Loading...
Please wait, while we are loading the content...
Similar Documents
A survey of perturbation technique for privacy–preserving of data.
| Content Provider | CiteSeerX |
|---|---|
| Author | Ankleshwaria, Twinkle Dhobi, J. S. |
| Abstract | In recent years, the data mining techniques have met a serious challenge due to the increased concerning and worries of the privacy, that is, protecting the privacy of the critical and sensitive data Data perturbation is a popular technique for privacy preserving data mining. The approach protects the privacy of the data by perturbing the data through a method. The major challenge of data perturbation is to achieve the desired result between the level of data privacy and the level of data utility. Data privacy and data utility are commonly considered as a pair of conflicting requirements in privacy-preserving of data for applications and mining systems. Multiplicative perturbation algorithms aim at improving data privacy while maintaining the desired level of data utility by selectively preserving the mining task and model specific information during the data perturbation process. The multiplicative perturbation algorithm may find multiple data transformations that preserve the required data utility. Thus the next major challenge is to find a good transformation that provides a satisfactory level of privacy data. A number of perturbation methods have recently been proposed for privacy preserving data mining of multidimensional data records. This paper intends to reiterate several perturbation techniques for privacy preserving of data and then proceeds to evaluate and compare different technologies. Keywords-- Privacy Preserving, Perturbation, Data mining. 1. |
| File Format | |
| Access Restriction | Open |
| Subject Keyword | Data Mining Data Privacy Data Utility Satisfactory Level Multiplicative Perturbation Algorithm Aim Desired Result Privacy Data Data Perturbation Perturbation Method Multiple Data Transformation Data Perturbation Process Good Transformation Popular Technique Multidimensional Data Record Serious Challenge Next Major Challenge Desired Level Mining Task Model Specific Information Data Mining Technique Sensitive Data Data Perturbation Privacy Preserving Different Technology Required Data Utility Major Challenge Keywords Privacy Preserving Recent Year Several Perturbation Technique Multiplicative Perturbation Algorithm |
| Content Type | Text |
| Resource Type | Article |