Filters








13,528 Hits in 4.6 sec

A Framework for Evaluating Privacy Preserving Data Mining Algorithms*

Elisa Bertino, Igor Nai Fovino, Loredana Parasiliti Provenza
2005 Data mining and knowledge discovery  
In this paper, we present a first evaluation framework for estimating and comparing different kinds of PPDM algorithms.  ...  Recently, a new class of data mining methods, known as privacy preserving data mining (PPDM) algorithms, has been developed by the research community working on security and knowledge discovery.  ...  Conclusions and future work In this paper, we have proposed a framework for evaluating privacy preserving data mining algorithms.  ... 
doi:10.1007/s10618-005-0006-6 fatcat:pzxafzivejbchgj2ltx7naxyii

Privacy Preserving Data Mining Algorithms by Data Distortion

Wu Xiao-dan, Yue Dian-min, Liu Feng-li, Wang Yun-feng, Chu Chao-Hsien
2006 2006 International Conference on Management Science and Engineering  
Recently, a new class of data mining methods, known as privacy preserving data mining (PPDM) algorithms, has been developed by the research community working on security and knowledge discovery.  ...  A set of metrics and a theoretical framework are also proposed for assessing the relative performance of selected PPDM algorithms. Finally, we share directions for future research.  ...  Suggestions for future work In this paper, we have proposed a framework for privacy preserving data mining algorithms for centralized database.  ... 
doi:10.1109/icmse.2006.313871 fatcat:ygfadpganraurbi7ev7zmtyhzu

Tuple Value Based Multiplicative Data Perturbation Approach to Preserve Privacy in Data Stream Mining

Hitesh Chhinkaniwala, Sanjay Garg
2013 International Journal of Data Mining & Knowledge Management Process  
In order to share data while preserving privacy, data owner must come up with a solution which achieves the dual goal of privacy preservation as well as an accuracy of data mining taskclustering and classification  ...  On the other hand data privacy concerns may prevent data owners from sharing information for data analysis.  ...  K-Mean Clustering algorithm using WEKA data mining tool in MOA framework has been simulated to evaluate the accuracy of proposed privacy preserving approach.  ... 
doi:10.5121/ijdkp.2013.3305 fatcat:ynwhtdmpovhwrnwxnawtwk4viu

Classification and Evaluation the Privacy Preserving Data Mining Techniques by using a Data Modification-based Framework [article]

MohammadReza Keyvanpour (Department of Computer Engineering Al-Zahra University), Somayyeh Seifi Moradi (Department of Computer Engineering Islamic Azad University)
2011 arXiv   pre-print
This paper presents a Data modification- based Framework for classification and evaluation of the privacy preserving data mining techniques.  ...  The proposed framework provides a good basis for more accurate comparison of the given techniques to privacy preserving data mining.  ...  CONCLUSION In this paper, a data modification-based framework was presented for classification and evaluation the Privacy Preserving Data Mining techniques.  ... 
arXiv:1105.1945v1 fatcat:e76tpeopyrdwlfvhgojdx6iuva

Analysis and Design of Secured Privacy Data Mining Environment

2015 International Journal of Science and Research (IJSR)  
Finally, we share directions for future research. We provide a review of the state-of-the-art methods for privacy and analyze the representative technique for privacy preserving data mining.  ...  Privacy preserving data mining has become increasingly popular because it allows sharing of privacy Sensitive data for analysis purposes.  ...  Future research can consider testing the proposed evaluation framework for other privacy preservation algorithms, such as data distortion or ccryptography methods.  ... 
doi:10.21275/v4i11.sub159030 fatcat:zrtil7wrencqzkibs5pkyvkqke

A Generic Scaffold Housing the Innovative Modus Operandi for Selection of the Superlative Anonymisation Technique for Optimized Privacy Preserving Data Mining [chapter]

J. Indumathi
2012 Data Mining Applications in Engineering and Medicine  
It is crucial that this cost must be reserved to a minimum for a distributed privacy preserving data mining algorithm. ii.  ...  A introductory list of appraisal parameters to be used for assessing the worth of privacy preserving data mining algorithms, is given below: i.  ... 
doi:10.5772/49982 fatcat:di63yjpsdbhwvg5vh2k6vny2ti

An Overview of Privacy Preserving Data Mining

Xinjun Qi, Mingkui Zong
2012 Procedia Environmental Sciences  
Evaluation of Privacy Protection Algorithms An important aspect on privacy preserving data mining algorithms and tools for developing and evaluating is to select the appropriate evaluation criteria, but  ...  Finally, in addition to the field-driven research, a framework for estimating and comparing a variety of privacy protection data mining algorithms should be design.  ... 
doi:10.1016/j.proenv.2012.01.432 fatcat:qdf72pz7z5dmdi2ezsux4ucxcq

Privacy Preserving Data Mining: A Parametric Analysis [chapter]

Darshana Patel, Radhika Kotecha
2017 Advances in Intelligent Systems and Computing  
Future research can consider testing the proposed evaluation framework for other privacy preservation algorithms, such as data distortion or ccryptography methods.  ...  PPDM is a novel research direction in data mining. A number of methods and techniques have been developed for privacy preserving data mining.  ...  A Fig. 1 1 Classification of Privacy preserving techniques III.PRIVACY PRESERVING DATA MINING ALGORITHM  ... 
doi:10.1007/978-981-10-3156-4_14 fatcat:svr4ef6nyrdzpelxwgjv2ehhu4

A review on Privacy Preservation and Collaborative Data Mining

Amit Kumar
2015 INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY  
In consequence of all these method some data mining technique is used. The data mining technique provide Varity of algorithm for privacy preservation.  ...  Data collection is a necessary step in data mining process. Due to privacy reasons, collecting data from different parries becomes difficult.  ...  [6] presents a Framework for classification and evaluation of the privacy preserving data mining techniques for distributed data scenario.  ... 
doi:10.24297/ijct.v14i12.1777 fatcat:bzud5js4ljgr3bfifvcifl4h3q

State-of-the-art in privacy preserving data mining

Vassilios S. Verykios, Elisa Bertino, Igor Nai Fovino, Loredana Parasiliti Provenza, Yucel Saygin, Yannis Theodoridis
2004 SIGMOD record  
We provide here an overview of the new and rapidly emerging research area of privacy preserving data mining.  ...  A brief evaluation is performed, and some initial conclusions are made.  ...  Evaluation of Privacy Preserving Algorithms An important aspect in the development and assessment of algorithms and tools, for privacy preserving data mining is the identification of suitable evaluation  ... 
doi:10.1145/974121.974131 fatcat:qkmvmq5a2bhp5fsdlrbhne626e

Privacy-Preserving Process Mining in Healthcare

Anastasiia Pika, Moe T. Wynn, Stephanus Budiono, Arthur H.M. ter Hofstede, Wil M.P. van der Aalst, Hajo A. Reijers
2020 International Journal of Environmental Research and Public Health  
We describe a framework for privacy-preserving process mining thatcan support healthcare process mining analyses.  ...  The need to comply with strict privacy requirements mayresult in a decreased data utility for analysis.  ...  Healthcare data can include highly sensitive attributes preservation is tailored for specific data mining algorithms (e.g., a privacy-preserving approach for clustering of big data on cloud [21] or privacy-preserving  ... 
doi:10.3390/ijerph17051612 pmid:32131516 pmcid:PMC7084661 fatcat:cicpwfjvorhezh5gofom7minke

PPaaS: Privacy Preservation as a Service [article]

Pathum Chamikara Mahawaga Arachchige, Peter Bertok, Ibrahim Khalil, Dongxi Liu, Seyit Camtepe
2020 arXiv   pre-print
Different privacy-preserving approaches were developed for privacy preserving data sharing; however, identifying the best privacy-preservation approach for the privacy-preservation of a certain dataset  ...  This paper presents a framework named Privacy Preservation as a Service (PPaaS) to reduce this complexity.  ...  Bertino et al. proposed a framework for evaluating privacy-preserving data mining algorithms; for each algorithm, they focused on assessing the quality of the sanitized data ( [20] ).  ... 
arXiv:2007.02013v2 fatcat:3dwye765zrar7mwgg7xhhdebbu

A Comparative study of Multi Agent Based and High-Performance Privacy Preserving Data Mining

Md Faizan Farooqui, Md Muqeem, Dr. Md Rizwan Beg
2010 International Journal of Computer Applications  
This paper offers a detailed analysis of the agent framework for data mining and its overall architecture and functionality are presented and also challenges in developing PPDM algorithms with existing  ...  This paper discusses the comparative study between multi agent based data mining and high-performance privacy preserving data mining.  ...  As the field of Privacy Preserving Data Mining continues to evolve, yielding new algorithms and support for high-performance computing, Architecture for Private and High Performance Integrated Data Mining  ... 
doi:10.5120/876-1247 fatcat:6uvgi6jyz5bwliexqcg7qaisiy

Classification of Privacy-preserving Distributed Data Mining protocols

Zhuojia Xu, Xun Yi
2011 2011 Sixth International Conference on Digital Information Management  
We studied and revealed an elaborate taxonomy for classifying privacy-preserving distributed data mining algorithms.  ...  This thesis, thus, aims to provide a framework for classifying privacy-preserving distributed data mining protocols and compare the performance of different protocols based on the outcome of the classification  ...  Researchers have designed and developed some set of measuring metrics regarding privacy-preserving data mining. In [3], Elisa Bertino and Igor Nai Fovino proposed a framework for evaluating PPDM.  ... 
doi:10.1109/icdim.2011.6093356 dblp:conf/icdim/XuY11 fatcat:3i7gvn3s5fcrxhzftb2i32y7ni

Private-HERMES

Nikos Pelekis, Aris Gkoulalas-Divanis, Marios Vodas, Anargyros Plemenos, Despina Kopanaki, Yannis Theodoridis
2012 Proceedings of the 15th International Conference on Extending Database Technology - EDBT '12  
In this paper, we present Private-HERMES, an integrated platform for applying data mining and privacy-preserving querying over mobility data.  ...  blueprint benchmark architecture for privacy-preservation related methods in mobility data.  ...  Such an evaluation can be done by using clustering and frequent pattern mining techniques, appropriate for mobility data.  ... 
doi:10.1145/2247596.2247675 dblp:conf/edbt/PelekisGVPKT12 fatcat:kte32ycsjfgw7besgyj3573vue
« Previous Showing results 1 — 15 out of 13,528 results