A comprehensive review on privacy preserving data mining

Preservation of privacy in data mining has emerged as an absolute prerequisite for exchanging confidential information in terms of data analysis, validation, and publishing. Ever-escalating internet phishing posed severe threat on widespread propagation of sensitive information over the web. Convers...

Full description

Saved in:
Bibliographic Details
Main Authors: Aldeen, Yousra Abdul Alsahib S., Salleh, Mazleena, Razzaque, Mohammad Abdur A.
Format: Article
Published: Springer 2015
Subjects:
Online Access:http://eprints.utm.my/id/eprint/55437/
http://dx.doi.org/10.1186/s40064-015-1481-x
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.utm.55437
record_format eprints
spelling my.utm.554372017-02-15T06:44:26Z http://eprints.utm.my/id/eprint/55437/ A comprehensive review on privacy preserving data mining Aldeen, Yousra Abdul Alsahib S. Salleh, Mazleena Razzaque, Mohammad Abdur A. QA75 Electronic computers. Computer science Preservation of privacy in data mining has emerged as an absolute prerequisite for exchanging confidential information in terms of data analysis, validation, and publishing. Ever-escalating internet phishing posed severe threat on widespread propagation of sensitive information over the web. Conversely, the dubious feelings and contentions mediated unwillingness of various information providers towards the reliability protection of data from disclosure often results utter rejection in data sharing or incorrect information sharing. This article provides a panoramic overview on new perspective and systematic interpretation of a list published literatures via their meticulous organization in subcategories. The fundamental notions of the existing privacy preserving data mining methods, their merits, and shortcomings are presented. The current privacy preserving data mining techniques are classified based on distortion, association rule, hide association rule, taxonomy, clustering, associative classification, outsourced data mining, distributed, and k-anonymity, where their notable advantages and disadvantages are emphasized. This careful scrutiny reveals the past development, present research challenges, future trends, the gaps and weaknesses. Further significant enhancements for more robust privacy protection and preservation are affirmed to be mandatory. Springer 2015-12 Article PeerReviewed Aldeen, Yousra Abdul Alsahib S. and Salleh, Mazleena and Razzaque, Mohammad Abdur A. (2015) A comprehensive review on privacy preserving data mining. SpringerPlus, 4 (1). pp. 1-36. ISSN 2193-1801 http://dx.doi.org/10.1186/s40064-015-1481-x DOI:10.1186/s40064-015-1481-x
institution Universiti Teknologi Malaysia
building UTM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Teknologi Malaysia
content_source UTM Institutional Repository
url_provider http://eprints.utm.my/
topic QA75 Electronic computers. Computer science
spellingShingle QA75 Electronic computers. Computer science
Aldeen, Yousra Abdul Alsahib S.
Salleh, Mazleena
Razzaque, Mohammad Abdur A.
A comprehensive review on privacy preserving data mining
description Preservation of privacy in data mining has emerged as an absolute prerequisite for exchanging confidential information in terms of data analysis, validation, and publishing. Ever-escalating internet phishing posed severe threat on widespread propagation of sensitive information over the web. Conversely, the dubious feelings and contentions mediated unwillingness of various information providers towards the reliability protection of data from disclosure often results utter rejection in data sharing or incorrect information sharing. This article provides a panoramic overview on new perspective and systematic interpretation of a list published literatures via their meticulous organization in subcategories. The fundamental notions of the existing privacy preserving data mining methods, their merits, and shortcomings are presented. The current privacy preserving data mining techniques are classified based on distortion, association rule, hide association rule, taxonomy, clustering, associative classification, outsourced data mining, distributed, and k-anonymity, where their notable advantages and disadvantages are emphasized. This careful scrutiny reveals the past development, present research challenges, future trends, the gaps and weaknesses. Further significant enhancements for more robust privacy protection and preservation are affirmed to be mandatory.
format Article
author Aldeen, Yousra Abdul Alsahib S.
Salleh, Mazleena
Razzaque, Mohammad Abdur A.
author_facet Aldeen, Yousra Abdul Alsahib S.
Salleh, Mazleena
Razzaque, Mohammad Abdur A.
author_sort Aldeen, Yousra Abdul Alsahib S.
title A comprehensive review on privacy preserving data mining
title_short A comprehensive review on privacy preserving data mining
title_full A comprehensive review on privacy preserving data mining
title_fullStr A comprehensive review on privacy preserving data mining
title_full_unstemmed A comprehensive review on privacy preserving data mining
title_sort comprehensive review on privacy preserving data mining
publisher Springer
publishDate 2015
url http://eprints.utm.my/id/eprint/55437/
http://dx.doi.org/10.1186/s40064-015-1481-x
_version_ 1643653796912431104
score 13.212249