An Overview on Privacy Preserving Data Mining Methodologies

Journal Title: INTERNATIONAL JOURNAL OF ENGINEERING TRENDS AND TECHNOLOGY - Year 2011, Vol 2, Issue 2

Abstract

 Abstract— Recent interest in the collection and monitoring of data using data mining technology for the purpose of security and business-related applications has raised serious concerns about privacy issues. For example, mining health care data for the detection of disease outbreaks may require analyzing clinical records and pharmacy transaction data of many individuals over a certain area. However, releasing and gathering such diverse information belonging to different parties may violate privacy laws and eventually be a threat to civil liberties. Privacy preserving data mining strives to provide a solution to this dilemma. It aims to allow useful data patterns to be discovered without compromising privacy. This paper presents an brief overview on preserving data mining methodologies.

Authors and Affiliations

Umesh Kumar Singh, Bhupendra Kumar Pandya , Keerti Dixit

Keywords

Related Articles

Sensors based Wearable and Systems for Detection of Human Movement and Fall

Human computer interaction system is a study of relationship between people and computers mediated information. The future of human computer interaction systems lies in how intelligently these systems can take into accou...

 Heat Recovery through Boiler Blow down Tank

 Steam generators are widely used in industries for several purposes like power production, processing, heating etc. In industry steam generators are the major fuel consumers. In a normal steam generator about 4% of...

 An Empirical Study on Privacy Preserving Data Mining

 In modern years, advances in hardware expertise have lead to an increase in the competence to store and record personal data about consumers and individuals. This has lead to concerns that the personal data may be...

Detection of Node Clones in Wireless Sensor Network Using Detection Protocols

Wireless sensor networks consist of hundreds to thousands of sensor nodes and are widely used in civilian and security applications. One of the serious physical attacks faced by the wireless sensor network is node clone...

 Sniffer Technology to Detect Lost Mobile

 The main scope of this paper is to detect the lost mobiles. Each and every day thousands of mobiles get misplaced or lost, though effective way for the blocking of the lost mobile to prevent unauthorized person fro...

Download PDF file
  • EP ID EP146000
  • DOI -
  • Views 99
  • Downloads 0

How To Cite

Umesh Kumar Singh, Bhupendra Kumar Pandya, Keerti Dixit (2011).  An Overview on Privacy Preserving Data Mining Methodologies. INTERNATIONAL JOURNAL OF ENGINEERING TRENDS AND TECHNOLOGY, 2(2), 11-15. https://europub.co.uk/articles/-A-146000