Skip to main content

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 516))

Abstract

With technological revolution, a huge amount of data is being collected and as a consequence the need of mining knowledge from this data is triggered. But, data in its raw form comprises of sensitive information and advances in data mining techniques have increased the privacy breach. However, due to socio-technical transformations, most countries have levied the guidelines and policies for publishing certain data. As a result, a new area known as Privacy Preserving Data Mining (PPDM) has emerged. The goal of PPDM is to extract valuable information from data while retaining privacy of this data. The paper focuses on exploring PPDM in different aspects, such as types of privacy, PPDM scenarios and applications, methods of evaluating PPDM algorithms etc. Also, the paper shows parametric analysis and comparison of different PPDM techniques. The goal of this study is to facilitate better understanding of these PPDM techniques and boost fruitful research in this direction.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 299.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 379.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. P. Tan, M. Steinbach, V. Kumar, Introduction to Data Mining, 1st edn. (Addison Wesley Longman Publishing, Co. Inc., 2005)

    Google Scholar 

  2. J. Panackal, A. Pillai, Privacy preserving data mining: an extensive survey, in ACEEE, Proceedings of International Conference on Multimedia Processing, Communication and Information Technology (2013)

    Google Scholar 

  3. M. Dhanalakshmi, S. Sankari, Privacy preserving data mining techniques-survey, in Proceedings of information communication & embedded systems (2014)

    Google Scholar 

  4. K. Babu, Utility-Based Privacy Preserving Data Publishing. Ph.D. thesis, National Institute of Technology Rourkela (2013)

    Google Scholar 

  5. X. Ge, J. Zhu, New Fundamental Technologies in Data Mining, ch. Privacy preserving data mining (In Tech Publishing, 2011)

    Google Scholar 

  6. S. Gokila, P. Venkateswari, A survey on privacy preserving data publishing. Int. J. Cybern. Inf. 3(1) (2014)

    Google Scholar 

  7. C. Aggarwal, P. Yu, Advances in Database Systems, ch. A general survey of privacy-preserving data mining models and algorithms (Springer, 2008)

    Google Scholar 

  8. G. Nayak, S. Devi, A survey on privacy preserving data mining: approaches and techniques. Int. J. Eng. Sci. Technol. (2011)

    Google Scholar 

  9. V. A-Rivera, P. McDonagh, T. Cerqueus, L. Murphy, A systematic comparison and evaluation of k-anonymization algorithms for practitioners. Trans. Data Privacy, 337–370 (2014)

    Google Scholar 

  10. P. Samarati, Protecting Respondents’ identities in Microdata Release. IEEE Trans. Knowl. Data Eng. (2001)

    Google Scholar 

  11. L. Sweeney, Achieving K-anonymity privacy protection using generalization and suppression. Int. J. Uncertain. Fuzziness Knowl.-Based Syst. 10(5), 571–588 (2002)

    Article  MathSciNet  MATH  Google Scholar 

  12. R. Brand, Microdata protection through noise addition, in Inference Control in Statistical Databases. Lecture Notes in Computer Science, vol. 2316, pp. 97–116 (2002)

    Google Scholar 

  13. X. Xiao, Y. Tao Anatomy: simple and effective privacy preservation, in Proceedings of the 32nd International Conference on Very Large Data Bases, pp. 139–150 (2006)

    Google Scholar 

  14. J. D-Ferrer, V. Torra Ordinal, continuous and heterogeneous k-anonymity through Microaggregation, in Data Mining Knowledge Discovery, vol. 11, no. 2 (2005)

    Google Scholar 

  15. P. Samarati, L. Sweeney, Generalizing data to provide anonymity when disclosing information, in Proceedings of ACM Symposium on Principles of Database Systems (1998)

    Google Scholar 

  16. C. Aggarwal, P. Yu, Advances in Database Systems, ch. A survey of randomization methods for privacy-preserving data mining (Springer, 2008)

    Google Scholar 

  17. Y. Lindell, B. Pinkas, Privacy preserving data mining. J. Cryptol. 15(3), 177–206 (2002)

    Article  MathSciNet  MATH  Google Scholar 

  18. L. Vasudevan, D. Sukanya, N. Aarthi, Privacy preserving data mining using cryptographic role based access control approach, in Proceedings of the International Multi-Conference of Engineers and Computer Scientists, Hong Kong, pp. 19–21 (2008)

    Google Scholar 

  19. B. Fung, K. Wang, R. Chen, P. Yu, Privacy-preserving data publishing: a survey of recent developments. ACM Comput. Surv. 42(4) (2010)

    Google Scholar 

  20. R. Kotecha, S. Garg, Data streams and privacy: two emerging issues in data classification, in Nirma University International Conference on Engineering (IEEE, 2015)

    Google Scholar 

  21. K. Saranya, K. Premalatha, S. Rajasekar, A survey on privacy preserving data mining, in International Conference on Electronics & Communication System (IEEE, 2015)

    Google Scholar 

  22. J. Han, M. Kamber, Data Mining: Concepts and Techniques (Morgan Kaufmann Publishers Inc., 2005)

    Google Scholar 

  23. R. Kotecha, V. Ukani, S. Garg, An empirical analysis of multiclass classification techniques in data mining, in Nirma University International Conference on Engineering (IEEE, 2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Darshana Patel .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Patel, D., Kotecha, R. (2017). Privacy Preserving Data Mining: A Parametric Analysis. In: Satapathy, S., Bhateja, V., Udgata, S., Pattnaik, P. (eds) Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications . Advances in Intelligent Systems and Computing, vol 516. Springer, Singapore. https://doi.org/10.1007/978-981-10-3156-4_14

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-3156-4_14

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-3155-7

  • Online ISBN: 978-981-10-3156-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics