Classification and Evaluation the Privacy Preserving Data Mining Techniques by using a Data Modification-based Framework

نویسندگان

  • Mohammad Reza Keyvanpour
  • Somayyeh Seifi Moradi
چکیده

In recent years, the data mining techniques have met a serious challenge due to the increased concerning and worries of the privacy, that is, protecting the privacy of the critical and sensitive data. Different techniques and algorithms have been already presented for Privacy Preserving data mining, which could be classified in three common approaches: Data modification approach, Data sanitization approach and Secure Multi-party Computation approach. This paper presents a Data modification– based Framework for classification and evaluation of the privacy preserving data mining techniques. Based on our framework the techniques are divided into two major groups, namely perturbation approach and anonymization approach. Also in proposed framework, eight functional criteria will be used to analyze and analogically assessment of the techniques in these two major groups. The proposed framework provides a good basis for more accurate comparison of the given techniques to privacy preserving data mining. In addition, this framework allows recognizing the overlapping amount for different approaches and identifying modern approaches in this field. KeywordsPrivacy Preserving Data Mining, Data Modification, Perturbation, Anonymization

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Classificationandevaluation the Privacy Preserving Distributed Data Miningtechniques

In recent years, the data mining techniques invarious areas have met serious challenges increasingconcernsaboutprivacy. Different techniques and algorithms have been already presented for Privacy preserving data mining (PPDM), which could be classified in two scenarios: centralized data scenario and distributed data scenario. This paper presents a Framework for classification and evaluation of ...

متن کامل

Customer Behavior Mining Framework (CBMF) using clustering and classification techniques

The present study proposes a Customer Behavior Mining Framework on the basis of data mining techniques in a telecom company. This framework takes into account the customers’ behavior patterns and predicts the way they may act in the future. Firstly, clustering technique is used to implement portfolio analysis and previous customers are divided based on socio-demographic features using k</em...

متن کامل

Categorization and Rating the Privacy Maintaining Data Mining Proficiencies by Applying a Data Change–based Model

Categorization and Rating the Privacy Maintaining Data Mining Proficiencies by Applying a Data Change–based Model Dheeraj Agarwal, Jitendra Nath Srivastava Research Scholar Invertis University, Bareilly-Email:[email protected] Associate Prof. Invertis University, Bareilly. -------------------------------------------ABSTRACT---------------------------------In recent years, the data mini...

متن کامل

ارایه یک روش جدید انتشار داده‌ها با حفظ محرمانگی با هدف بهبود دقّت طبقه‌‌بندی روی داده‌های گمنام

Data collection and storage has been facilitated by the growth in electronic services, and has led to recording vast amounts of personal information in public and private organizations databases. These records often include sensitive personal information (such as income and diseases) and must be covered from others access. But in some cases, mining the data and extraction of knowledge from thes...

متن کامل

Privacy Preserving Data Mining

Recent interest in data collection and monitoring using data mining for security and business-related applications has raised privacy. Privacy Preserving Data Mining (PPDM) techniques require data modification to disinfect them from sensitive information or to anonymize them at an uncertainty level. This study uses PPDM with adult dataset to investigate effects of K-anonymization for evaluation...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1105.1945  شماره 

صفحات  -

تاریخ انتشار 2011