TITLE

A Review on Approaches, Techniques and Research Challenges in Privacy Preserving Data Mining

AUTHOR(S)
Prakash, M.; Singaravel, G.
PUB. DATE
July 2014
SOURCE
Australian Journal of Basic & Applied Sciences;Jul2014, Vol. 8 Issue 10, p251
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
Background: Privacy Preserving Data Mining is a fast growing new era of research due to recent advancements in information, data mining, communications and security technologies. The Privacy Preserving Data Mining's ultimate goal is to develop efficient algorithms that allow one to extract relevant knowledge from large amount of data, while prevent sensitive information from disclosure or inference. Several data mining algorithms, incorporating privacy preserving mechanisms, have been developed over the last years. There is an emerging need of synthesizing literature to understand the nature of problem, identify potential research issues, standardize new research area, and evaluate the relative performance of different approaches. Objective: The main purpose of this study is to review the state-of-the-art in current Privacy Preserving Data Mining research in order to better understand existing algorithms, answer research questions and move forward the field of research. Results: In this paper, we provide a review of the approaches and techniques for privacy and analyze the representative technique for privacy preserving data mining and points out their merits and demerits. Conclusion: A comparison of work done by different authors is presented. Finally, the directions for future research are discussed.
ACCESSION #
97368487

 

Related Articles

  • The Seismic Data Sharing Platform of User Classification Model. CAO Bei-bei; YIN Jing-yuan // Advances in Information Sciences & Service Sciences;Jul2012, Vol. 4 Issue 13, p404 

    Seismic data of earthquake research is not only the most important basic information, but also significant science and technology information resources of the nation. In order to more effectively protect the national information security and the legitimate rights of data users, data types of the...

  • EFFECTIVE PERFORMANCE OF INFORMATION RETRIEVAL ON WEB BY USING WEB CRAWLING. AbdulNabi, Sk.; Premchand, P. // International Journal of Web & Semantic Technology;Apr2012, Vol. 3 Issue 2, p63 

    World Wide Web consists of more than 50 billion pages online. It is highly dynamic [6] i.e. the web continuously introduces new capabilities and attracts many people. Due to this explosion in size, the effective information retrieval system or search engine can be used to access the information....

  • A review on Security in Distributed Information Sharing. Upadhyay, Swati; Maurya, J. P. // International Journal of Computer Science & Information Technolo;2014, Vol. 5 Issue 3, p2995 

    In recent year's privacy preserving data mining has emerged as a very active research area in data mining. Over the last few years this has naturally lead to a growing interest in security or privacy issues in data mining. More precisely, it became clear that discovering knowledge through a...

  • A (k,t,n) verifiable multi-secret sharing scheme based on adversary structure. Jing Li; Licheng Wang; Jianhua Yan; Xinxin Niu; Yixian Yang // KSII Transactions on Internet & Information Systems;Dec2014, Vol. 8 Issue 12, p4552 

    A (n,t, n) secret sharing scheme is to share a secret among n group members, where each member also plays a role of a dealer,and any t shares can be used to recover the secret. In this paper, we propose a strong (k,t, n) verifiable multi-secret sharing scheme, where any k out of n participants...

  • A DCT-based privacy-preserving approach for efficient data mining. Feng Tian; Xiaolin Gui; Jian An; Pan Yang; Xuejun Zhang; Jianqiang Zhao // Security & Communication Networks;Dec2015, Vol. 8 Issue 18, p3641 

    With the rapid growth of various data collected by companies and organizations, there is an increasing need for the data owners to share their data with the third party for the purpose of data mining. Therefore, protecting the privacy of the shared data has received considerable attention from...

  • BIG DATA DOESN'T MEAN BIG LITIGATION. SANDS, DARIN M.; TRANETZKI, KRISTEN // Oregon Business Magazine;Jun2013, Vol. 36 Issue 5, p56 

    The article presents big data, a term denoting all the digital information that is created, circulated and stored. It discusses opportunities for business in mining these data as well as the potential problems such as those with latent litigation risk. The author offers tips to minimize the risk...

  • PATTERN MINING TECHNIQUES FOR PRIVACY PRESERVING TRANSACTIONAL DATASETS USING ATTRIBUTE IMPACT MATRIX. VIJAYKUMAR; CHRISTOPHER, T. // Journal of Theoretical & Applied Information Technology;10/20/2014, Vol. 68 Issue 2, p397 

    Privacy preservation being studied well in recent days of data publishing where the sensitive items have to be hidden without spoiling the originality of data. We propose a new approach for privacy preservation of data items while publishing transactional data sets. The proposed approach...

  • Sharing digital resources in the cloud is feasible, says report.  // Research Information;Feb/Mar2011, Issue 52, p8 

    The article reports on a study which concluded the feasibility of sharing digital resources.

  • Algorithm for Efficient Multilevel Association Rule Mining. Gautam, Pratima; Pardasani, K. R. // International Journal on Computer Science & Engineering;2010, Vol. 2 Issue 5, p1700 

    over the years, a variety of algorithms for finding frequent item sets in very large transaction databases have been developed. The problems of finding frequent item sets are basic in multi level association rule mining, fast algorithms for solving problems are needed. This paper presents an...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics