Preserving Privacy Technique for Knowledge Discovery
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Review Papers | Computer Science & Engineering | India | Volume 2 Issue 2, February 2013

Preserving Privacy Technique for Knowledge Discovery

Darshan.B. Patel, Dheeraj Kumar Singh

Data mining techniques are becoming more and more important for assisting decision making processes and, more generally, to extract hidden knowledge from massive data collections in the form of patterns, models, and trends that hold in the data collections. During this extraction of hidden knowledge from this massive data collection, privacy of data is a big issue. PPDM (Privacy Preserving Data Mining) approaches protect data by modifying them to mask or erase the original sensitive data that should not be revealed. PPDM approaches based on principle- loss of privacy, measuring the capacity of estimating the original data from the modified data, and loss of information, measuring the loss of accuracy in the data. The main goal of these approaches is therefore to provide a trade-off between privacy and accuracy. In this paper we show that l-diversity has a number of limitations. In particular, it is neither necessary nor sufficient to prevent attribute disclosure. We propose a novel privacy notion called t-closeness, which requires that the distribution of a sensitive attribute in any equivalence class is close to the distribution of the attribute in the overall table (i.e., the distance between the two distributions should be no more than a threshold t).

Keywords: Data mining, PPDM, l-diversity, t-Closeness

Edition: Volume 2 Issue 2, February 2013

Pages: 186 - 190

Share this Article

How to Cite this Article?

Darshan.B. Patel, Dheeraj Kumar Singh, "Preserving Privacy Technique for Knowledge Discovery", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=IJSRON2013434, Volume 2 Issue 2, February 2013, 186 - 190

87 PDF Views | 74 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Data mining'

Research Paper, Computer Science & Engineering, Kenya, Volume 7 Issue 5, May 2018

Pages: 1409 - 1411

Student's Performance Prediction Using FP-Tree Data Mining Techniques

Eliakim Ombati Akama

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1165 - 1168

Privacy Preserving Closed Frequent Pattern Mining

Anju Vijayan

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2214 - 2216

Privacy-Preserving Mining of Association Rules in Cloud

Vishal Ravindra Redekar, Dr. K.N.Honwadkar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1127 - 1129

Trust Checking in Social Networks Using Data Mining

Archa.S

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 2041 - 2047

Adaptive Analysis of Knowledge Engineering and Pattern Recognition on Medical Data

Jani Basha, Dasari. Rajesh

Share this Article

Similar Articles with Keyword 'PPDM'

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2234 - 2236

A Survey on Privacy-Preserving Mining of Association Rule on Databases

Asavari G.Smart, P. M. Mane

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 700 - 702

Privacy-Preserving Two-Party Distributed Association Rules Mining on Horizontally Partitioned Data

Patil Suraj Kakaso, Gadage Shriniwas

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 2084 - 2088

Implementation of Efficient Privacy Preserving Data Analysis for Secure Data Transmission

Shital Gawahale, Rekha Jadhav

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 149 - 152

Analysis and Design of Secured Privacy Data Mining Environment

Gundapaneni Murali, Punugoti Pavan Kumar

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 2 Issue 2, February 2013

Pages: 186 - 190

Preserving Privacy Technique for Knowledge Discovery

Darshan.B. Patel, Dheeraj Kumar Singh

Share this Article

Similar Articles with Keyword 'l-diversity'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1253 - 1257

Implementation Details of Anonymization of Sensitive Labels in Collaborative Data Publishing

Vandhana V

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 1454 - 1457

A Reliable Method for Accuracy Constrained Privacy Preservation for Relational Data

Waghmare Ashwini R, V. M. Jarali

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2347 - 2349

A Survey on Security and Accuracy Constrained Privacy Preserving Task Based Access Control Mechanism for Relational Data

Pratik Bhingardeve, D. H. Kulkarni

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 3, March 2016

Pages: 1694 - 1698

Privacy-Preserving in Data Mining using Anonymity Algorithm for Relational Data

Karan Dave, Chetna Chand

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 11, November 2013

Pages: 306 - 309

Survey on Privacy-Preservation in Data Mining Using Slicing Strategy

Neha Jamdar, Vanita Babane

Share this Article

Similar Articles with Keyword 't-Closeness'

Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 2, February 2017

Pages: 2111 - 2113

Survey Paper on Slicing Concept Used for Privacy Preserving

Vishal Chavan, Ravindra Pal, Jitendra Pal

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 2 Issue 2, February 2013

Pages: 186 - 190

Preserving Privacy Technique for Knowledge Discovery

Darshan.B. Patel, Dheeraj Kumar Singh

Share this Article
Top