Classification and Evaluation the Privacy Preserving Data Mining Techniques by using a Data Modification–based Framework

Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 2

Abstract

In recent years, the data mining techniques have met a serious challenge due to the increased concerning and worries of the privacy, that is, protecting the privacy of the critical and sensitive data. Different techniques and algorithms have been already presented for Privacy Preserving data mining, which could be classified in three common approaches: Data modification approach, Data sanitization approach and Secure Multi-party Computation approach. This paper presents a Data modification– based Framework for classification and evaluation of the privacy preserving data mining techniques. Based on our framework the techniques are divided into two major groups, namely perturbation approach and anonymization approach. Also in proposed framework, eight functional criteria will be used to analyze and analogically assessment of the techniques in these two major groups. The proposed framework provides a good basis for more accurate comparison of the given techniques to privacy preserving data mining. In addition, this framework allows recognizing the overlapping amount for different approaches and identifying modern approaches in this field.

Authors and Affiliations

MohammadReza Keyvanpour , Somayyeh Seifi Moradi

Keywords

Related Articles

A novel application for transmission of Orthogonal Embedded Images by using Morphological Transform Domain & cryptographic methods

This paper proposes a data-hiding technique for water marked images and secured transmission of those watermarked images to the destination . today’s lot of companies are stored their data in the images, they store data...

Facial Expressions with Some Mixed Expressions Recognition Using Neural Networks

Facial feature extraction is the essential step of facial expression recognition. The automatic facial impression evaluation applies for wide area use. The important facial feature vectors for expression analysis are ana...

Update Vehicle Traffic Routing Using Ant Colony Optimization Algorithm

In this paper, the authors want to implement the solution of combinatorial problem, based on the heuristic behavior of ant. This paper focuses on a highly developed solution procedure using ACO algorithm. This helps to s...

Fault Tolerance in Real Time Distributed System

In this paper we investigate the different techniques of fault tolerance which are used in many real time distributed systems. The main focus is on types of fault occurring in the system, fault detection techniques and t...

A Bee-Hive Optimization Approach to Improve the Network Lifetime in Wireless Sensor Networks

In Wireless Sensor Networks (WSN), maximizing the lifetime is a challenging problem. The main task of a network is to receive information from node and transmit to base station for processing. If all nodes forward data p...

Download PDF file
  • EP ID EP108090
  • DOI -
  • Views 112
  • Downloads 0

How To Cite

MohammadReza Keyvanpour, Somayyeh Seifi Moradi (2011). Classification and Evaluation the Privacy Preserving Data Mining Techniques by using a Data Modification–based Framework. International Journal on Computer Science and Engineering, 3(2), 862-870. https://europub.co.uk/articles/-A-108090