2016
DOI: 10.5120/ijca2016910381
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-Preserving Distributed Data Mining Techniques: A Survey

Abstract: In various distributed data mining settings, leakage of the real data is not adequate because of privacy issues. To overcome this problem, numerous privacy-preserving distributed data mining practices have been suggested such as protect privacy of their data by perturbing it with a randomization algorithm and using cryptographic techniques.In this paper, we review and provide extensive survey on different privacy preserving data mining methods and analyses the representative techniques for privacy preserving d… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

1
2
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(3 citation statements)
references
References 21 publications
1
2
0
Order By: Relevance
“…Similar kind of work was found in [24]. Clifton et al [25] presented tool for PPDDM (Privacy Preserving Distributed Data Mining). The tools include secure multi-party computation, secure sum, secure set union, secure size of set intersection, and scalar product.…”
Section: Related Worksupporting
confidence: 55%
“…Similar kind of work was found in [24]. Clifton et al [25] presented tool for PPDDM (Privacy Preserving Distributed Data Mining). The tools include secure multi-party computation, secure sum, secure set union, secure size of set intersection, and scalar product.…”
Section: Related Worksupporting
confidence: 55%
“…Privacy-Preserving Distributed Data Mining (PPDDM) focuses on distributed data analysis without leaking sensitive information from one party to another. PPDDM technology aims to make it technically or mathematically impossible to derive the original data from communication messages and even from the final analysis results [7], [8]. There are three issues in PPDDM for real-world applications.…”
Section: Introductionmentioning
confidence: 99%
“…Privacypreservingtechniquesareintroducedforavoidingsensitiveinformation(PawarandAnuradha,2020 ;Jadhav et al, 2016). Asymmetric and symmetric encryption are the traditional tools to protect privacy,andisbroadlyutilizedforpreventingtheunauthorizedusersaccessingsensitiveinformation transmitted through the networks (Baby and Chandra, 2016). Identifying anomalous behavior of thephysicalprocesswithrespecttofaultidentificationwherebothcyber-attacksandfaultsproduce anomalyinthephysicalprocess.Moreover,thepatternsofcyber-attacksaswellasfaultsaredifferent andhence,theattacksarenottreatedasfaultsintheCPS (Basile,et al,2006).TheIDSisclassifiedto anomaly-basedandsignature-basedapproaches (VeeraiahandKrishna,2018).Here,theanomalyand signature-enabledIndustrialIDS(IIDS)arecomplementary.However,theSignature-enabledIIDSs removeanddetecttheillegalpacketsintheCPSinwhichtheanomaly-basedIIDSsisutilizedtoextract normalbehaviorandtodetecttheanomaly (Garcia-Teodoro,et al,2009;Liu,2020).Nowadays, thenetworkintrusiondetectionapproachesareprogressedtothehighlysophisticatedlevels,which involvesadvancedsignalprocessingmethods,butthetimeseriesanalysis,wavelets,andtheprincipal componentanalysis,whencomparedtoothertechniques,arenotlimited.Hence,thebroadlyutilized detectorsarenon-signatureandsignaturefordetectingnetworkanomalies (Sadreazami,et al,2017).…”
mentioning
confidence: 99%