Every person involved,is concerned about the leakage of private data i.e privacy of the individual's data.Today privacy of data is one of the most serious concerns which people face on an individual as well as organisational level and it has to be dealt with in an effective
manner using privacy preserving data mining.
5. PPDM
Romalee
Amolic
Introduction
Literature
Survey
Methodology
Used
Algorithms
used
Advantages
and Disad-
vantages
Conclusion
Future
Scope
References
Introduction of Proposed System
Data mining takes place at various levels. The three entities
can be categorisedas :
Data Provider is the one who provides the data.
Concern:Whether he can control the sensitivity of the data
he provides to others.
Data collector is the user who collects data from data
providers and then publish the data to the data miner.
Concern:To guarantee that the modified data contain no
sensitive information but still preserve high utility.
Data Miner is the user who performs data mining tasks on
the data.Concern:How to prevent sensitive information from
appearing in the mining results
6. PPDM
Romalee
Amolic
Introduction
Literature
Survey
Methodology
Used
Algorithms
used
Advantages
and Disad-
vantages
Conclusion
Future
Scope
References
Literature Survey:
The randomization method: The randomization method is a
technique for privacy-preserving data mining in which noise is
added to the data in order to mask the attribute values of records.
The k-anonymity model and l-diversity: In the k-anonymity
method, we reduce the granularity of data representation with the
use of techniques such as generalization and suppression.[4]
Association rule mining can probe to be the best method to
preserve the privacy[2].This is one of the latest technologies and
methods.It tries to eliminate the flaws if any in the previous
methods.
Based on in-depth study of the existing data mining and
association rule mining algorithms, a new mining algorithm of
weighted association rules can be proposed.It greatly reduces
the time of input and output, and improves the efficiency of data
mining.
7. PPDM
Romalee
Amolic
Introduction
Literature
Survey
Methodology
Used
Algorithms
used
Advantages
and Disad-
vantages
Conclusion
Future
Scope
References
In addition to that fuzzy association rules have been developed
so as alter the support and confidence of rules as per the
requirements.
Data mining can be done at various stages[3].This paper tries to
explore various PPDM techniques based on proposed PPDM
classification hierarchy.
The categorization of data mining can be done into:
a>Centralized and
b>Distributed data mining
In addition to the normal methods of anonymization and
associative rule mining the methods of perturbation and
cryptography are discussed in detail.[3]
In order to deal with these issues there might be balance between
the privacy and utility of the data.This is the most important
reason for the large research and development in this field.[1]
32. PPDM
Romalee
Amolic
Introduction
Literature
Survey
Methodology
Used
Algorithms
used
Advantages
and Disad-
vantages
Conclusion
Future
Scope
References
Step 2.Fuzzy Inferencing(Implication Method):
Truth value for the antecedent of each rule is computed and
applied to the conclusion part of each rule.Degree of support
is used.
If the antecedent is only partially true, (i.e., is assigned a
value less than 1), then the output fuzzy set is truncated
according to the implication method. If the consequent of
a rule has multiple parts, then all consequents are affected
equally by the result of the antecedent. min: truncates the
consequent’s membership function
42. PPDM
Romalee
Amolic
Introduction
Literature
Survey
Methodology
Used
Algorithms
used
Advantages
and Disad-
vantages
Conclusion
Future
Scope
References
Future Scope
Since, no such technique exists which overcomes all privacy
issues, research in this direction can make significant
contributions. The study can be carried out using any one
of the existing techniques or using a combination of these or
by developing entirely a new technique. Since, no such
technique exists which overcomes all privacy issues, research
in this direction can make significant contributions.
The study can be carried out using any one of the existing
techniques or using a combination of these or by developing
entirely a new technique.
Convex optimization method can be extended for any kind
of association rules.
43. PPDM
Romalee
Amolic
Introduction
Literature
Survey
Methodology
Used
Algorithms
used
Advantages
and Disad-
vantages
Conclusion
Future
Scope
References
References
[1] LEI XU, CHUNXIAO JIANG, (Member, IEEE), JIAN
WANG, (Member, IEEE), JIAN YUAN, (Member, IEEE), AND
YONG REN, (Member, IEEE) ”Information Security in Big
Data:Privacy and Data Mining”
[2] Lei Chen,’The Research of Data Mining Algorithm Based on
Association Rules’
[3] Jisha Jose Panackal1 and Dr Anitha S Pillai2 Associate
Professor Department of Computer Applications, Vidya Academy
of Science and Technology, Thrissur, Kerala, India ’Privacy
Preserving Data Mining: An Extensive Survey’
[4] Charu C. Aggarwal IBM T. J. Watson Research Center
Hawthorne, NY 10532 Philip S. Yu University of Illinois at
Chicago ’A General Survey of Privacy-Preserving Data
Mining:Models and Algorithms’
[5] D. Jain, P. Khatri, R. Soni, and B. K. Chaurasia, ’Hiding
sensitive association rules without altering the support of sensitive
item’.
44. PPDM
Romalee
Amolic
Introduction
Literature
Survey
Methodology
Used
Algorithms
used
Advantages
and Disad-
vantages
Conclusion
Future
Scope
References
[6] J.-M. Zhu, N. Zhang, and Z.-Y. Li, ’A new privacy
preserving association rule mining algorithm based on hybrid
partial hiding strategy’ Cybern. Inf. Technol., vol. 13, pp.
4150, Dec. 2013.
[7] Privacy Preserving Quantitative Association Rule Mining
Using Convex Optimization Technique’
[8] International Journal of Advanced Research in Computer
and Communication Engineering Vol. 2, Issue 4, April 2013
Copyright to IJARCCE ww.ijarcce.com 1677 ’Privacy
Preserving Data Mining’ Seema Kedar, Sneha Dhawale,
Wankhade Vaibhav
[9] http://donottrack.us/
[10] http://webpages.uncc.edu/xwu/career/
[11] http://www.intechopen.com/