An analysis of privacy preservation techniques in data mining

Abhishek Sachan, Devshri Roy, P. V. Arun

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

16 Scopus citations

Abstract

Data mining techniques are used extensively for deducting the implicit, previously unknown, and potentially useful information from large data sets by using statistical and intelligent methodologies. The deduction of patterns or conclusions may uncover the information that may sometimes compromise the confidentiality and privacy obligations. Preservation of privacy is an important aspect of data mining and thus study of achieving some data mining goals without sacrificing the privacy of the individuals is not only demanding but also a task of practical importance. The analysis of privacy preserving data mining (PPDM) algorithms should consider the effects of these algorithms in mining the results as well as in preserving privacy. The privacy should be preserved in all the three aspects of mining as association rules, classifiers and clusters. In this paper we present a review of the commonly existing efficient methodologies in the context of privacy preservation in data mining.

Original languageEnglish
Title of host publicationAdvances in Computing and Information Technology- Proceedings of the 2nd International Conference on Advances in Computing and Information Technology, ACITY 2012- Volume 3
EditorsNatarajan Meghanathan, Nabendu Chaki, Dhinaharan Nagamalai
PublisherSpringer Verlag
Pages119-128
Number of pages10
ISBN (Print)9783642315992
DOIs
StatePublished - 1 Jan 2013
Externally publishedYes
Event2nd International Conference on Advances in Computing and Information Technology, ACITY 2012 - Chennai, India
Duration: 13 Jul 201215 Jul 2012

Publication series

NameAdvances in Intelligent Systems and Computing
Volume178
ISSN (Print)2194-5357
ISSN (Electronic)2194-5365

Conference

Conference2nd International Conference on Advances in Computing and Information Technology, ACITY 2012
Country/TerritoryIndia
CityChennai
Period13/07/1215/07/12

Keywords

  • Counter terrorism
  • Cryptography
  • Data mining
  • Encrypted data
  • Privacy preserving

ASJC Scopus subject areas

  • Control and Systems Engineering
  • General Computer Science

Fingerprint

Dive into the research topics of 'An analysis of privacy preservation techniques in data mining'. Together they form a unique fingerprint.

Cite this