CFP last date
20 January 2025
Reseach Article

Privacy Preserving Data Mining Techniques in a Distributed Environment

by Mona Shah, Hiren D. Joshi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 94 - Number 6
Year of Publication: 2014
Authors: Mona Shah, Hiren D. Joshi
10.5120/16347-5687

Mona Shah, Hiren D. Joshi . Privacy Preserving Data Mining Techniques in a Distributed Environment. International Journal of Computer Applications. 94, 6 ( May 2014), 21-27. DOI=10.5120/16347-5687

@article{ 10.5120/16347-5687,
author = { Mona Shah, Hiren D. Joshi },
title = { Privacy Preserving Data Mining Techniques in a Distributed Environment },
journal = { International Journal of Computer Applications },
issue_date = { May 2014 },
volume = { 94 },
number = { 6 },
month = { May },
year = { 2014 },
issn = { 0975-8887 },
pages = { 21-27 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume94/number6/16347-5687/ },
doi = { 10.5120/16347-5687 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:16:53.361695+05:30
%A Mona Shah
%A Hiren D. Joshi
%T Privacy Preserving Data Mining Techniques in a Distributed Environment
%J International Journal of Computer Applications
%@ 0975-8887
%V 94
%N 6
%P 21-27
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Data storing and retrieving has been important since decades in the world of information. It makes this process prolific, when the retrieved information becomes smartly meaningful. Data mining is this new flavor. In the recent years data mining is a wide spread and active area of research. Its meaningfulness has gained momentum due to its vast area of applications. One of the popular and potential sub-areas of data mining is preserving privacy while mining. Data mining tools bring a factor of threat to the data under study for subjects like medical history, banking/credit card details, judicial matters and a few more. In such sectors, the data can be sensitive and personal. Protecting such data becomes the key factor during the process of mining. Here is an attempt to study the techniques used to address the issue of privacy preserving data mining in a distributed database environment in the last decade.

References
  1. Sweeney L. 2002 K-anonymity: A model for protecting Journal on Uncertainty, fuzziness and Knowledge based systems.
  2. Cooper g. and Herskovits E. 1992 A Bayesian Method for the Induction of Probabilistic Networks from Data. Machine Learning, vol. 9, no. 4, pp. 309-347
  3. Yang Z. and Wright R. N. Member IEEE 2006 Privacy-Preserving Computation of Bayesian Networks on Vertically Partitioned Data. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 18, NO. 9
  4. Vaidya J. and Clifton C. 2002 Privacy Preserving Association Rule Mining in Vertically Partitioned Data. In Proceedings of SIGKDD 2002, Edmonton, Alberta, Canada.
  5. Gurevich A. and Gudes E. 2006 Privacy preserving Data Mining Algorithms without the use of Secure Computation or Perturbation. 10th International Database Engineering and Applications Symposium (IDEAS'06), IEEE.
  6. Siu Man Lu and Qiu L. 2007 Individual Privacy and Organizational Privacy in Business Analytics Proceedings of the 40th Annual Hawaii International Conference on System Sciences (HICSS'07), IEEE
  7. Vladimir Estivill-Castro Ahmed HajYasien 2007 Fast Private Association Rule Mining by A Protocol for Securely Sharing Distributed Data" IEEE.
  8. Guang Li and Yadong W. 2011 Privacy-Preserving Data Mining Based on Sample Selection and Singular Value Decomposition, International Conference on Internet Computing and Information Services.
  9. Yang X. , Liu Y. , Zhan L, and Jiajie M. 2011 Privacy Preserving Naïve Bayesian Classifier Based on Transition Probability Matrix. Seventh International Conference on Computational Intelligence and Security.
  10. Zhang N. , Ming L. and Wenjing L. 2011 Distributed Data Mining with Differential Privacy. IEEE.
  11. Emekci F. ,Sahin O. D. , Agrawal, A. and El Abbadi, 2007 Privacy preserving decision tree learning over multiple parties
  12. Shamir A. 1979 How to share a secret. Communications of ACM.
  13. Lindell Y. and Pinkas B. 2002 Privacy preserving data mining. Journal of Cryptology 15 (3) (2002) 177–206.
  14. Pinkas B. 2003 Cryptographic techniques for privacy-preserving data mining. SIGKDD Explorations.
  15. Matatov N. , Rokach L. and Maimon O. 2010 Privacy-preserving data mining: A feature set partitioning approach.
  16. Yi X. and Zhang Y. 2008 Privacy-preserving naive Bayes classification on distributed data via semi-trusted mixers. Information Systems
  17. Zhang N, Wang S. and Zhao W. 2005 A new scheme on privacy-preserving data classification. In Proceedings of KDD'05.
  18. Gilburd B. , Schuster A. and Wolff R. 2004 k-TTP: A New Privacy Model for Large-Scale Distributed Environments. ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD'04), Seattle, WA, USA.
  19. Kianmehr K. and Koochakzadeh N. 2012 Privacy-Preserving Ranking over Vertically Partitioned Data. PAIS 2012, Berlin, Germany.
  20. Vaidya J. , Kantarc?oglu M. and Clifton C. 2008 Privacy-preserving Naïve Bayes classification. The VLDB Journal. Kantarcioglu M. and Vaidya, J. 2003 Privacy preserving naive Bayes classifier for horizontally partitioned data. in: Proceedings of IEEE Workshop on Privacy Preserving Data Mining.
Index Terms

Computer Science
Information Sciences

Keywords

Data mining privacy preserving distributed database data security