A SURVEY ON PRIVACY PRESERVING DATA MINING TECHNIQUES

poorani sampath

Abstract


Many kinds of anonymization techniques have been in the subject of research. This paper will present a detailed review of several anonymization techniques particularly in the area called “Privacy Preserved Data Miningâ€. Recent experiments shown that some of the anonymization techniques like generalization, bucketization doesn’t ensure the privacy preservation. And it is experimentally shown that slicing provides significant level of utility and also prevents membership disclosure. Thus, detailed analysis is done on the Post anonymization techniques and the necessity for privacy preservation is also reviewed in detail.


Keywords


ANONYMIZATION TECHNIQUES;PRIVACY PRESERVATION; DATA UTILITY;PPDM

Full Text:

PDF

References


Raymond Chi-Wing Wong et al., “(alpha, k) Anonymity: An Enhanced k- anonymity Model for Privacy Preserving Data Publishingâ€, ACM, 2006.

Xiaokui Xiao, Yufei Tao, “Anatomy: Simple and Effective Privacy Preservationâ€, ACM, 2006.

David J.Martin et al., “Worst–Case Background Knowledge for Privacy-Preserving Data Publishingâ€, National Science Foundation under Grants.

Q. Zhang et al., “Aggregate Query Answering on Anonymized Tablesâ€, In ICDE, 2007.

Tiancheng Li et al., “Slicing: A New Approach to Privacy Preserving Data Publishingâ€, ACM.

Tiancheng Li and Ninghui Li, “On the Trade off between Privacy and Utility in Data Publishingâ€, ACM 2009.

Jiyoung Li et al.,â€Information Based Data Anonymization for classification utilityâ€, Elsevier, 2011.

Jian Xu et al.,â€Utility-Based Anonymization Using Local recodingâ€, ACM 2006.

Raymond Chi-Wing Wong et al., “Minimality Attack in Privacy Preserving Data Publishingâ€, ACM, 2007.

Kristen Le Fevre and Raghu Ramakrishnan, “Workload-Aware Anonymization Techniques for Large-Scale Datasetsâ€, ACM, 2008.

Rakesh Agarwal et al., “Privacy-preserving Data Miningâ€, ACM SIGMOD Conference on Management of Data, 2000.

G. Sai Chaitanya Kumar et al., “Suppression of Multidimensional Data Using K-anonymityâ€, International Journal of Computer Science and Communication Networks, Vol 2(4), 501-505.

Ali Inan, Murat Kantarcioglu, Elisa Bertino, “Using Anonymized Data for Classificationâ€, AFOSR.

Benjamin C.M. Fung et al., “Anonymizing Classification Data for Privacy Preservationâ€, IEEE.

Patrick Sharkey et al., “Privacy-Preserving Data Mining through Knowledge Model Sharingâ€, NSF.

Aris Gkoulalas-Divanis, Grigorios Loukides “PCTA: Privacy-constrained Clustering-based Transaction Data Anonymizationâ€, ACM 2011.

L.Sweeney,â€Guarenteeing Anonymity When Sharing Medical Data, the Datafly System†Journal of Informatics Association, pages 51-55, 1997.

Neha V. Mogre, Girish Agarawal, Pragati Patil, “A Review On Data Anonymization Technique For Data Publishingâ€, IJERT, 2012.

L.Kaufman and P. Rousueeuw, “Finding Groups in Data: An Introduction to Cluster Analysisâ€, John Wiley & Sons, 1990.

G.Ghinita et al.,â€On the Anonymization of sparse high-dimensional dataâ€, In ICDE, pages 205-216, 2005.

K.LeFevre et al., “Mondrian multidimensional k-anonymityâ€, In ICDE, page 25, 2006.

Y. Xu, K. Wang, A.W.C.Fu, and P. S. Yu, “Anonymizing transaction database for publicationâ€, In KDD, pages 767-775,2008.

H.Wang, R.Liu, “Privacy-preserving publishing micro data with full functional dependenciesâ€, Data & Knowledge Engineering, 2011.

L.Sweeney, “k-anonymity: A model for protecting privacyâ€, International Journal on uncertainty, Fuzziness and knowledge based systems, 2002.

K.Wang and B.Fung, “Anonymizing sequential releasesâ€, In SIGKDD, 2006.

X.Xiao and Y.Tao,â€Personalized Privacy Preservationâ€, In Sigmoid, 2006.

G. Agarwal et al., “Anonymizing tablesâ€, In ICDT, pages 246-258, 2005.

Agarwal et al., “A framework for high-accuracy privacy-preserving miningâ€, IEEE, 2005.

Srikant et al., “Limiting privacy breaching in Privacy Preserving Data Miningâ€, ACM, 2003.

V.S.Iyengar,â€Transforming data to satisfy privacy constraintsâ€, In KDD, 2002.

J. Li, R.Wong, A. Fu, and J.Pei,†Acheiving anonymity by clustering in attribute hierarchical structuresâ€, In DaWak, pages 405-416, 2006.

B.C.M Fung, K.Wang, and P.S.Yu,â€Top-down Specialization for Information and Privacy Preservationâ€, In ICDE, 2005.

K.Wang et al., “Bottom-up Generalization: A data mining solution to privacy protectionâ€, In ICDM, 2004.

P.Samarati, “Protecting Respondents’ Identities in Microdata Releaseâ€, IEEE, 2001.

K.Levere et al., “Incognito: Efficient Full-Domain k-anonymityâ€, ACM, 2005.


Refbacks

  • There are currently no refbacks.


ISSN: 1694-2507 (Print)

ISSN: 1694-2108 (Online)