Preserving Privacy Technique for Knowledge Discovery
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 128 | Views: 298

Review Papers | Computer Science & Engineering | India | Volume 2 Issue 2, February 2013 | Popularity: 6.4 / 10


     

Preserving Privacy Technique for Knowledge Discovery

Darshan.B. Patel, Dheeraj Kumar Singh


Abstract: Data mining techniques are becoming more and more important for assisting decision making processes and, more generally, to extract hidden knowledge from massive data collections in the form of patterns, models, and trends that hold in the data collections. During this extraction of hidden knowledge from this massive data collection, privacy of data is a big issue. PPDM (Privacy Preserving Data Mining) approaches protect data by modifying them to mask or erase the original sensitive data that should not be revealed. PPDM approaches based on principle- loss of privacy, measuring the capacity of estimating the original data from the modified data, and loss of information, measuring the loss of accuracy in the data. The main goal of these approaches is therefore to provide a trade-off between privacy and accuracy. In this paper we show that l-diversity has a number of limitations. In particular, it is neither necessary nor sufficient to prevent attribute disclosure. We propose a novel privacy notion called t-closeness, which requires that the distribution of a sensitive attribute in any equivalence class is close to the distribution of the attribute in the overall table (i. e. , the distance between the two distributions should be no more than a threshold t).


Keywords: Data mining, PPDM, l-diversity, t-Closeness


Edition: Volume 2 Issue 2, February 2013


Pages: 186 - 190



Make Sure to Disable the Pop-Up Blocker of Web Browser


Text copied to Clipboard!
Darshan.B. Patel, Dheeraj Kumar Singh, "Preserving Privacy Technique for Knowledge Discovery", International Journal of Science and Research (IJSR), Volume 2 Issue 2, February 2013, pp. 186-190, https://www.ijsr.net/getabstract.php?paperid=IJSRON2013434, DOI: https://www.doi.org/10.21275/IJSRON2013434

Similar Articles

Downloads: 94

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1253 - 1257

Implementation Details of Anonymization of Sensitive Labels in Collaborative Data Publishing

Vandhana V

Share this Article

Downloads: 104

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 1454 - 1457

A Reliable Method for Accuracy Constrained Privacy Preservation for Relational Data

Waghmare Ashwini R, V. M. Jarali

Share this Article

Downloads: 109

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 2084 - 2088

Implementation of Efficient Privacy Preserving Data Analysis for Secure Data Transmission

Shital Gawahale, Rekha Jadhav

Share this Article

Downloads: 110

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2347 - 2349

A Survey on Security and Accuracy Constrained Privacy Preserving Task Based Access Control Mechanism for Relational Data

Pratik Bhingardeve, D. H. Kulkarni

Share this Article

Downloads: 111

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 700 - 702

Privacy-Preserving Two-Party Distributed Association Rules Mining on Horizontally Partitioned Data

Patil Suraj Kakaso, Gadage Shriniwas

Share this Article
Top