Categorization and Rating the Privacy Maintaining Data Mining Proficiencies by Applying a Data Change–based Model
نویسندگان
چکیده
Categorization and Rating the Privacy Maintaining Data Mining Proficiencies by Applying a Data Change–based Model Dheeraj Agarwal, Jitendra Nath Srivastava Research Scholar Invertis University, Bareilly-Email:[email protected] Associate Prof. Invertis University, Bareilly. -------------------------------------------ABSTRACT---------------------------------In recent years, the data mining proficiencies have met a dangerous challenge due to the altered regarding and concerns of the privacy that is, defending the secrecy of the vital and sore data. Different proficiencies and algorithms have been already demonstrated for Privacy Preserving data mining, which could be assorted in three common approaches: Data modification approach, Data sanitization approach and Secure Multi-party Calculation approach. This paper demonstrates a Data modification– based Framework for categorization and valuation of the privacy maintaining data mining techniques. Based on our model the proficiencies are divided into two major groups, namely perturbation approach and anonymization approach. Also in proposed model, eight functional criteria will be used to examine and analogically judgment of the proficiencies in these two major groups. The suggested framework furnishes a good basis for more accurate comparison of the given proficiencies to privacy maintaining data mining. In addition, this framework permits distinguishing the overlapping quantity for different approaches and describing modern approaches in this field.
منابع مشابه
Introducing an algorithm for use to hide sensitive association rules through perturb technique
Due to the rapid growth of data mining technology, obtaining private data on users through this technology becomes easier. Association Rules Mining is one of the data mining techniques to extract useful patterns in the form of association rules. One of the main problems in applying this technique on databases is the disclosure of sensitive data by endangering security and privacy. Hiding the as...
متن کاملA Multi-Agent System for Healthcare Data Privacy
Research has been conducted on distributed data mining, privacy preserving data mining, and multiagent systems; however, integrating the aforementioned research areas require further investigation. Sensitive data sources, such as healthcare organizations, may be reluctant to permit sensitive data to leave the source or permit mining of the sensitive data. Additionally, distributed data mining o...
متن کاملEntropy-based Consensus for Distributed Data Clustering
The increasingly larger scale of available data and the more restrictive concerns on their privacy are some of the challenging aspects of data mining today. In this paper, Entropy-based Consensus on Cluster Centers (EC3) is introduced for clustering in distributed systems with a consideration for confidentiality of data; i.e. it is the negotiations among local cluster centers that are used in t...
متن کاملExploring Nursing Students’ Experiences of Privacy in Pediatrics Ward: A Qualitative Study
Background and Objectives: Respecting privacy means respecting individuals, their dignity and independence. It is mandatory to observe privacy in health-care systems. Therefore, this study was carried out with the aim of expressing nursing students’ experience of privacy in pediatrics ward. Methods: This qualitative study was done inductively using content analysis method. The participant...
متن کاملارایه یک روش جدید انتشار دادهها با حفظ محرمانگی با هدف بهبود دقّت طبقهبندی روی دادههای گمنام
Data collection and storage has been facilitated by the growth in electronic services, and has led to recording vast amounts of personal information in public and private organizations databases. These records often include sensitive personal information (such as income and diseases) and must be covered from others access. But in some cases, mining the data and extraction of knowledge from thes...
متن کامل