Full Paper View Go Back

A Survey on Heuristic Based Approach for Privacy Preserving in Data Mining

Aniket Patel1 , Patel Shreya2 , Kiran Amin3

  1. Dept. of IT, Silver Oak College of Engineering and Technology (GTU), Ahmedabad, India.
  2. Dept. of CE, Silver Oak College of Engineering and Technology (GTU), Ahmedabad, India.
  3. Dept. of CE, UV Patel College of Engineering(GTU), Kherva-Mehsana, India.

Correspondence should be addressed to: patelshreya1706@gmail.com.


Section:Survey Paper, Product Type: Isroset-Journal
Vol.5 , Issue.5 , pp.21-25, Oct-2017


CrossRef-DOI:   https://doi.org/10.26438/ijsrcse/v5i5.2125


Online published on Oct 30, 2017


Copyright © Aniket Patel, Patel Shreya, Kiran Amin . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Aniket Patel, Patel Shreya, Kiran Amin, “A Survey on Heuristic Based Approach for Privacy Preserving in Data Mining,” International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.5, pp.21-25, 2017.

MLA Style Citation: Aniket Patel, Patel Shreya, Kiran Amin "A Survey on Heuristic Based Approach for Privacy Preserving in Data Mining." International Journal of Scientific Research in Computer Science and Engineering 5.5 (2017): 21-25.

APA Style Citation: Aniket Patel, Patel Shreya, Kiran Amin, (2017). A Survey on Heuristic Based Approach for Privacy Preserving in Data Mining. International Journal of Scientific Research in Computer Science and Engineering, 5(5), 21-25.

BibTex Style Citation:
@article{Patel_2017,
author = {Aniket Patel, Patel Shreya, Kiran Amin},
title = {A Survey on Heuristic Based Approach for Privacy Preserving in Data Mining},
journal = {International Journal of Scientific Research in Computer Science and Engineering},
issue_date = {10 2017},
volume = {5},
Issue = {5},
month = {10},
year = {2017},
issn = {2347-2693},
pages = {21-25},
url = {https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=468},
doi = {https://doi.org/10.26438/ijcse/v5i5.2125}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v5i5.2125}
UR - https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=468
TI - A Survey on Heuristic Based Approach for Privacy Preserving in Data Mining
T2 - International Journal of Scientific Research in Computer Science and Engineering
AU - Aniket Patel, Patel Shreya, Kiran Amin
PY - 2017
DA - 2017/10/30
PB - IJCSE, Indore, INDIA
SP - 21-25
IS - 5
VL - 5
SN - 2347-2693
ER -

629 Views    281 Downloads    185 Downloads
  
  

Abstract :
Data Mining has been the most researched area for researchers because of the possibilities of extension at each application of it. When the data becomes massive in volume, many problems strike for security and privacy breach. Some applications like sharing of such data to a particular user have threats of preserving the original data so that the injection of such data can be prohibited. So it is a timely need to secure the data while handling them to the known or unknown users. The requirement of not losing the essence of data and still publishing it with the actual information is a challenge. Such troubles prompted the advancement of Privacy Preserving Data Mining (PPDM) Techniques. Privacy Preserving has become an important issue in the development progress of Data Mining techniques. Methods like k-Anonymity, l-Diversity have been explored well by researchers but still, there are holes that force us to develop a more effective method and using such approach one can get better accuracy with minimum loss of data.

Key-Words / Index Term :
Data Mining, Heuristic Based Approach, Privacy Preserving Data Mining

References :
[1] Hina Vaghashia, Amit Ganatra, “A Survey: Privacy Preservation Techniques in Data Mining ”, IJCA International Journal of Computer Applications (0975 – 8887) Vol.119, No.4, pp.20-26, June 2015.
[2] A.S.Shanthi, Dr. M. Karthikeyan, “A review on privacy preserving Data Mining ”, IEEE,2012.
[3] Sarra Gacem, Djamila Mokeddem and Hafida Belbachir, “Privacy Preserving Data Mining: Case of association rules”, IJCSI International Journal of Computer Science Issues, Vol. 10, Issue 3, No 1, pp.91-96, May 2013.
[4] N.Punitha, R.Amsaveni, “Methods and Techniques to Protect the Privacy Information in Privacy Preservation Data Mining “, IJCTA Int. J. Comp. Tech. Appl., Vol 2, No.6, pp.2091-2097, Nov-Dec 2011.
[5] Tapasya Dinkar, Aniket Patel and Dr. Kiran R. Amin ,” Preserving The Sensitive Inofrmation Using Heuristic Based Approach ”, IEEE 2016.
[6] Christy Thomas, Diya Thomas , “An enhanced method for privacy preservation in data publishing”, 4th ICCCNT, Tiruchengode, India, July 4 - 6, 2013.
[7] Nagendra kumar.S, Aparna.R, “Sensitive Attributes based Privacy Preserving in Data Mining using k-Anonymity”, IJCA International Journal of Computer Applications (0975 – 8887) Vol.84, No.13, pp.1-6, December 2013.
[8] Pu Shi, Li Xiong, Benjamin C. M. Fung, “Anonymizing Data with Quasi-Sensitive Attribute Values”, CIKM’10, Toronto, Ontario, Canada, October 26–30, 2010.
[9] R.Indhumathi, S.Mohana, “Data Preserving Techniques for Collaborative Data Publishing”, IJERT International Journal of Engineering Research & Technology, Vol.2 ,Issue 11, pp.3449-3454, November – 2013.
[10] Pierangela Samarati, Latanya Sweeney, “Protecting Privacy when disclosing information: k-Anonymity and its enforcement through generalization and suppression”, The work of Pierangela Samarati was supported in part by National Science Foundation and by DARPA, pp.1-19.
[11] Mohana Chelvan P., Perumal K., "On Privacy Preserving Data Mining Techniques: Merits and Demerits", International Journal of Computer Sciences and Engineering, Vol.5, Issue.9, pp.210-214, 2017.
[12] Pierangela Samarati, Latanya Sweeney, “Generalizing Data to Provide Anonymity when Disclosing Information”, The work of Pierangela Samarati was supported in part by National Science Foundation and by DARPA, pp.1-13.
[13] Nivedita Bairagi, Punit K. Johari, "A novel approach for privacy preserving using Animal Migration Optimization and RSA algorithm", International Journal of Computer Sciences and Engineering, Vol.5, Issue.6, pp.193-197, 2017.
[14] S.Vijayarani, A.Tamilarasi, M.Sampoorna, “Analysis of Privacy Preserving K-Anonymity Methods and Techniques”, Proceedings of the International Conference on Communication and Computational Intelligence – 2010, Kongu Engineering College, Perundurai, Erode, T.N., India.27 – 29 December 2010, pp.540-545.
[15] M V R NarasimhaRao, J.S.VenuGopalkrisna, R.N.V. Vishnu Murthy, Ch. Raja Ramesh, “ Closeness Privacy Measure For Data Publishing Using Multiple Sensitive Attributes”, IJESAT International Journal Of Science & Advanced Technology, Vol.2, Issue-2, pp.278 – 284, Mar-Apr 2012.
[16] Ashwin Machanavajjhala,Johannes Gehrke, Daniel Kifer,“l-Diversity: Privacy Beyond k –Anonymity”, Proceedings of the 22nd International Conference on Data Engineering (ICDE’06), IEEE 2006.
[17] Yuichi Sei, Takao Takenouchi, Akihiko Ohsuga, “(l1, ..., lq)-diversity for Anonymizing Sensitive Quasi-Identifiers”, IEEE 2015, pp.596-603.
[18] Ninghui Li, Tiancheng Li, Suresh Venkatasubramanian, “t-closeness: Privacy Beyond k-Anonymity and l –Diversity”, IEEE 2007, pp.106-115.
[19] Jordi Soria-Comas, Josep Domingo-Ferrer, David S´anchez and Sergio Mart´ınez, “t-closeness through Microaggregation: Strict Privacy with Enhanced Utility Preservation”, IEEE 2016, pp.1464-1465.
[20] Xiaokui Xiao Yufei Tao, “Personalized Privacy Preservation”, SIGMOD 2006, Chicago, Illinois, USA, June 27–29, 2006.
[21] Jian Xu, Wei Wang, Jian Pei, Xiaoyuan Wang, Baile Shi, Ada Wai-Chee Fu, “Utility-Based Anonymization Using Local Recoding”, KDD’06, Philadelphia, Pennsylvania, USA, August 20-23, 2006.
[22] Marie Fernandes, “Data Mining: A Comparative Study of its Various Techniques and its Process”, IJSRCSE International Journal of Scientific Research in Computer Science and Engineering Volume-5, Issue-1, pp.19-23, February 2017.

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at  support@isroset.org or view contact page for more details.

Go to Navigation