Skip to main content
Top

2018 | OriginalPaper | Chapter

Privacy Preserving Data Mining Techniques for Hiding Sensitive Data: A Step Towards Open Data

Author : Durga Toshniwal

Published in: Data Science Landscape

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Privacy Preserving Data Mining (PPDM) is an area that deals with data mining techniques that allow the data to be mined while keeping its privacy intact. PPDM comes into play when different parties want to involve in collaborative data mining and wish to collectively mine their data to extract knowledge while keeping their data private. The preservation of privacy of data is also of utmost importance when we want to publish any data as open data. This study includes a detailed review of some of the recent techniques proposed in this area. The biggest challenge in devising any privacy preserving data mining technique is to achieve a good balance between privacy and utility of the privacy preserved data.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Verykios, V. S., Bertino, E., Fovino, I. N., Provenza, L. P., Saygin, Y., & Theodoridis, Y. (2004). State-of-the art in privacy preserving data mining. ACM SIGMOD Record, 3(1), 50–57.CrossRef Verykios, V. S., Bertino, E., Fovino, I. N., Provenza, L. P., Saygin, Y., & Theodoridis, Y. (2004). State-of-the art in privacy preserving data mining. ACM SIGMOD Record, 3(1), 50–57.CrossRef
2.
go back to reference Li, T., Li, N., Zhang, J., & Molloy, I. (2012). Slicing: A new approach for privacy preserving data publishing. IEEE Transactions on Knowledge and Data Engineering, 24(3), 561–574.CrossRef Li, T., Li, N., Zhang, J., & Molloy, I. (2012). Slicing: A new approach for privacy preserving data publishing. IEEE Transactions on Knowledge and Data Engineering, 24(3), 561–574.CrossRef
3.
go back to reference Navaro-Arribas, G., Torra, V., Erola, A., & Castella-Roca, J. (2011). User k-anonymity for privacy preserving data mining of query logs. In Information processing and management (pp. 476–487). Elsevier. Navaro-Arribas, G., Torra, V., Erola, A., & Castella-Roca, J. (2011). User k-anonymity for privacy preserving data mining of query logs. In Information processing and management (pp. 476–487). Elsevier.
4.
go back to reference Islam, M. Z., & Brankovic, L. (2011). Privacy preserving data mining: A noise addition framework using a novel clustering technique. In Knowledge-based systems (pp. 1214–1223). Elsevier: Amsterdam. Islam, M. Z., & Brankovic, L. (2011). Privacy preserving data mining: A noise addition framework using a novel clustering technique. In Knowledge-based systems (pp. 1214–1223). Elsevier: Amsterdam.
5.
go back to reference Ibrahim, A., Jin, H., Yassin, A. A., & Zou, D. (2012). Towards privacy preserving mining over distributed cloud databases. In International conference on cloud and green computing. Ibrahim, A., Jin, H., Yassin, A. A., & Zou, D. (2012). Towards privacy preserving mining over distributed cloud databases. In International conference on cloud and green computing.
6.
go back to reference Clifton, C., Kantarcioglu, M., Vaidya, X., Lin, J., & Zhu, M. Y. (2002). Tools for privacy preserving distributed data mining. SIGKDD Explorations Newsletter, 4(2), 28–34.CrossRef Clifton, C., Kantarcioglu, M., Vaidya, X., Lin, J., & Zhu, M. Y. (2002). Tools for privacy preserving distributed data mining. SIGKDD Explorations Newsletter, 4(2), 28–34.CrossRef
7.
go back to reference Fong, P. K., & Weber-Jahnke, J. H. (2012). Privacy preserving decision tree learning using unrealized data sets. IEEE Transactions on Knowledge and Data Engineering, 24(2), 353–364.CrossRef Fong, P. K., & Weber-Jahnke, J. H. (2012). Privacy preserving decision tree learning using unrealized data sets. IEEE Transactions on Knowledge and Data Engineering, 24(2), 353–364.CrossRef
8.
go back to reference Zhang, X., Yang, L. T., Liu, C., & Chen, J. (2014). A scalable two-phase top-down specialization approach for data anonymization using mapreduce on cloud. IEEE Transactions on Parallel and Distributed Systems, 25(2), 363–373.CrossRef Zhang, X., Yang, L. T., Liu, C., & Chen, J. (2014). A scalable two-phase top-down specialization approach for data anonymization using mapreduce on cloud. IEEE Transactions on Parallel and Distributed Systems, 25(2), 363–373.CrossRef
9.
go back to reference Li, J., Li, J., Chen, X., Liu, Z., & Jia, C. (2014). Privacy-preserving data utilization in hybrid clouds. Future Generation Computer Systems, 30, 98–106.CrossRef Li, J., Li, J., Chen, X., Liu, Z., & Jia, C. (2014). Privacy-preserving data utilization in hybrid clouds. Future Generation Computer Systems, 30, 98–106.CrossRef
10.
go back to reference Yi, X., Rao, F. Y., Bertino, E., & Bouguettaya, A. (2015). Privacy-preserving association rule mining in cloud computing. In Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security (pp. 439–450). Yi, X., Rao, F. Y., Bertino, E., & Bouguettaya, A. (2015). Privacy-preserving association rule mining in cloud computing. In Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security (pp. 439–450).
Metadata
Title
Privacy Preserving Data Mining TechniquesPrivacy Preserving Data Mining Techniques for Hiding Sensitive DataHiding Sensitive Data : A Step Towards Open DataOpen Data
Author
Durga Toshniwal
Copyright Year
2018
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-7515-5_15

Premium Partner