International Research journal of Management Science and Technology

  ISSN 2250 - 1959 (online) ISSN 2348 - 9367 (Print) New DOI : 10.32804/IRJMST

Impact Factor* - 6.2311


**Need Help in Content editing, Data Analysis.

Research Gateway

Adv For Editing Content

   No of Download : 187    Submit Your Rating     Cite This   Download        Certificate

PRESERVATION OF THE PRIVACY OF ARCHITECTURE AND DATA MINING MODELS

    1 Author(s):  DEVENDRA KUMAR

Vol -  3, Issue- 1 ,         Page(s) : 255 - 265  (2012 ) DOI : https://doi.org/10.32804/IRJMST

Abstract

The preservation of privacy becomes a significant issue in the development of the development of data mining techniques. The privileged conservation of data mining has become increasingly popular, as it allows sharing of confidential data for analysis purposes. As we know, there has been an important research area that the protection of private information or sensitive knowledge will be leaked in the mining process. Our objective to investigate the problems of preservation of privacy was to have a systemic vision of the architectural requirements and the principles of design. This article describes the meaning of data mining, privacy, design architecture for the preservation of privacy, types of privacy preservation, privacy data mining, distortion of privacy data, data encryption and reconstruction techniques in detail.

<span lang="EN-IN">[1] V. Verykios, E. Bertino, I.G. Fovino, L.P. Provenza, Y. Saygin, and Y. Theodoridis, State-of-the-art in Privacy Preserving Data Mining? SIGMOD Record, Vol. 33, No. 1, 50-57, March 2004.

<span lang="EN-IN">[2] Kargupta H, Datta S, Wang Q, Sivakumar K. On the privacy preserving properties of random data perturbation techniques, Proceedings of the IEEE International Conference on Data Mining

<span lang="EN-IN">(ICDM). Melbourne, Florida, 2003: 99-106

<span lang="EN-IN">[3] Moskowitz I S, Chang L W. A decision theoretical based system for information downgrading//Proceedings of the 5th Joint Conference on Information Sciences (JCIS). AtlanticCity, NJ USA, 2000: 82-89

<span lang="EN-IN">[4] VERYKIOS V S, ELMAGARMID A, BERTINO E, et al. Association rule hiding[J].IEEE Trans on Know ledge and Data Engineering,2004,16(4): 434-447

<span lang="EN-IN">[5] Pinkas B. Cryptographic techniques for privacy-preserving datamining· SIGKDD Explorations,2002,4(2)

<span lang="EN-IN">[6] DU Wen-liang, ZHAN Zhi-jun. Building decision tree classifier on private data[C] Proc of IEEE International Coference on Privacy, Security and DataMining. Darlinghurst: Australian Computer  Society, 2002: 1-8.

<span lang="EN-IN">[7] ZHOU Shui-Geng, LI Feng1, TAO Yu-Fei, XIAO Xiao-Kui. Privacy Preservation in Database Applications: A Surve. CHINESE JOURNAL OF COMPUTER,2009,32(5)

<span lang="EN-IN">[8] Pinkas B. Cryptographic techniques for privacy-preserving data mining [J]. ACM SIGKDD Explorations Newsletter,2002,4(2):12-19.

<span lang="EN-IN">[9] Du Wenliang, Attalah M J. Secure multi problem computation problems and their applications: A review and open problems [R].CERIAS Tech Report 2001-51,Center for Education and Research in Information Assurance and Security and Department of

<span lang="EN-IN">Computer Sciences, Purdue University, West Lafayette,IN,2001.

<span lang="EN-IN">[10] Kantarcioglu M, Clifton C· Privacy preserving Distributed Mining of Association Rules on Horizontally Partitioned Data In: ACM SIGMOD Workshop on Research Issues on Data Mining and Knowledge Discovery, 2002

<span lang="EN-IN">[11] Agrawal R, Srikant R. Privacy-preserving data mining [A]. Proceedings of the 2000 ACM SIGMOD international conference on Management of data[C]. Dallas, Texas, United States: ACM, 2000. 439-450

<span lang="EN-IN">[12] Clifton C <span lang="EN-IN">Kantarcioglou M <span lang="EN-IN">Zhu Y M. Tools for privacy preserving distributed data mining[J]. SIGKDD Explorations 4<span lang="EN-IN">2002<span lang="EN-IN">(2).

<span lang="EN-IN">[13] Du Wenliang<span lang="EN-IN">Zhan Zhijun. Building decision tree classifier on private data[C]. In Proceedings of the IEEE ICDM Workshop on  Privacy<span lang="EN-IN">Security and DataMining<span lang="EN-IN">2002

<span lang="EN-IN">[14] Lindell Y <span lang="EN-IN">Pinkas B. Privacy preserving data mining[C]. In Advances in Cryptology-CRYPTO 2000<span lang="EN-IN">2000<span lang="EN-IN">36-54.

<span lang="EN-IN">[15] Rizvi S J, Haritsa J R. Maintaining data privacy in association rule mining [A]. In Proceedings of the 28th International Conference on Very Large Databases(VLD) [C]. Hong Kong,Chi-na: [s.n.], 2002. 682-693.

<span lang="EN-IN">[16] Agrawal D,Aggarwal C C.On the design and quantification of privacy preserving

<span lang="EN-IN">[17] data mining algorithms[A]. Proceedings of the twentieth ACM SIGMOD-SIGACT-SIGART symposium on Principles of Study of Privacy Preserving Data Mining Haisheng Li East China Jiaotong University, Nachang330013,China

<span lang="EN-IN">[18] 4. L. Wang, S. Jajodia, and D. Wijesekera, “Securing OLAP Data Cubes against Privacy Breaches,” Proc. 25th IEEE Symp.Security and Privacy, IEEE Press, 2004, pp. 161-175.

<span lang="EN-IN">[19] Verykios, VS; Bertino, E; Fovino, IN; Provenza, LP; Saygin, and Theodoridis, Y. 2004. State-of –the-art in Privacy Preserving Data Mining. SIGMOD Record. Volume 33, Issue 1:50-57.

<span lang="EN-IN">[20] JAIDEEP VAIDYA Rutgers University, CHRIS CLIFTON Purdue University<o:p></o:p>

<span lang="EN-IN">[21] <span lang="EN-IN">Devendra Kumar “Models and Techniques of Privacy Preserving Data Mining and its important aspects” June-2013, published in the International Journal of Advances Research in Computer Science

<span lang="EN-IN">[22] Devendra Kumar “Analytical Study on Privacy Preserving Data Mining Models and Techniques”, Volume-2, Issue-2, Year – 2012, published in the International Research Journal of Science Engineering and Technology

<span lang="EN-IN">[23] Devendra Kumar “Analytically study of Privacy Preserving Data Mining and its structure” 27-April, 2013, published in the proceeding of National Conference on “Role of ICT in Inclusive Sustainable National Development” at GNIT, Gr. Noida

<span lang="EN-IN">[24] Devendra Kumar “Study of Privacy Preserving Data Mining Techniques for Securing Web Services” 27-April, 2013, proceeding of National Conference on “Role of ICT in Inclusive Sustainable National Development” at GNIT, Gr. Noida

<span lang="EN-IN">[25] Devendra Kumar “Important aspects for securing web serving using privacy data mining Techniques” 24-Nov, 2012, Published in the proceeding of National Conference on “Strategies for sustainable growth in the era of Information Technology” at GNIT Management School, Greater Noida

<span lang="EN-IN">[26] Devendra Kumar, Naveen Singh, Rakesh Kumar “Implementation of Data Mining Techniques to ERP System for Securing Data” Feb. 24-25, 2012, Published in the proceeding of National Conference on “Cloud Computing Technologies and Services (CCTS-2012)” at ABES Engineering College, Ghaziabad.

*Contents are provided by Authors of articles. Please contact us if you having any query.






Bank Details