Privacy Preserving Data Mining
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Review Papers | Information Technology | India | Volume 4 Issue 3, March 2015

Privacy Preserving Data Mining

Divya Rana

There is a tremendous increase in the research of data mining. Data mining is the process of extraction of data from large database. Knowledge Discovery in database (KDD) is another name of data mining. Privacy protection has become a necessary requirement in many data mining applications due to emerging privacy legislation and regulations. One of the most important topics in research community is Privacy Preserving Data Mining (PPDM). Privacy preserving data mining (PPDM) deals with protecting the privacy of individual data or sensitive knowledge without sacrificing the utility of the data. The Success of Privacy Preserving data mining algorithms is measured in terms of its performance, data utility, level of uncertainty or resistance to data mining algorithms etc. In this paper we will review on various privacy preserving techniques like Data perturbation, condensation etc.

Keywords: Data Mining, Privacy Preserving, KDD

Edition: Volume 4 Issue 3, March 2015

Pages: 1895 - 1898

Share this Article

How to Cite this Article?

Divya Rana, "Privacy Preserving Data Mining", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB152477, Volume 4 Issue 3, March 2015, 1895 - 1898

149 PDF Views | 118 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Data Mining'

Research Paper, Information Technology, India, Volume 4 Issue 6, June 2015

Pages: 2493 - 2496

An Effective Up-Growth Algorithm for Discovering High Utility Itemset Mining

Anuja Palhade, Rashmi Deshpande

Share this Article

Survey Paper, Information Technology, India, Volume 6 Issue 3, March 2017

Pages: 1403 - 1405

Inverse Problem with Solution Using Data Mining

Ashmikumari Shah, Pooja Jardosh

Share this Article

| Weekly Popularity: ⮙4

Research Paper, Information Technology, India, Volume 3 Issue 6, June 2014

Pages: 1654 - 1660

Privacy Preserving Protocol for Two-Party Classifier Over Vertically Partitioned Dataset Using ANN

Smitha Iddalgave, Sumana M

Share this Article

| Weekly Popularity: ⮙3

Research Paper, Information Technology, India, Volume 3 Issue 12, December 2014

Pages: 1896 - 1900

Determining and Exploring Dimensions in Subspace Clustering for Value Decomposition

Saranya Sagambari Devi.S

Share this Article

| Weekly Popularity: ⮙3

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 1076 - 1079

Parallelizing Coherent Rule Mining Algorithm on CUDA

Aditya A. Davale, Shailendra W. Shende

Share this Article

Similar Articles with Keyword 'Privacy Preserving'

| Weekly Popularity: ⮙4

Research Paper, Information Technology, India, Volume 3 Issue 6, June 2014

Pages: 1654 - 1660

Privacy Preserving Protocol for Two-Party Classifier Over Vertically Partitioned Dataset Using ANN

Smitha Iddalgave, Sumana M

Share this Article

| Weekly Popularity: ⮙1

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 3 Issue 5, May 2014

Pages: 1844 - 1847

Privacy Preserving in Participatory Sensing

Deepika Nair, Bhuvaneswari Raju

Share this Article

Comparative Studies, Information Technology, India, Volume 5 Issue 4, April 2016

Pages: 2013 - 2019

Comprehensive Research on Privacy Preserving Emphasizing on Distributed Clustering

Prajna M.S., Sumana M.

Share this Article

| Weekly Popularity: ⮙3

Review Papers, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 1895 - 1898

Privacy Preserving Data Mining

Divya Rana

Share this Article

Research Paper, Information Technology, India, Volume 8 Issue 3, March 2019

Pages: 318 - 322

A Privacy Preserving Mechanism for Integrity Auditing and Data Sharing

R. Ramya Devi, R. Rangeela, S. Shalini, R. Sankara Narayanan

Share this Article

Similar Articles with Keyword 'KDD'

| Weekly Popularity: ⮙5

Survey Paper, Information Technology, India, Volume 3 Issue 6, June 2014

Pages: 1479 - 1482

Analysis of NSL-KDD Dataset for Fuzzy Based Intrusion Detection System

Macdonald Mukosera, Thabiso Peter Mpofu, Budwell Masaiti

Share this Article

| Weekly Popularity: ⮙3

Review Papers, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 1895 - 1898

Privacy Preserving Data Mining

Divya Rana

Share this Article

| Weekly Popularity: ⮙2

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 2, February 2015

Pages: 2301 - 2303

Diagnosis of Heart Disease Using Data Mining Technique

Shinde S. B., Amrit Priyadarshi

Share this Article

Research Paper, Information Technology, Iraq, Volume 4 Issue 7, July 2015

Pages: 328 - 333

An Efficient Approach for DW Design and DM in Crime Data Set

Kadhim B. S. Aljanabi

Share this Article
Top