Abstract
With technological revolution, a huge amount of data is being collected and as a consequence the need of mining knowledge from this data is triggered. But, data in its raw form comprises of sensitive information and advances in data mining techniques have increased the privacy breach. However, due to socio-technical transformations, most countries have levied the guidelines and policies for publishing certain data. As a result, a new area known as Privacy Preserving Data Mining (PPDM) has emerged. The goal of PPDM is to extract valuable information from data while retaining privacy of this data. The paper focuses on exploring PPDM in different aspects, such as types of privacy, PPDM scenarios and applications, methods of evaluating PPDM algorithms etc. Also, the paper shows parametric analysis and comparison of different PPDM techniques. The goal of this study is to facilitate better understanding of these PPDM techniques and boost fruitful research in this direction.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
P. Tan, M. Steinbach, V. Kumar, Introduction to Data Mining, 1st edn. (Addison Wesley Longman Publishing, Co. Inc., 2005)
J. Panackal, A. Pillai, Privacy preserving data mining: an extensive survey, in ACEEE, Proceedings of International Conference on Multimedia Processing, Communication and Information Technology (2013)
M. Dhanalakshmi, S. Sankari, Privacy preserving data mining techniques-survey, in Proceedings of information communication & embedded systems (2014)
K. Babu, Utility-Based Privacy Preserving Data Publishing. Ph.D. thesis, National Institute of Technology Rourkela (2013)
X. Ge, J. Zhu, New Fundamental Technologies in Data Mining, ch. Privacy preserving data mining (In Tech Publishing, 2011)
S. Gokila, P. Venkateswari, A survey on privacy preserving data publishing. Int. J. Cybern. Inf. 3(1) (2014)
C. Aggarwal, P. Yu, Advances in Database Systems, ch. A general survey of privacy-preserving data mining models and algorithms (Springer, 2008)
G. Nayak, S. Devi, A survey on privacy preserving data mining: approaches and techniques. Int. J. Eng. Sci. Technol. (2011)
V. A-Rivera, P. McDonagh, T. Cerqueus, L. Murphy, A systematic comparison and evaluation of k-anonymization algorithms for practitioners. Trans. Data Privacy, 337–370 (2014)
P. Samarati, Protecting Respondents’ identities in Microdata Release. IEEE Trans. Knowl. Data Eng. (2001)
L. Sweeney, Achieving K-anonymity privacy protection using generalization and suppression. Int. J. Uncertain. Fuzziness Knowl.-Based Syst. 10(5), 571–588 (2002)
R. Brand, Microdata protection through noise addition, in Inference Control in Statistical Databases. Lecture Notes in Computer Science, vol. 2316, pp. 97–116 (2002)
X. Xiao, Y. Tao Anatomy: simple and effective privacy preservation, in Proceedings of the 32nd International Conference on Very Large Data Bases, pp. 139–150 (2006)
J. D-Ferrer, V. Torra Ordinal, continuous and heterogeneous k-anonymity through Microaggregation, in Data Mining Knowledge Discovery, vol. 11, no. 2 (2005)
P. Samarati, L. Sweeney, Generalizing data to provide anonymity when disclosing information, in Proceedings of ACM Symposium on Principles of Database Systems (1998)
C. Aggarwal, P. Yu, Advances in Database Systems, ch. A survey of randomization methods for privacy-preserving data mining (Springer, 2008)
Y. Lindell, B. Pinkas, Privacy preserving data mining. J. Cryptol. 15(3), 177–206 (2002)
L. Vasudevan, D. Sukanya, N. Aarthi, Privacy preserving data mining using cryptographic role based access control approach, in Proceedings of the International Multi-Conference of Engineers and Computer Scientists, Hong Kong, pp. 19–21 (2008)
B. Fung, K. Wang, R. Chen, P. Yu, Privacy-preserving data publishing: a survey of recent developments. ACM Comput. Surv. 42(4) (2010)
R. Kotecha, S. Garg, Data streams and privacy: two emerging issues in data classification, in Nirma University International Conference on Engineering (IEEE, 2015)
K. Saranya, K. Premalatha, S. Rajasekar, A survey on privacy preserving data mining, in International Conference on Electronics & Communication System (IEEE, 2015)
J. Han, M. Kamber, Data Mining: Concepts and Techniques (Morgan Kaufmann Publishers Inc., 2005)
R. Kotecha, V. Ukani, S. Garg, An empirical analysis of multiclass classification techniques in data mining, in Nirma University International Conference on Engineering (IEEE, 2011)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Patel, D., Kotecha, R. (2017). Privacy Preserving Data Mining: A Parametric Analysis. In: Satapathy, S., Bhateja, V., Udgata, S., Pattnaik, P. (eds) Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications . Advances in Intelligent Systems and Computing, vol 516. Springer, Singapore. https://doi.org/10.1007/978-981-10-3156-4_14
Download citation
DOI: https://doi.org/10.1007/978-981-10-3156-4_14
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-3155-7
Online ISBN: 978-981-10-3156-4
eBook Packages: EngineeringEngineering (R0)