2016
DOI: 10.5120/ijca2016909006
|View full text |Cite
|
Sign up to set email alerts
|

Privacy Preserving Data Mining: Techniques, Classification and Implications - A Survey

Abstract: Privacy has become crucial in knowledge based applications. Proper integration of individual privacy is essential for data mining operations. This privacy based data mining is important for sectors like Healthcare, Pharmaceuticals, Research, and Security Service Providers, to name a few. The main categorization of Privacy Preserving Data Mining (PPDM) techniques falls into Perturbation, Secure Sum Computations and Cryptographic based techniques. There exist tradeoffs between privacy preservation and informatio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
27
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 22 publications
(27 citation statements)
references
References 51 publications
0
27
0
Order By: Relevance
“…Therefore, data security should be correlated with data privacy because the former is a requirement of the latter. Privacy is specific, and can be achieved by hiding people's identity or screening personal information that may result in the people's recognition [25].…”
Section: Ppdmmentioning
confidence: 99%
See 2 more Smart Citations
“…Therefore, data security should be correlated with data privacy because the former is a requirement of the latter. Privacy is specific, and can be achieved by hiding people's identity or screening personal information that may result in the people's recognition [25].…”
Section: Ppdmmentioning
confidence: 99%
“…PPDM has recently garnered considerable interest among academics and designers. Consequently, several methods have been developed to protect privacy or far-reaching policies have been imposed for sensitive data protection [12], [21], [25]. The form of privacy varies depending on the data used and the way they are used; hence, many methods are used to provide privacy [25].…”
Section: Ppdmmentioning
confidence: 99%
See 1 more Smart Citation
“…It is also important to design good metrics that can better reflect the properties of a PPDMalgorithm, and to develop benchmark databases for testing all types of PPDM algorithms. Alpa Shah, Ravi Gulati [1], in the article have tried to classify the PPDM techniques available in the literature and showed its implications best suited under various scenarios. Currently no such technique that provides the best solutions under different scenarios exists.…”
Section: IImentioning
confidence: 99%
“…In this paper, privacy preserving techniques [1], [6], [7], has been classified based on the data lifecycle phases such as data collection, data publishing, and at the output of data mining.…”
Section: Types Of Ppdm Techniquesmentioning
confidence: 99%