Abstract
Safeguarding of security in information mining has risen as an outright essential for trading secret data as far as information investigation, approval, and distributing. Constantly raising web phishing postured serious danger on across the board proliferation of delicate data over the web. Then again, the questionable sentiments and conflicts intervened unwillingness of different data suppliers towards the unwavering quality insurance of information from exposure frequently comes about absolute dismissal in information sharing or off base data sharing. This article gives an all-encompassing outline on new point of view and precise translation of a rundown distributed literary works through their fastidious association in subcategories. The crucial ideas of the current protection safeguarding information mining strategies, their benefits, and deficiencies are displayed. The present security protecting information mining methods are ordered in light of contortion, affiliation administer, shroud affiliation control, scientific categorization, bunching, cooperative characterization, outsourced information mining, disseminated, and k-anonymity, where their remarkable points of interest and hindrances are underlined. This watchful investigation uncovers the past improvement, show examine challenges, future patterns, the holes and weaknesses. Promote huge improvements for more powerful security insurance and safeguarding are confirmed to be compulsory.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Aggarwal, C.C., Yu, P.S.: A general survey of privacy-preserving data mining models and algorithms. In: Privacy Preserving Data Mining (Chap. 2), pp. 11–52. Springer, New York (2008)
Arunadevi, M., Anuradha, R.: Privacy preserving outsourcing for frequent item set mining. Int. J. Innov. Res. Comp. Commun. Eng. 2(1), 3867–3873 (2014)
Baotou, T.: Research on privacy preserving classification data mining based on random perturbation. In: X. Zhang, H. Bi pp. 1–6 (2010)
Belwal, R., Varshney, J., Khan, S.: Hiding sensitive association rules efficiently by introducing new variable hiding counter. In: IEEE International Conference on Service Operations and Logistics, and Informatics, vol. 1, pp. 130–134, IEEE/SOLI 2008 (2013)
Chan, J., Keng, J.: Privacy protection in outsourced association rule mining using distributed servers and its privacy notions, pp. 1–5 (2013)
Ciriani, V., Vimercati, S.D.C., Foresti, S., Samarati, P.: k-anonymous data mining: a survey. In: Privacy-Preserving Data Mining, pp. 105–136. Springer, New York (2008)
Dehkordi, M.N.M., Badie, K., Zadeh, A.K.A.: A novel method for privacy preserving in association rule mining based on genetic algorithms. J. Softw. 4(6), 555–562 (2009)
Deivanai, P., Nayahi, J., Kavitha, V.: A hybrid data anonymization integrated with suppression for preserving privacy in mining multi party data. In: IEEE International Conference on Recent Trends in Information Technology (ICRTIT) (2011)
Dev, H., Sen, T., Basak, M., Ali, M.E.: An approach to protect the privacy of cloud data from data mining based attacks. In: IEEE 2012 SC Companion High Performance Computing, Networking, Storage and Analysis (SCC) (2012)
Ding, X., Yu, Q., Li, J., Liu, J., Jin, H.: Distributed anonymization for multiple data providers in a cloud system. In: Database Systems for Advanced Applications. Springer, Berlin (2013)
Giannotti, F., Lakshmanan, L.V.S., Monreale, A., Pedreschi, D., Wang, H.: Privacy-preserving mining of association rules from outsourced transaction databases. IEEE Syst. J. 7(3), 385–395 (2013)
Gkoulalas-Divanis, A., Verykios, V.S.: Exact knowledge hiding through database extension. IEEE Trans. Knowl. Data Eng. 21(5), 699–713 (2009)
Harnsamut, N., Natwichai, J.: A novel heuristic algorithm for privacy preserving of associative classification. In: PRICAI 2008: Trends in Artificial Intelligence, pp. 273–283. Springer, Berlin (2008)
Inan, A., Saygin, Y.: Privacy preserving spatio-temporal clustering on horizontally partitioned data. In: Lecture Notes in Computer Science (including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 6202 LNAI, pp. 187–198 (2010)
Islam, M.Z., Brankovic, L.: Privacy preserving data mining: a noise addition framework using a novel clustering technique. Knowl Based Syst. 24(8), 1214–1223 (2011)
Jain, Y.Y.K., Yadav, V.K.V.V.K., Panday, G.G.S.: An efficient association rule hiding algorithm for privacy preserving data mining. Int. J. Comp. Sci Eng. 3(7), 2792–2798 (2011)
Kamakshi, P.: Automatic detection of sensitive attribute in PPDM. In: IEEE International Conference on Computational Intelligence & Computing Research (ICCIC) (2012)
Kamakshi, P., Babu, A.V.: Preserving privacy and sharing the data in distributed environment using cryptographic technique on perturbed data 2(4) (2010)
Karim, R., Rashid, M., Jeong, B., Choi, H.: Transactional databases, pp. 303–319 (2012)
Kasthuri, S., Meyyappan, T.: Detection of sensitive items in market basket database using association rule mining for privacy preserving. In: IEEE International Conference on Pattern Recognition, Informatics and Mobile Engineering (PRIME) (2013)
Kerschbaum, F., Julien, V.: Privacy-preserving data analytics as an outsourced service. In: Proceedings of the 2008 ACM Workshop on Secure Web Services. ACM (2008)
Keshavamurthy, B.N., Khan, A.M., Toshniwal, D.: Privacy preserving association rule mining over distributed databases using genetic algorithm. Neural Comput. Appl. pp. 351–364 (2013)
Kumbhar, M.N., Kharat, R.: Privacy preserving mining of association rules on horizontally and vertically partitioned data: a review paper. In: 12th IEEE International Conference on Hybrid Intelligent Systems (HIS), pp. 231–235 (2012)
Lai, J., Li, Y., Deng, R.H., Weng, J., Guan, C., Yan, Q.: Towards semantically secure outsourcing of association rule mining on categorical data. Inf. Sci. (NY) 267, 267–286 (2014)
Li, Y.: Privacy-Preserving and Reputation System in Distributed Computing with Untrusted Parties, no. July. Pro- Quest LLC (2013). Copyright in the Dissertation held by the Author. Microform Edition © ProQuest LLC. All rights reserved (2013)
Li, W., Liu, J.: Privacy preserving association rules mining based on data disturbance and inquiry limitation. In: 2009 Fourth International Conference on Internet Computer Science Engineering, pp. 24–29 (2009)
Lin, K.W., Lo, Y.-C.: Efficient algorithms for frequent pattern mining in many-task computing environments. Knowl Based Syst. 49, 10–21 (2013)
Loukides, G., Gkoulalas-divanis, A.: Expert systems with applications utility-preserving transaction data anonymization with low information loss. Expert Syst. Appl. 39(10), 9764–9777 (2012)
Loukides, G., Gkoulalas-Divanis, A., Shao, J.: Efficient and flexible anonymization of transaction data. Knowl. Inf. Syst. 36(1), 153–210 (2012)
Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: l-diversity: privacy beyond k-anonymity. ACM Trans. Knowl. Discov. Data 1(1), 3 (2007)
Malina, L., Hajny, J.: Efficient security solution for privacy-preserving cloud services. In: 36th International Conference on Telecommunications and Signal Processing (TSP), pp. 23–27 (2013)
Matwin, S.: Privacy-preserving data mining techniques: survey and challenges. In: Discrimination & Privacy in the Information Society, pp. 209–221. Springer, Berlin (2013)
Monreale, A., Pedreschi, D., Pensa, R.G., Pinelli, F.: Anonymity preserving sequential pattern mining. Artif. Intell. Law 22(2), 141–173 (2014)
Mukkamala, R., Ashok, V.G.: Fuzzy-based methods for privacy-preserving data mining. In: IEEE Eighth International Conference on Information Technology: New Generations (ITNG) (2011)
Naeem, M., Asghar, S., Fong, S.: Hiding sensitive association rules using central tendency. In: 6th International Conference on Advanced Information Management and Service (IMS), pp. 478–484 (2010)
Nanavati, N., Jinwala, D.: Privacy preservation for global cyclic associations in distributed databases. Procedia Technol. 6, 962–969 (2012)
Nayak, G., Devi, S.: A survey on privacy preserving data mining: approaches and techniques. Int. J. Eng. Sci. Tech. 3(3), 2117–2133 (2011)
Nergiz, M.E., Gök, M.Z.: Hybrid k-anonymity. Comput. Secur. 44, 51–63 (2014)
Nergiz, M.E., Christopher, C., Ahmet, E.N.: Multirelational k-anonymity. IEEE Trans. Knowl. Data Eng. 21(8), 1104–1117 (2009)
Nergiz, M.E., Gök, M.Z., Özkanlı, U.: Preservation of utility through hybrid k-anonymization. In: Trust, Privacy, and Security in Digital Business, pp. 97–111. Springer, Berlin (2013)
Nix, R., Kantarcioglu, M., Han, K.J.: Approximate privacy-preserving data mining on vertically partitioned data. In: Data and Applications Security and Privacy XXVI, pp. 129–144. Springer, Berlin (2012)
Om Kumar, C.U., Tejaswi, K., Bhargavi, P.: A distributed cloud—prevents attacks and preserves user privacy. In: 15th International Conference on Advanced Computing Technologies, ICACT (2013)
Qi, X., Zong, M.: An overview of privacy preserving data mining. Procedia Environ. Sci. 12(Icese 2011), 1341–1347 (2012)
Quoc, H., Arch-int, S., Xuan, H., Arch-int, N.: Computers in industry association rule hiding in risk management for retail supply chain collaboration. Comput. Ind. 64(7), 776–784 (2013)
Raghuram, B., Gyani, J.: Privacy preserving associative classification on vertically partitioned databases. In: IEEE International Conference on Advanced Communication Control and Computing Technologies (ICACCCT), pp. 188–192 (2012)
Raju, R., Komalavalli, R., Kesavakumar, V.: Privacy maintenance collaborative data mining: a practical approach. In: 2nd International Conference on Emerging Trends in Engineering and Technology (ICETET), pp. 307–311 (2009)
Sachan, A., Roy, D., Arun, P.V.: An analysis of privacy preservation techniques in data mining. In: Advances in Computing and Information Technology, vol. 3, pp. 119–128. Springer, Berlin (2013)
Samarati, P.: Protecting respondents’ identities in microdata release. IEEE Trans. Knowl. Data Eng. (TKDE) 13(6), 1010–1027 (2001)
Sathiyapriya, K., Sadasivam, G.S.: A survey on privacy preserving association rule mining. Int. J. Data Min Knowl. Manag. Process 3(2), 119–131 (2013)
Seisungsittisunti, B., Natwichai, J.: Achieving k-anonymity for associative classification in incremental-data scenarios. In: Security-Enriched Urban Computing and Smart Grid, pp. 54–63. Springer, Berlin (2011)
Shrivastava, R., Awasthy, R., Solanki, B.: New improved algorithm for mining privacy—preserving frequent itemsets. Int. J. Comp. Sci. Inform. 1, 1–7 (2011)
Singh, M.D., Krishna, P.R., Saxena, A.: A cryptography based privacy preserving solution to mine cloud data. In: Proceedings of Third Annual ACM Bangalore Conference. ACM (2010)
Soodejani, A.T., Hadavi, M.A., Jalili, R.: k-anonymity-based horizontal fragmentation to preserve privacy in data outsourcing. In: Data and Applications Security and Privacy XXVI, pp. 263–273. Springer, Berlin (2012)
Sweeney, L.: Achieving k-anonymity privacy protection using generalization and suppression. Int. J. Uncertain Fuzziness Knowl. Based Syst. 10(5), 571–588 (2002)
Tai, C.-H., Huang, J.-W., Chung, M.-H.: Privacy preserving frequent pattern mining on multi-cloud environment. In: 2013 International Symposium on Biometrics and Security Technologies (ISBAST) (2013)
Tassa, T.: Secure mining of association rules in horizontally distributed databases. IEEE Trans. Knowl. Data Eng. 26(4), 970–983 (2014)
Vaidya, J., Clifton, C., Kantarcioglu, M., Patterson, A.S.: Privacy-preserving decision trees over vertically partitioned data. ACM Trans. Knowl. Discov. Data 2(3), 1–27 (2008)
Vatsalan, D., Christen, P., Verykios, V.S.: A taxonomy of privacy-preserving record linkage techniques. Inf. Syst. 38(6), 946–969 (2013)
Vijayarani, S., Tamilarasi, A., Seethalakshmi, R.: Privacy preserving data mining based on association rule: a survey. In: IEEE International Conference on Communication and Computational Intelligence (INCOCCI) (2010a)
Vijayarani, S., Tamilarasi, A., Sampoorna, M.: Analysis of privacy preserving k-anonymity methods and techniques. In: IEEE International Conference on Communication and Computational Intelligence (INCOCCI), pp. 540–545 (2010b)
Wang, H., Hu, C., Liu, J.: Distributed mining of association rules based on privacy- preserved method. In: International Symposium on Information Science & Engineering (ISISE), pp. 494–497 (2010)
Wang, K., Yu, P.S., Chakraborty, S.: Bottom-up generalization: a data mining solution to privacy protection. In: IEEE Fourth International Conference on Data Mining (ICDM’04) (2004)
Weng, C., Chen, S., Lo, H.: A novel algorithm for completely hiding sensitive association rules. In: Eighth International Conference on Intelligent Systems Design and Applications, ISDA’08, vol. 3, pp. 202–208 (2008)
Worku, S.G., Xu, C., Zhao, J., He, X.: Secure and efficient privacy-preserving public auditing scheme for cloud storage. Comput. Electr. Eng. 40(5), 1703–1713 (2014)
Xiong, L., Chitti, S., Liu, L.: k nearest neighbor classification across. In: Proceedings of the 15th ACM International Conference on Information & Knowledge Management CIKM’06, pp. 840–841 (2006)
Xu, Z., Yi, X.: Classification of privacy-preserving distributed data mining protocols. In: Sixth International Conference on Digital Information Management, pp. 337–342 (2011)
Yi, X., Zhang, Y.: Equally contributory privacy-preserving k-means clustering over vertically partitioned data. Inf. Syst. 38(1), 97–107 (2013)
Ying-hua, L., Bing-ru, Y., Dan-yang, C., Nan, M.: State-of-the-art in distributed privacy preserving data mining. In: IEEE 3rd International Conference Communication Software and Networks, pp. 545–549 (2011)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Sharma, S., Ahuja, S. (2019). Privacy Preserving Data Mining: A Review of the State of the Art. In: Yadav, N., Yadav, A., Bansal, J., Deep, K., Kim, J. (eds) Harmony Search and Nature Inspired Optimization Algorithms. Advances in Intelligent Systems and Computing, vol 741. Springer, Singapore. https://doi.org/10.1007/978-981-13-0761-4_1
Download citation
DOI: https://doi.org/10.1007/978-981-13-0761-4_1
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-0760-7
Online ISBN: 978-981-13-0761-4
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)