128
Views
3
CrossRef citations to date
0
Altmetric
Original Articles

An illustration to secured way of data mining using privacy preserving data mining

&

References

  • Y. A.S. Aldeen, M. Salleh and M. A. Razzaque. “A Comprehensive Review on Privacy Preserving Data Mining”. Springer Plus 2015 4:694. 2015. DOI: 10.1186/s40064-015-1481-x
  • P. Kamakshi, A. Vinaya Babu. “Automatic detection of sensitive attribute in PPDM”. Published in: 2012 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC) , pp. 37–41, 2012. DOI: 10.1109/ICCIC.2012.6510183
  • G. Zhang, Y. Yang, J. Chen. “A Historical Probability based Noise Generation Strategy for Privacy Protection in Cloud Computing”. Journal of Computer and System Sciences. Vol 78(5), pp- 1374–1381, September 2012. doi: 10.1016/j.jcss.2011.12.020
  • V. K. Shrivastava, P. Kumar and K. R. Pardasani. “Extraction of Interesting Association Rules using GA Optimization”. Global Journal of Computer Science and Technology. Vol 10(5), pp. 81–85, 2010.
  • Y.K. Jain, V.K. Yadav and G.S. Panday. “An Efficient Association Rule Hiding Algorithm for Privacy Preserving Data Mining”. International Journal on Computer Science and Engineering. Vol. 3(7), pp- 2792–2798, 2011.
  • Huh, Myung-Hoe, and Yong B. Lim. “Weighting variables in K-means clustering.” Journal of Applied Statistics 36.1 (2009): 67–78. doi: 10.1080/02664760802382533
  • Stanley R.M. Oliveira and Osmar R Zaiane. “Towards Standardization in Privacy Preserving Data Mining”. In Proceedings of 3rd Woorkshop on Data Mining Standards (DM-SSP 2004), in conjuction with KDD 2004.
  • D. Thakur and H. Gupta. “An Exemplary Study of Privacy Preserving Association Rule Mining Techniques”. International Journal of Advanced Research in Computer Science and Software Engineering. Vol 3(11), 2013.
  • R. Chow, P. Golle, M. Jakobsson, E. Shi, J. Staddon, R. Masuoka, and J. Molina. “Controlling data in the cloud: Outsourcing computation without outsourcing control.” In Proceedings of the 2009 ACM workshop on Cloud computing security. pp.85–90, 2009.
  • Xu, Shuting, and Mable Qiu. “A privacy preserved data mining framework for customer relationship management.” Journal of Relationship Marketing 7.3 (2008): 309–322. doi: 10.1080/15332660802417236
  • Y. Lindell and B. Pinkasy. “Privacy Preserving Data Mining”. In Proceedings CRYPTO ‘00 Proceedings of the 20th Annual International Cryptology Conference on Advances in Cryptology. pp. 36–54.
  • S. Xu, J. Zhang, D. Han, J. Wang. “Data Distortion for Privacy Protection in a Terrorist Analysis System”. Proceeding of IEEE International Conference on Intelligence and Security Informatics, pp. 459–464, 2005.
  • C. K. Liew, U.J. Choi and C. J. Liew. “A Data Distortion by Probability Distribution”. ACM Transaction on Database Systems (TODS), Vol. 10(3), pp. 395–411, 1985. doi: 10.1145/3979.4017
  • B. Peng, X. Geng, J. Zhang. “Combined Data Distortion Strategies for Privacy-Preserving Data Mining”. Proceeding of IEEE International Conference on Advanced Computer Theory and Engineering (ICACTE), pp. VI-572-VI-576, 2010.
  • U. Sahu and A. Singh. “Approaches for Privacy-Preserving Data Mining by various Associations Rule Hiding Algorithms- A Survey”. International Journal of Computer Applications, Vol 134(11), pp- 21–26, 2016. doi: 10.5120/ijca2016908042
  • S. Narmadha, S. Vijayarani. “Protecting Sensitive Association rules in Privacy-Preserving Data Mining using Genetic Algorithms”. International Journal of Computer Applications, Vol 33(7), pp- 37–43, 2011.
  • P. Kumar, K.I. Verma, A. Sureka. “Fuzzy Based Clustering Algorithm for Privacy-Preserving Data Mining”. International Journal of Business Information Systems, Vol. 7(1), pp. 27–40, 2011. doi: 10.1504/IJBIS.2011.037295
  • X. Ge and J. Zhu. “Privacy-Preserving Data Mining, New Fundamental Technologies in Data Mining.” Prof. Kimito Funatsu (Ed.), ISBN: 978–953-307-547-1, InTech, DOI: 10.5772/13364. Available at hhtp://www.intechopen.com/books/new-fundamental-technologies-in-data-mining/privacy-preserving-data-mining
  • J.R. Quinlan. “C4.5: Programs for Machine Learning”. Morgan Kaufmann, 1993.
  • Li Liu. “Privacy Preserving Decision Tree Mining from Perturbed Data”. Proceedings of the 42nd Hawaii Conference on System Sciences-2009.
  • Kumar, B. Suresh, Deepshikha Bhargava, and Ramesh C. Poonia, “Fuzzy keyword search and ranking frame work of DRS based file information management system using TF-RDF ranking strategy”, Proceedings of the 2014 International Conference on Information and Communication Technology for Competitive Strategies, ACM; 2014.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.