Privacy Preserving in Data Mining
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2015, Vol 3, Issue 2
Abstract
Data mining is an increasingly important technology for extracting useful knowledge hidden in large collection of data. It is today well observe that database represent important role in many application and for this reason its security becomes compulsory. To keep the data very confidentially is relevant because of value and need .In recent years, many organization have data collector and collect the data in digital form. .The problem with data mining output is that it also reveals some information, which are considered to be private and personal. Easy access to such personal data poses a threat to individual privacy. There has been growing concern about the chance of misusing personal information behind the scene without the knowledge of actual data owner.Privacy is becoming an increasingly important issue in many data mining applications in distributed environment. Privacy preserving data mining technique gives new direction to solve this problem. In this paper we have given a brief discussion on different privacy preservation techniques and their advantages and disadvantages.
Authors and Affiliations
Pranoti S. Talokar, Renuka D. Mane, Darshana K. Patil
slugAn Improved Mechanism of Secret Data Hiding in an Image and Enhanced Security by Minimized Detection
Steganography is the art of hiding information and an effort to conceal the existence of the embedded information .In recent years many stegnography methods have been challenge by stegnalysis. Steganalysis algorithm whi...
Increasing the Lifetime of Cluster head Using Improved Stability Based Clustering Approach in VANETS
Increasing the lifetime of the cluster head is crucial for most applications and protocol designs in Vehicular Adhoc Networks (VANET).In traditional approaches, this is obtained by beacon based techniques, affinity propa...
Design and FPGA Implementation of DDR SDRAM Controller
Technology is increasing day by day. The world is obsessed with smart phones, laptops and computers. RAM which is used in these devices is the internal memory of CPU for storing data, program and program result. SDRAM o...
Factors Associated With Needles Stab Wounds to the Village Midwife in Mojokerto District
Village midwife in Mojokerto in providing services acts inject stab wounds at risk of exposure as a result of syringes and needles puncture wounds impact on the risk of infection. This study aimed to analyze factors ass...
Development of Web Server for Accessing Parameters: Review
In an organization there are number of front-ends whose data is send to VME stations and then communicated through RS485 to the PC. The database contains the status of all the front-ends and stored in the XLS file forma...