or Categorical  Data Mining Tasks 2) Disclosure Risks: It refers to the chances of sensitive information being inferred by a malicious data miner. It’s inversely proportional to the level of security which is offered by the technique. Development of the disclosure risks is difficult task, since it depends on many factors like supplementary knowledge of an intruder and nature of the techniques. Primary objective of privacy preservation technique is minimizing the disclosure risk, so risk evaluation is essential. 3) Information Loss: Information loss is usually proportional to the amount of noise added and level of security. It is inversely proportional to data quality. The primary requirement of privacy preserving technique is to maintain high data quality in released data sets. If data quality is not maintained then high security will be useless. 4) Cost: Cost refers to both computation cost and communication cost between the collaborating parties [1]. Computational costs contain both preprocessing cost (e.g., initial perturbation of values) and running cost (e.g., processing overhead). If data set is distributed then communication cost becomes important issue. The higher the cost, the lower the efficiency of the technique. IV. TECHNIQUES OF PRIVACY PRESERVING Now we see some techniques of privacy preserving data mining: A. Data Modification Existing privacy preserving techniques method for centralized databases can be categorized in three main groups based on the approaches they take, such as query restriction, output perturbation and data modification [7]. From all these techniques data modification is a straightforward technique to implement. In data modification before the release of a dataset for various data mining tasks and analysis, it modifies the data set for protection of individual privacy while the quality of released data remains high. After this modification of the data we can use any off the shelf software such as See5 to manage or analyze the data. It’s not with the case of query restriction and output perturbation. The simplicity of this technique made it attractive and widely used in the context of statistical database in data mining. There are number of ways of doing data modification such as suppression, swapping, aggregation and noise addition. The basic idea of these techniques is given below. 1) Data Swapping: Data swapping technique were first introduced by Dalenius and Reiss in 1982, for categorical values modification in the context of secure statistical databases [8]. The main idea of the method was it keeps all original value in the data set, while at the same time makes the record re-identification very complex. This method actually replace the original data set by another one where some original values belonging to a sensitive attributes are exchanged between them. An introduction to existing data swapping technique can be found in [9], [10]. Inspired by existing techniques a new data swapping techniques is introduced for privacy preserving data mining. This technique focus on the pattern preservation instead of obtaining unbiased statistical parameters. Basically it preserves the most classification rule even if they are obtained by different classification algorithm. 2) Aggregation: Aggregation is also known as generalization or global recording. It is used for protecting an Privacy Technique Data Modification Secure Multi- Party Computation Noise Addition Data Swapping Aggregation Suppression
  • 4. Manish Sharma et al. 45 individual privacy in a released data set by perturbing the original data set before its releasing. Aggregation change k no. of records of a data by representative records. The value of an attribute in such a representative record is generally derived by taking the average of all values, for the attributes, belonging to the records that are replaced. Another method of aggregation or generalization is transformation of attribute values. For ex- an exact birth date can be changed by the year of birth. Such a generalization makes an attribute value less informatics. For ex- if exact birth date is changed by the century of birth then the released data can became useless to data miners [11]. 3) Suppression: In this technique sensitive data value are deleted or suppressed prior to the release of a micro data. Suppression is used to protect an individual privacy from intruders attempt to accurately predict a suppressed value. To predict a sensitive value an intruder can use various approaches. An important issue in suppression is to minimize the information loss by minimizing the number of values suppressed. For some applications, such as medical, suppression is preferred mainly over noise addition in order to reduce the chance of having misleading pattern in perturbed data set. Suppression technique is also been used for association and classification rule confusion [12], [13]. 4) Noise Addition in Data Mining: Noise addition is usually adds a random number (noise) to numerical attributes. This random number is generally drawn from a normal distribution with zero mean or standard deviation. Noise is added in a controlled way so as to maintain variance, co-variance and means of the attributes of a data set. Due to the absence of natural ordering in categorical values, addition of noise in categorical attributes is not straightforward as like addition of noise in numerical attributes. Many techniques proposed for noise addition in data mining. Evfimievski et al. proposed a novel noise addition technique for privacy preserving association rule mining in 2002 [14]. Agarwal and Srikant proposed a noise addition technique in 2000 which is based on addition of random noise to attribute values in such a way that the distributions of data values belonging to original and perturbed data set were very difficult [5]. Du and Zhan presented a decision tree building algorithm which is used to perturb multiple attributes [15]. In 2004 Zhu and lieu [16] proposed a general framework for randomization using a well studied statistical model called mixture model. According to this scheme data are generated from a distribution that depends on some factors including original data as well. Their randomization framework supports privacy preserving density estimation. C. Secure Multiparty Computation (SMC) A Secure Multi-party Computation (SMC) technique encrypts the data sets, while still allowing data mining operations. SMC techniques are not supposed to disclose any new information other than the final result of the computation to a participating party. These techniques are typically based on cryptographic protocols and are applied to distributed data sets. Parties involved in a distributed data mining encrypt their data and send to others parties. These encrypted data are used to compute the aggregate data, belonging to the joint data set, which is used for data mining purpose. Secure Multipart Computation was originally introduced by Yao in 1982 [17]. Basically, SMC is supposed to reveal to a party just the result of the computation and the data owned by the party. There are various SMC algorithms developed. Most of the algorithms make use of some primitive computations such as secure sum, secure set union, secure size of set intersection and secure scalar product. V. COMPARATIVE STUDY Now we present the comparative study of all the privacy preservation techniques on the basis of evaluation criteria which we already discussed above. This comparative study gives us the clear idea about which technique is better in which scenario. We present the comparative study in the tabular form which is shown in Table 1: TABLE 1: PRIVACY PRESERVING TECHNIQUES – COMPARATIVE STUDY Name Versatility Disclosure Private: Cost Risk Data/Rules Information Loss Dataset: Central/Distributed (Vertical/Horizontal) Attributes: Categorical/ Numerical/ Boolean Data Mining Task Outlier Detection Data (Both) Distributed Both Outliers Very Low None High Association Data Distributed (Vertical) Boolean Association Rules Rules Very Low None Moderate Randomized Noise Data Both Numerical Classification Low Moderate Low Correlated Noise Data Centralized Numerical Clustering, Classification Moderate Low Low Decision Tree Noise Data Centralized Both Classification Moderate Low Low Randomized Response Data Both Numerical Density Estimation Low Moderate Low Secure Multiparty Computation (SMC) Data Distributed (Vertical) Numerical Association Rules Very Low None Moderate
  • 5. International Journal of Computer Science and Telecommunications [Volume 4, Issue 9, September 2013] 46 Generally Secure Multiparty Computation techniques tend to incur a significantly higher running cost, but also to provide much higher level of security. It does not disclose anything other than the final results such as the classification rules, cluster and association rules. Therefore, it is suitable in a particular scenario where multiple parties agree to cooperate for just the final result extraction from their combined data set. However, in a scenario where a data set is supposed to be released to facilitate to various research and extract general knowledge, Data modification is the obvious choice. Data Modification usually incurs less computational cost and less information loss as well. VI. CONCLUSION In this paper we present the detailed study about the privacy preserving data mining and briefly review the techniques Data Modification and Secure Multiparty Computation. We tried to present the comparative study of privacy preserving techniques which is helpful to understand that which technique is better in which scenario or environment. Privacy preserving data mining is an important need for all the organization because every organization has their own personal data and they care about their data. All the methods discussed here are only approximate to our goal of privacy preservation now we need to further refine those approaches or develop some efficient techniques. For considering these issues, following problem should be widely studied:  As we know data mining is a very important issue in distributed privacy preserving data mining. We should try to develop more efficient algorithms and achieve a balance between computation, communication and disclosure cost.  Accuracy and privacy are closely related to each other. If we tried to improving one then other effected accordingly. So how to achieving tradeoff between both is an important research. REFERENCES [1] V.S. Verykios, E. Bertino, I. N. Fovino, L. P. Provonza, Y.Saygin and Y. Theodoridis. State-of-the-art in privacy preserving data mining. SIGMOD Record, 33 (1): 50-57, 2004. [2] S. E. Fienberg. Privacy and confidentiality in an e-commerce world: Data mining, data warehousing, matching and disclosure limitation. Statistical Science, 21:143-154, 2006. [3] B. M. Thuraisingham. Data mining, national security, privacy, and civil liberties. SIGKDD Explorations, 4 (2): 1-5, 2002. [4] US Department of Labor. Executive order 13145. Available from http://www.dol.gov/oasam/regs/statutes/eo13145.htm, Feb 8, 2000. [5] R. Agarwal and R. Srikant. Privacy –preserving data mining. In Proc. Of the ACM SIGMOD Conference of Management of Data, pages 439-450. ACM Press, May 2000. [6] J. Han and M. Kamber. Data Mining Concepts and Techniques. Morgan Kaufmann Publishers, San Diego, CA 92101-4495, USA, 2001. [7] N. Adam and J. C. Wortmann. Security control methods for statistical databases: A comparative study. ACM Computing Surveys, 21 (4): 515-556, 1999. [8] T. Dalenius and S. P. Reiss. Data Swapping: A technique for disclosure control. Journal of Statistical Planning and Inference, 6(1):73-85, 1982. [9] S. E. Fienberg and J. McIntyre. Data swapping: Variations on a theme by Dalenius and Reiss. Journal of Official Statistics, 21:309-323, 2005. [10] K. Murlidhar and R. Sarathy. Data Shuffling – a new masking approach for numerical data. Management Science, Forthcoming, 2006. [11] V. S. Iyenger. Transforming data to satisfy privacy constraints. In Proc. Of SIGKDD’02, Edmonton, Alberta, Canada, 2002. [12] S. Rizvi and J.R Hartisa. Maintaining data privacy in association rule mining. In Proc. of the 28th VLDB Conference, pages 682-693, Hong-Kong, China, 2002. [13] Y. Saygin, V. S. Verykios and A. K. Elmagarmid. Privacy preserving association rule mining. In RIDE, pages 151-158, 2002. [14] A. V. Evfimievski, R. Srikant, R. Agarwal and J. Gehrke. Privacy preserving mining of association rules. In Proc. Of the Eighth ACM SIGKDD International Conference on Knowledge and Data Mining, pages 217-228, 2002. [15] W. Du and Z. Zhan. Using randomized response techniques for privacy preserving data mining. In Proc. of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pages 515-510, Washington DC, USA, August 2003. [16] Y. Zhu and L. Liu. Optimal randomization for privacy preserving data mining. In Proc. of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pages 761-766, Seattle, Washington, USA, August 2004. [17] A. C Yao. Protocols for secure computations. In Proc. of the 23rd Annual IEEE Symposium on Foundation of Computer Science, 1982. [18] M. Kantarcioglu and C. Clifton. Privacy preserving distributed mining of association rules on horizontally partitioned data. IEEE Trans. Knowl. Data Eng. , 16 (9):1026: 1036, 2004. [19] M. Kantardzic. Data Mining Concepts, Models, Methods and Algorithms. IEEE Press, NJ, USA, 2003. [20] H. Kargupta, S. Datta, Q. Wang and K. Sivakumar. Random data perturbation techniques and privacy preserving data mining. Knowledge and Information Systems, 7:387-414, 2005.