A Study on Data Perturbation Techniques in Privacy Preserving Data Mining
نویسندگان
چکیده
Student, Dept. Of Computer Engineering, Grow More Faculty of Engineering Himatnagar, Gujarat, India Asst. Professor, Dept. of Computer Engineering, Grow More Faculty of Engineering Himatnagar, Gujarat, India ---------------------------------------------------------------------***--------------------------------------------------------------------Abstract-In recent years, the data mining techniques have met a serious challenge due to the increased concerning and worries of the privacy, that is, protecting the privacy of the critical and sensitive data. Data perturbation is a popular technique for privacy preserving data mining. The major challenge of data perturbation is balancing privacy protection and data quality, which normally considered as a pair of contradictive factors. Geometric data perturbation technique is a combination of Rotation, Translation and Noise addition perturbation technique. It is especially useful for data owners to publish data while preserving privacy –sensitive information. Typical examples include publishing micro data for research purpose or outsourcing the data to the third party that provides data mining services. In this paper we try to explore the latest trends in Geometric data perturbation technique.
منابع مشابه
On Random Additive Perturbation for Privacy Preserving Data Mining
Title of Thesis: On Random Additive Perturbation for Privacy Preserving Data Mining Author: Souptik Datta, Master of Science, 2004 Thesis directed by: Dr. Hillol Kargupta, Associate Professor Department of Computer Science and Electrical Engineering Privacy is becoming an increasingly important issue in many data mining applications. This has triggered the development of many privacy-preserving...
متن کاملClassification and Evaluation the Privacy Preserving Data Mining Techniques by using a Data Modification-based Framework
In recent years, the data mining techniques have met a serious challenge due to the increased concerning and worries of the privacy, that is, protecting the privacy of the critical and sensitive data. Different techniques and algorithms have been already presented for Privacy Preserving data mining, which could be classified in three common approaches: Data modification approach, Data sanitizat...
متن کاملA Survey of Attack Techniques on Privacy-Preserving Data Perturbation Methods
We focus primarily on the use of additive and matrix multiplicative data perturbation techniques in privacy preserving data mining (PPDM). We survey a recent body of research aimed at better understanding the vulnerabilities of these techniques. These researchers assumed the role of an attacker and developed methods for estimating the original data from the perturbed data and any available prio...
متن کاملA Survey of Cryptographic and Non-cryptographic Techniques for Privacy Preservation
Cryptography is to become familiar with the requirement of large, complex, information rich data sets for it’s privacy preservation. The privacy preserving data mining has been generated; to go through the concept of privacy in data mining is hard. Several algorithms and approaches are being generated theoretically, but practically it is hard. Privacy in data mining can be achieved through seve...
متن کاملPrivacy Preserving Data Mining
There is a tremendous increase in the research of data mining. Data mining is the process of extraction of data from large database. Knowledge Discovery in database (KDD) is another name of data mining. Privacy protection has become a necessary requirement in many data mining applications due to emerging privacy legislation and regulations. One of the most important topics in research community...
متن کامل