Technical Symposium on Emerging Technologies in Computer Science |
Foundation of Computer Science USA |
TSETCS2016 - Number 2 |
June 2016 |
Authors: Aparna Shinde, Khushboo Saxena, Amit Mishra, Shiv K. Sahu |
6791722a-421d-49c6-a77b-a70a6340cbcf |
Aparna Shinde, Khushboo Saxena, Amit Mishra, Shiv K. Sahu . A Brief Survey on Different Privacy Preserving Techniques. Technical Symposium on Emerging Technologies in Computer Science. TSETCS2016, 2 (June 2016), 1-4.
As data mining is used to extract valuable information from large amount of data. But this is harmful in some cases so some kind of protection is required for sensitive information. So privacy preserving mining is emerge with the goal to provide protection from mining. There are many research branches in this area. This paper focus on analyzing different techniques of privacy persevering and specify there requirement for special type of cases.