We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

A Survey of Cryptographic and Non-cryptographic Techniques for Privacy Preservation

by Bhawani Singh Rathore, Anju Singh, Divakar Singh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 130 - Number 13
Year of Publication: 2015
Authors: Bhawani Singh Rathore, Anju Singh, Divakar Singh
10.5120/ijca2015907146

Bhawani Singh Rathore, Anju Singh, Divakar Singh . A Survey of Cryptographic and Non-cryptographic Techniques for Privacy Preservation. International Journal of Computer Applications. 130, 13 ( November 2015), 7-10. DOI=10.5120/ijca2015907146

@article{ 10.5120/ijca2015907146,
author = { Bhawani Singh Rathore, Anju Singh, Divakar Singh },
title = { A Survey of Cryptographic and Non-cryptographic Techniques for Privacy Preservation },
journal = { International Journal of Computer Applications },
issue_date = { November 2015 },
volume = { 130 },
number = { 13 },
month = { November },
year = { 2015 },
issn = { 0975-8887 },
pages = { 7-10 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume130/number13/23267-2015907146/ },
doi = { 10.5120/ijca2015907146 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:25:25.615478+05:30
%A Bhawani Singh Rathore
%A Anju Singh
%A Divakar Singh
%T A Survey of Cryptographic and Non-cryptographic Techniques for Privacy Preservation
%J International Journal of Computer Applications
%@ 0975-8887
%V 130
%N 13
%P 7-10
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cryptography is to become familiar with the requirement of large, complex, information rich data sets for it’s privacy preservation. The privacy preserving data mining has been generated; to go through the concept of privacy in data mining is hard. Several algorithms and approaches are being generated theoretically, but practically it is hard. Privacy in data mining can be achieved through several techniques such as Perturbation, Anonymization and Cryptographic. Here in this paper tries to reiterate several Privacy Preserving Data Mining (PPDM) techniques presently developed to cope up with the privacy issues in the process of data mining. In this paper there is a survey of various cryptographic & non-cryptographic techniques too.

References
  1. Murat Kantarcioglu, Chris Clifton, "Privacy Preserving Distributed Mining of Association Rules on Horizontally Partitioned Data", IEEE Transactions on Knowledge and Data Engineering, Vol. 16, No. 9, pp. 1026 – 1037, 2004.
  2. Shariq J. Rizvi, Jayant R. Haritsa, Maintaining Data Privacy in Association Rule Mining.
  3. SHEN Yangguang, SHAO Hui, YANG Li. Privacy Preserving c4.5 algorithm over vertically distributed datasets[[C]II Proc of the 2009 Int'! Conf. on Networks Security,2009(2): 446-448.
  4. P J MODI, P W T KIM. Classification of Examples by Multiple Agents with Private Features[C]II Proc of 2005 IAT, Washington DC, 2005:223-229.
  5. S Mukherjeea, M Banerjeea, Chen Zhiyuan, A privacy preserving technique for distance-based classification with worst case privacy guarantees[J]. Data & Knowledge Engineering,2008,66(2):264-288
  6. J VAIDYA,M Kantarcioglou,C CLIFTON. Privacy preserving naïve Bayes classification[J]. The VLDB Journal, 2007,17(4):879-898.
  7. Ivan Damgard and Yuval Ishai. Constant-round multiparty computation using a black- ˚ box pseudorandom generator. In Proc. of CRYPTO ’05, volume 3621 of LNCS, pages 378–394. Springer, 2005.
  8. Martin Geisler. Cryptographic Protocols: Theory and Implementation. PhD thesis, Aarhus University, 2010.
  9. Peter Bogetoft, Ivan Damgard, Thomas Jakobsen, Kurt Nielsen, Jakob Pagter, and ˚ Tomas Toft. A practical implementation of secure auctions based on multiparty integer computation. In Proc. of Financial Cryptography ’06, volume 4107 of LNCS, pages 142–147. Springer, 2006.
  10. Martin Burkhart, Mario Strasser, Dilip Many, and Xenofontas Dimitropoulos. SEPIA: privacy-preserving aggregation of multi-domain network events and statistics. In Proc. of USENIX conference on Security, pages 15–15. USENIX Association, 2010.
  11. Dahlia Malkhi, Noam Nisan, Benny Pinkas, and Yaron Sella. Fairplay - secure twoparty computation system. In Proc. of USENIX Security Symposium, pages 287–302, 2004.
  12. Wilko Henecka, Stefan Kogl, Ahmad-Reza Sadeghi, Thomas Schneider, and Immo ¨ Wehrenberg. TASTY: tool for automating secure two-party computations. In Proc. of CCS ’10, pages 451–462. ACM, 2010.
  13. Janus Dam Nielsen. Languages for Secure Multiparty Computation and Towards Strongly Typed Macros. PhD thesis, Aarhus University, 2009.
  14. Amit Kumar Jha and Divakar Singh ,"A Survey of Cloud Computing Service and Privacy Issues," Advances in Computer Science and Information Technology (ACSIT), Volume 1, Number 2; November, 2014 pp. 4-8.
  15. Ashish Chouhan and Dr.Anju Singh ,"Privacy Preserving Data Mining: A Survey on Anonymity," International Journal of Electrical, Electronics and Computer Engineering 4(1): 82-92 (2015).
  16. A. V. Evfimievski, R. Srikant, R. Agrawal, and J. Gehrke. Privacy preserving mining of association rules. In Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pages 217–228, 2002
  17. . L. Franconi and G. Merola, Implementing Statistical Disclosure Control for Aggregated Data Released Via Remote Access, Working Paper No. 30, United Nations Statistical Commission and European Commission, joint ECE/EUROSTAT work session on statistical data confidentiality, April, 2003, available at http://www.unece.org/stats/documents/2003/04/confidentiality/wp.30.e.pdf
  18. . A. V. Evfimievski, J. Gehrke and R. Srikant, Limiting privacy breaches in privacy preserving data mining, Proceedings of the Twenty-Second ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, pp. 211-222, 2003.
  19. X.-Y. Chang, D.-L. Deng, X.-X. Yuan, P.-Y. Hou, Y.-Y. Huang and L.-M. Duan," Experimental realization of secure multi-party computation in an entanglement access network," arxiv, 2015.
  20. Rohit Kutty, Srikanth Ravee, Sanchi Ubale and Amruta Sankhe," An Innovating Approach To Data Security," International Journal of Science, Technology & Management, Volume No.04, Issue No. 02, February 2015.
Index Terms

Computer Science
Information Sciences

Keywords

Privacy Privacy Preservation Cryptography Anonymization Data Mining Randomization.