2013
DOI: 10.4236/jis.2013.42012
|View full text |Cite
|
Sign up to set email alerts
|

Attacks on Anonymization-Based Privacy-Preserving: A Survey for Data Mining and Data Publishing

Abstract:

Data mining is the extraction of vast interesting patterns or knowledge from huge amount of data. The initial idea of privacy-preserving data mining PPDM was to extend traditional data mining techniques to work with the data modified to mask sensitive information. The key issues were how to modify the data and how to recover the data mining result from the modified data. Privacy- Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
9
1

Relationship

1
9

Authors

Journals

citations
Cited by 31 publications
(11 citation statements)
references
References 30 publications
0
11
0
Order By: Relevance
“…Second Suppression involves not releasing a value at all [13]. It is clear that such methods reduce the risk of identification with the use of public records, while reducing the accuracy of applications on the transformed data.…”
Section: K-anonymity Generalization and Suppressionmentioning
confidence: 99%
“…Second Suppression involves not releasing a value at all [13]. It is clear that such methods reduce the risk of identification with the use of public records, while reducing the accuracy of applications on the transformed data.…”
Section: K-anonymity Generalization and Suppressionmentioning
confidence: 99%
“…Privacy preserving data mining is going to be achieved in different ways specifically by using randomization methods, cryptography algorithms and anonymization methods. A modern survey on are being used on various methods using privacy preserving data mining are found [1] in which reviews major PPDM techniques based on merits and demerits on recent trends in PPDM. The current scenario privacy preserving data mining [2] propose some future research directions for research people.…”
Section: Privacy Preserving Data Miningmentioning
confidence: 99%
“…In [1] various techniques of PPDM is analyzed as shown in Table 1. In [2], data Perturbation for PPDM is analyzed and in [3] various attacks in PPDM is discussed. In [4,5], fuzzy based PPDM is proposed and in [6,7], PPDM is proposed.…”
Section: Introductionmentioning
confidence: 99%