IJRIT International Journal of Research in Information Technology, Volume 3, Issue 5, May 2015, Pg.26-34

International Journal of Research in Information Technology (IJRIT) www.ijrit.com

ISSN 2001-5569

Implementing Security to information using privacy preserving data mining Miss. Sonali P. Mahindre Dept. of Computer Sci. & Engineering Amravati, Maharashtra, India [email protected] Prof. Sangram S. Dandage Dept. of Computer Sci. & Engineering PRMIT&R, Badnera, Maharashtra, India [email protected]

Abstract: Rapidly growing use and development of data mining technologies bring serious issues to the security of individual's vital and sensitive information. An emerging research topic in data mining, known as privacy- preserving data mining (PPDM), has been extensively studied in recent years. The basic idea of PPDM is to modify the data in such a way so as to perform data mining algorithms effectively without compromising the security of sensitive information contained in the data. In this paper, we view the privacy issues related to data mining from a wider perspective and investigate various approaches that can help to protect sensitive information. In particular, we identify four different types of users involved in data mining applications, namely, data provider, data collector, data miner, and decision maker. For each type of user, we discuss his privacy concerns and the methods that can be adopted to protect sensitive information. We briery introduce the basics of related research topics, review state-of-the-art approaches, and present some preliminary thoughts on future research directions. Besides exploring the privacypreserving approaches for each type of user, we also review the game theoretical approaches, which are proposed for analyzing the interactions among different users in a data mining scenario, each of whom has his own valuation on the sensitive information. By differentiating the responsibilities of different users with respect to security of sensitive information, we would like to provide some useful insights into the study of PPDM.

Keywords — Big data, Data mining, privacy-preserving data mining, game theory, KDD.

Full text: https://sites.google.com/a/ijrit.com/abstracts/may5/V3I525.pdf

Miss. Sonali P. Mahindre, IJRIT-1

Implementing Security to information using privacy preserving data ...

Abstract: Rapidly growing use and development of data mining technologies bring serious issues to the security of individual's vital and sensitive information. An emerging research topic in data mining, known as privacy- preserving data mining (PPDM), has been extensively studied in recent years. The basic idea of PPDM ...

123KB Sizes 1 Downloads 235 Views

Recommend Documents

Privacy-Preserving Incremental Data Dissemination
In this paper, we consider incremental data dissemination, where a ..... In other words, the data provider must make sure that not only each ...... the best quality datasets, these data are vulnerable to inference attacks as previously shown.

Data Traceability and Privacy Preserving and Accountability for Data ...
verification, they describes three network entities i.e. client which is user, cloud storage server which is handled by cloud service provider and Third party auditor which is verifier.TPA having public key, it is act with only trusted server, they a

Privacy Preserving ID3 using Gini Index over ...
Jul 22, 2006 - information to each other, while the database is horizontally partitioned over two or more parties. Three secure ... data mining to classify the information is ID3(Iterative Di- chotomizer 3) algorithm by which a decision tree is .....

Privacy Preserving Public Auditing for Secure Cloud Storage Using TPA
the task of allowing a third party auditor (TPA), on behalf of the cloud client, to verify the integrity of the dynamic data stored in the cloud. To securely introduce an ...

Privacy Preserving and Scalable Processing of Data ...
tremendously in accordance with the Big Data trend, thereby making it a challenge for commonly-used software tools to capture, manage and process such large ... most important research topics in data security field and it have become a serious concer

Privacy Preserving and Scalable Processing of Data ...
tremendously in accordance with the Big Data trend, thereby making it a ... Cloud computing is a model for enabling convenient, on-demand network access to a .... We briefly review recent research on data privacy preservation and privacy ...

Slicing: A New Approach for Privacy Preserving Data ...
Computer Science at Purdue University, West Lafayette, IN 47906. E-mail: {li83, ninghui ..... be an original tuple, the matching degree between t and B is the product of ...... online privacy protection, privacy-preserving data publishing, and oper-.

PDF Download Healthcare Information Privacy and Security ...
PDF Download Healthcare Information Privacy ... that include: * Identity and access management systems * Proper application design * Physical and.

KAPDA: k-Anonymous Privacy-preserving Data ...
Wireless Sensor Networks, Privacy Preserving Data Aggre- gation, k-Anonymity ... This incurs a high overhead and does not preserve data ..... 16 bits and runs at a speed of 4 MHz. To determine ..... Routing for Anonymous and Private Internet.

Oruta Privacy-Preserving Public Auditing for Shared Data in the ...
Oruta Privacy-Preserving Public Auditing for Shared Data in the Cloud.pdf. Oruta Privacy-Preserving Public Auditing for Shared Data in the Cloud.pdf. Open.

Data Traceability and Privacy Preserving and ...
1PG Scholar, Computer Science And Engineering, Lakkireddy Balireddy College ... since services in Cloud Computing are not limited to archive or backup data only. ... Using my traceability model, it is possible to trace the history of data to find.

Scalable Privacy-Preserving Data Mining with ...
Abstract. In the Naıve Bayes classification problem using a vertically partitioned dataset, the conventional scheme to preserve privacy of each partition uses a secure scalar product and is based on the assumption that the data is synchronised among

PDF Download Implementing Information Security in Healthcare ...
Implementing Information Security in Healthcare: Building a Security Program offers ... comprehensive look at healthcare security concerns in an era of powerful ...

MobiShare: Flexible Privacy-Preserving Location ...
ests, habits, and health conditions, especially when they are in ... Electronic Frontier Foundation (EFF), can provide the location .... tower keeps a record of A's current location in its user info ..... Social serendipity: Mobilizing social softwar

Privacy Preserving Support Vector Machines in ... - GEOCITIES.ws
public key and a signature can be used. .... authentication code (MAC) which is derived from the ... encryption-decryption and authentication to block the.

Privacy-Preserving Protocols for Perceptron ... - Semantic Scholar
the case of client-server environment, and it is assumed that the neural ... Section 4 is dedicated ... preserving protocol neural network for client-server environ-.

Privacy-Preserving Protocols for Perceptron ... - Semantic Scholar
School of Information Technology and. Engineering (SITE). University ... to the best of our knowledge, there is no privacy-preserving technique to collaboratively ...