An overview of Multiplicative data perturbation for privacy preserving Data mining
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2014, Vol 2, Issue 7
Abstract
Privacy is an important issue when one wants to make use of data that involves individuals’ sensitive information. Research on protecting the privacy of individuals and the confidentiality of data has received contributions from many fields, including computer science, statistics, economics, and social science. In this paper, we survey research work in privacypreserving data Mining. This is an area that attempts to answer the problem of how an organization, such as a hospital, government agency, or insurance company, can release data to the public without violating the confidentiality of personal information. We focus on privacy criteria that provide formal safety guarantees, present algorithms that sanitize data to make it safe for release while preserving useful information, and discuss ways of analyzing the sanitized data. Many challenges still remain. This overview provides a summary of the current and traditional multiplicative data perturbation techniques for privacy preserving Data Mining.
Authors and Affiliations
Keerti Dixit, Bhupendra Pandya
A Hybrid Solar Wind Power Generation System
World has shifted its outlook towards the cleaner sources of energy. Energy generation in balance with sustainable development has led to energy generation from non-conventional, renewable energy sources like solar ener...
Survey on Clustering Algorithms in Wireless Sensor Networks
To monitor the disaster management and industrial automation we make use of wireless sensor network. In order to achieve this sensor nodes have to be grouped together to operate and gather the aggregated information aut...
Steering System of Electric Go-Kart
Manual rack and pinion steering systems are commonly used due to their simplicity in construction and compactness. The main purpose of this paper is to design and Manufacture manual rack and pinion steering system accor...
Prediction of Deflection of Cantilever Beam of Any Arbitrary Length Using Soft Computation Technique
The purpose of the paper is to predict the deflection of a cantilever beam using soft computation technique. The neural networking technique is adopted here for the prediction. The large deflection of the beam is consid...
DeyPoS: Using Revocable Storage Identity-Based Encryption
Dynamic Proof of Storage (PoS) is a useful cryptographic primitive that enables a user to check the integrity of outsourced files and to efficiently update the files in a cloud server. A practical multi-user cloud stora...