Hybrid solution for privacy preserving data mining on the cloud computing

The continuous evolution of the cloud has attracted many enterprises to outsource their data to the cloud to accomplish data mining tasks and other services. So that data owners can enjoy the benefits of the cloud without fear from violations of data privacy, PPDM approaches came to protect the priv...

Full description

Saved in:
Bibliographic Details
Main Authors: Osman, Huda, Maarof, Mohd. Aizaini, Md. Siraj, Maheyzah
Format: Conference or Workshop Item
Published: 2020
Subjects:
Online Access:http://eprints.utm.my/id/eprint/89882/
http://dx.doi.org/10.1007/978-3-030-33582-3_70
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:The continuous evolution of the cloud has attracted many enterprises to outsource their data to the cloud to accomplish data mining tasks and other services. So that data owners can enjoy the benefits of the cloud without fear from violations of data privacy, PPDM approaches came to protect the privacy of data while preserving the usefulness of data. This article reviews the most popular models of PPDM over the cloud along with their strengths and the weaknesses to conclude the research gap. Some of the current PPDM models still vulnerable to various types of attacks like the K-anonymity model whereby surface from background knowledge attack, homogeneity attack, similarity attack and probabilistic inference attack, others of them consume great computational complexity, for example, the methods which depended on cryptography. The hybrid solution was proposed to protect the data privacy and overcome the current problems of PPDM include identify and attributes disclosures whereby preservation the privacy of data before to outsourced on the cloud is the main focus. K-Anonymization is combined with homomorphic encryption to rid from their limitations and take their advantage together to enhance data privacy-preserving and maintain the data utility of outsourced data.