A Review on Security Techniques for Privacy-Preserving in Data Mining

Authors

  • K. S Chandwani  Professor, Department of Computer Technology, KDK College of Engineering, Nagpur, Maharashtra, India
  • Anjali Mishra  CSE, SMT. Rajshri Mulak College of Engineering for Women, Nagpur, Maharashtra, India
  • Ayushi Desai  CSE, SMT. Rajshri Mulak College of Engineering for Women, Nagpur, Maharashtra, India
  • Priyanka Kushwaha  CSE, SMT. Rajshri Mulak College of Engineering for Women, Nagpur, Maharashtra, India
  • Sonal Nikose  CSE, SMT. Rajshri Mulak College of Engineering for Women, Nagpur, Maharashtra, India
  • Shivani Wanjari  CSE, SMT. Rajshri Mulak College of Engineering for Women, Nagpur, Maharashtra, India

DOI:

https://doi.org//10.32628/CSEIT195519

Keywords:

Access Control, Confidentiality, Integrity, Outsourced Databases, Query Authentication, Security mechanisms

Abstract

As the rise in the data mining algorithm the extraction of knowledge from the large data is getting easy. But due to this new problem of Privacy of the knowledge from the stored data at various servers is introduced. So, it is required to provide privacy of the sensitive data from the data miners. This paper focuses on various approaches implemented by the miners for preserving of information at individual level, class level, etc. A detail description with limitation of different techniques security of privacy preserving is explained.

References

  1. Yung-Wang Lin, Li-Cheng Yang, Luon-Chang Lin, and Yeong-Chin Chen, Preserving Privacy in Outsourced Database, International Journal of Computer and Communication Engineering, Vol. 3, No. 5, September 2015.
  2. Sumeet Bajaj, RaduSion, TrustedDB: A Trusted Hardware based Database with Privacy and Data Confidentiality, In Proc. of IEEE Transactions on Knowledge and Data Engineering, 2013.
  3.  FoscaGiannotti, Laks V. S. Lakshmanan, Anna Monreale, Dino Pedreschi, and Hui (Wendy) Wang, Privacy-Preserving Mining of Association Rules From Outsourced Transaction. Databases, IEEE SYSTEMS JOURNAL, VOL. 7, NO. 3, SEPTEMBER 2012.
  4. Lena Wiese,Horizontal Fragmentation for Data Outsourcing with Formula-Based Confidentiality Constraints, Advance in information and computer security, Springer 2010.
  5. HweeHwa Pang Jilian Zhang KyriakosMouratidis,Scalable Verification for Outsourced Dynamic Databases, ACM.VLDB „09, August 2428, 2009, Lyon, France Copyright 2009.
  6. Brian Thompson, Stuart Haber, William G. Horne, Tomas Sander, Danfeng Yao, Privacy-Preserving Computation and Verification of Aggregate Queries on Outsourced Databases, HP Laboratories HPL-2009-119, published by Springer Aug-2009.

Downloads

Published

2019-10-30

Issue

Section

Research Articles

How to Cite

[1]
K. S Chandwani, Anjali Mishra, Ayushi Desai, Priyanka Kushwaha, Sonal Nikose, Shivani Wanjari, " A Review on Security Techniques for Privacy-Preserving in Data Mining, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 5, Issue 5, pp.118-122, September-October-2019. Available at doi : https://doi.org/10.32628/CSEIT195519