2016
DOI: 10.5120/ijca2016907917
|View full text |Cite
|
Sign up to set email alerts
|

Survey on Privacy Preserving Data Mining Techniques using Recent Algorithms

Abstract: The privacy preserving data mining is playing crucial role act as rising technology to perform various data mining operations on private data and to pass on data in a secured way to protect sensitive data. Many types of technique such as randomization, secured sum algorithms and k-anonymity have been suggested in order to execute privacy preserving data mining. In this survey paper, on current researches made on privacy preserving data mining technique with fuzzy logic, neural network learning, secured sum and… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
10
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(10 citation statements)
references
References 35 publications
0
10
0
Order By: Relevance
“…In the literature so far, to the best of our knowledge, insufficient attention has been paid to the systematization of techniques and methods related to PPDM. Some of the authors have systematized previous research in this area (see Rajesh, Sujatha, & Arul, 2016;Shah & Gulati, 2016;Vaghashia & Ganatra, 2015;.…”
Section: Techniques and Methodsmentioning
confidence: 99%
“…In the literature so far, to the best of our knowledge, insufficient attention has been paid to the systematization of techniques and methods related to PPDM. Some of the authors have systematized previous research in this area (see Rajesh, Sujatha, & Arul, 2016;Shah & Gulati, 2016;Vaghashia & Ganatra, 2015;.…”
Section: Techniques and Methodsmentioning
confidence: 99%
“…Three types of methods for partitioning data to be securely shared are well known. [3,4,23,24] They are horizontal, vertical and arbitrary partitioning methods. In the following, the horizontal method is only explained by using a data example of students' marks shown in Table 1.…”
Section: Introductionmentioning
confidence: 99%
“…The spreading of cloud computing enables big data analysis, which analyzes enormous information accumulated by the client and creates a market value of data. [1][2][3][4] On the other hand, the client of cloud computing is concerned about abuse or leak of information. For this purpose, privacy preserving data processing can be achieved in various ways by use of randomization techniques, cryptographic algorithms, anonymization methods, etc.…”
Section: Introductionmentioning
confidence: 99%
“…[4,5] Privacy preserving data mining can be achieved in various ways by use of randomization techniques, cryptographic algorithms, anonymization methods, etc. [4,[6][7][8][9] Specifically, data encryption seems to be effective. However, data encryption system requires both encryption and decryption for requests of client or user, so its applications are limited.…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, studies with distributed processing for secure data have been attracting attention. [6][7][8][9] As one of these studies, secure multiparty computation (SMC) has been introduced. [10][11][12] The purpose of SMC is to allow parties to carry out distributed computing tasks in secure way.…”
Section: Introductionmentioning
confidence: 99%