SlideShare a Scribd company logo
2
Most read
4
Most read
5
Most read
Sagar MukeshsinghVerma
Software Engineer
EEWTechnology
Nagpur Maharashtra India
1
Privacy Preserving Data Mining
Privacy preserving data publishing
2
A typical scenario for data collection and publishing is described in
Figure above. In the data collection phase, the data publisher collects
data from record owners (e.g., Alice and Bob).
Privacy preserving data publishing
In the data publishing phase, the data publisher releases the collected
data to a data miner or to the public, called the data recipient, who will
then conduct data mining on the published data. In this survey, data
mining has a broad sense, not necessarily restricted to pattern mining or
model building. For example, a hospital collects data from patients and
publishes the patient records to an external medical centre. In this
example, the hospital is the data publisher, patients are record owners,
and the medical centre is the data recipient.
3
Related work given in Base Paper
4
The base paper explain about the privacy preservation on publish data by
using anonymization technique through record elimination method. First
of all explain about type of attack on publish data.
There are two kind of major attack on publish data:-
1> Record linkage(Identity discloser attack)
2> Attribute linkage(Attribute discloser attack)
Identity discloser attack:-
Identity discloser occurs where new information about some
individual is revealed, i.e., the released data make it possible to infer the
characteristic of an individual more accurately than it would be possible
before the data release.
Attribute discloser attack:-
attribute discloser can occur with or without identity discloser. it
has been recognized that even discloser of false attribute information may
cause.
5
Related work given in Base Paper
In this paper the K-Anonymity technique used for preserve the publish data
with the comparison with other technique given below.
1> L-Diversity
2> T-Closeness
K-anonymity:- The data base said to be k-anonymous where attribute are
suppressed or generalized until each row is identical with at least k-1 other
row.
The data anonymization technique are :-
1> Generalization
2> Bucketization
3> Suppresion
6
Limitation/Drawback of k-anonymization technique
Some limitation of k-anonymity technique are given below:-
1> It does not hide whether a given individual is in the database.
2> It reveals individuals' sensitive attributes.
3> It does not protect against attacks based on background knowledge.
4> mere knowledge of the k-anonymization algorithm can violate privacy.
5> It cannot be applied to high-dimensional data without complete loss of
utility .
6> Special methods are required if a dataset is anonymized and published
more than once.
7
Literacy survey on paper t-Closeness: Privacy
Beyond k-Anonymity and -Diversity
The t-closeness Principle:-
An equivalence class is said to have t-closeness if the distance between the
distribution of a sensitive attribute in this class and the distribution of the
attribute in the whole table is no more than a threshold t. A table is said to
have t-closeness if all equivalence classes have t-closeness.
8
Proposed work with behalf of Base Paper
The proposed work on behalf of base paper I want to used:-
1> The concept of generalization
2> Slicing

More Related Content

PPTX
Lecture 14 Heuristic Search-A star algorithm
PPT
Cluster analysis
PPTX
K-Means manual work
PPTX
Data Reduction Stratergies
PPTX
Competitive Learning [Deep Learning And Nueral Networks].pptx
PPT
K mean-clustering
PDF
Decision Tree in Machine Learning
PDF
I.BEST FIRST SEARCH IN AI
Lecture 14 Heuristic Search-A star algorithm
Cluster analysis
K-Means manual work
Data Reduction Stratergies
Competitive Learning [Deep Learning And Nueral Networks].pptx
K mean-clustering
Decision Tree in Machine Learning
I.BEST FIRST SEARCH IN AI

What's hot (20)

PPT
Machine learning ICT
PPTX
Cluster Analysis
PDF
Outlier Detection
PPTX
Lecture 17 Iterative Deepening a star algorithm
PPTX
Queue ppt
PPTX
Astar algorithm
PPSX
Fundamentals of Neural Networks
PPT
Searching in c language
PPTX
Introduction to Clustering . pptx
PPT
CS8091_BDA_Unit_II_Clustering
PDF
Insertion Sort Algorithm
PPTX
Machine learning with ADA Boost
PDF
Data Science - Part III - EDA & Model Selection
PPTX
UNIT - 4: Data Warehousing and Data Mining
PPTX
ML - Multiple Linear Regression
PPTX
Hierarchical clustering
PPT
Heuristic Search Techniques Unit -II.ppt
PPT
12 symmetric key cryptography
PPTX
List in Python
PPTX
Recursion and Sorting Algorithms
Machine learning ICT
Cluster Analysis
Outlier Detection
Lecture 17 Iterative Deepening a star algorithm
Queue ppt
Astar algorithm
Fundamentals of Neural Networks
Searching in c language
Introduction to Clustering . pptx
CS8091_BDA_Unit_II_Clustering
Insertion Sort Algorithm
Machine learning with ADA Boost
Data Science - Part III - EDA & Model Selection
UNIT - 4: Data Warehousing and Data Mining
ML - Multiple Linear Regression
Hierarchical clustering
Heuristic Search Techniques Unit -II.ppt
12 symmetric key cryptography
List in Python
Recursion and Sorting Algorithms
Ad

Viewers also liked (20)

PPT
Data mining and privacy preserving in data mining
PDF
Privacy Preserving Data Mining
PPT
slides
PDF
A Review Study on the Privacy Preserving Data Mining Techniques and Approaches
PPTX
Cryptography for privacy preserving data mining
PDF
ARX - a comprehensive tool for anonymizing / de-identifying biomedical data
PDF
ARX - a comprehensive tool for anonymizing / de-identifying biomedical data
PDF
Data Privacy: Anonymization & Re-Identification
PDF
Privacy Preserving Data Mining
PDF
Engineering data privacy - The ARX data anonymization tool
PDF
An overview of methods for data anonymization
PDF
Наука Выживания Л. Рон Хаббард
PPTX
The Concept Of Recycling In Phoenix
PDF
Maturing_Project_Mgmt_Practice_at_National_R&D Lab
PPS
Zamora
PPTX
N.Gencevi
PPTX
Cheap Vacation Trips For Summer
PPTX
Estructura discreta para video
PPTX
Punctuationpowerpoint 100302004113-phpapp02
DOCX
Estructura Discreta I
Data mining and privacy preserving in data mining
Privacy Preserving Data Mining
slides
A Review Study on the Privacy Preserving Data Mining Techniques and Approaches
Cryptography for privacy preserving data mining
ARX - a comprehensive tool for anonymizing / de-identifying biomedical data
ARX - a comprehensive tool for anonymizing / de-identifying biomedical data
Data Privacy: Anonymization & Re-Identification
Privacy Preserving Data Mining
Engineering data privacy - The ARX data anonymization tool
An overview of methods for data anonymization
Наука Выживания Л. Рон Хаббард
The Concept Of Recycling In Phoenix
Maturing_Project_Mgmt_Practice_at_National_R&D Lab
Zamora
N.Gencevi
Cheap Vacation Trips For Summer
Estructura discreta para video
Punctuationpowerpoint 100302004113-phpapp02
Estructura Discreta I
Ad

Similar to Privacy preserving dm_ppt (20)

PDF
Performance Analysis of Hybrid Approach for Privacy Preserving in Data Mining
PDF
78201919
PDF
78201919
PDF
A Review on Privacy Preservation in Data Mining
PDF
A review on privacy preservation in data mining
PDF
A Review on Privacy Preservation in Data Mining
PDF
A Review on Privacy Preservation in Data Mining
PDF
Privacy Preserving by Anonymization Approach
PDF
Enhanced Privacy Preserving Accesscontrol in Incremental Datausing Microaggre...
PPTX
Privacy preserving in data mining with hybrid approach
PDF
A Comparative Study on Privacy Preserving Datamining Techniques
PDF
Data Anonymization Process Challenges and Context Missions
PDF
Data Anonymization Process Challenges and Context Missions
PDF
A survey on privacy preserving data publishing
PDF
Enabling Use of Dynamic Anonymization for Enhanced Security in Cloud
PDF
An New Attractive Mage Technique Using L-Diversity
PDF
Ak Anonymity Clustering Method for Effective Data Privacy Preservation 1st Ed...
PDF
Cp34550555
PDF
Provider Aware Anonymization Algorithm for Preserving M - Privacy
PDF
IRJET- Privacy Preservation using Apache Spark
Performance Analysis of Hybrid Approach for Privacy Preserving in Data Mining
78201919
78201919
A Review on Privacy Preservation in Data Mining
A review on privacy preservation in data mining
A Review on Privacy Preservation in Data Mining
A Review on Privacy Preservation in Data Mining
Privacy Preserving by Anonymization Approach
Enhanced Privacy Preserving Accesscontrol in Incremental Datausing Microaggre...
Privacy preserving in data mining with hybrid approach
A Comparative Study on Privacy Preserving Datamining Techniques
Data Anonymization Process Challenges and Context Missions
Data Anonymization Process Challenges and Context Missions
A survey on privacy preserving data publishing
Enabling Use of Dynamic Anonymization for Enhanced Security in Cloud
An New Attractive Mage Technique Using L-Diversity
Ak Anonymity Clustering Method for Effective Data Privacy Preservation 1st Ed...
Cp34550555
Provider Aware Anonymization Algorithm for Preserving M - Privacy
IRJET- Privacy Preservation using Apache Spark

More from Sagar Verma (10)

PPTX
Java Class 6 | Java Class 6 |Threads in Java| Applets | Swing GUI | JDBC | Ac...
PPTX
Collection Framework in Java | Generics | Input-Output in Java | Serializatio...
PPTX
Statics in java | Constructors | Exceptions in Java | String in java| class 3
PPTX
OOPS in java | Super and this Keyword | Memory Management in java | pacakages...
PPT
Core Java Programming | Data Type | operator | java Control Flow| Class 2
PPT
Java introduction
PPT
Hibernate introduction
PPT
Springboot introduction
PDF
2015-16 software project list
DOC
Ns2 new project list
Java Class 6 | Java Class 6 |Threads in Java| Applets | Swing GUI | JDBC | Ac...
Collection Framework in Java | Generics | Input-Output in Java | Serializatio...
Statics in java | Constructors | Exceptions in Java | String in java| class 3
OOPS in java | Super and this Keyword | Memory Management in java | pacakages...
Core Java Programming | Data Type | operator | java Control Flow| Class 2
Java introduction
Hibernate introduction
Springboot introduction
2015-16 software project list
Ns2 new project list

Recently uploaded (20)

PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PDF
Digital Logic Computer Design lecture notes
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PPT
Mechanical Engineering MATERIALS Selection
PPTX
OOP with Java - Java Introduction (Basics)
PDF
Arduino robotics embedded978-1-4302-3184-4.pdf
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PPTX
UNIT 4 Total Quality Management .pptx
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
PPTX
Lesson 3_Tessellation.pptx finite Mathematics
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PPT
Project quality management in manufacturing
PDF
PPT on Performance Review to get promotions
PPTX
additive manufacturing of ss316l using mig welding
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
Digital Logic Computer Design lecture notes
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
Mechanical Engineering MATERIALS Selection
OOP with Java - Java Introduction (Basics)
Arduino robotics embedded978-1-4302-3184-4.pdf
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
UNIT 4 Total Quality Management .pptx
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
Lesson 3_Tessellation.pptx finite Mathematics
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
Project quality management in manufacturing
PPT on Performance Review to get promotions
additive manufacturing of ss316l using mig welding
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf

Privacy preserving dm_ppt

  • 1. Sagar MukeshsinghVerma Software Engineer EEWTechnology Nagpur Maharashtra India 1 Privacy Preserving Data Mining
  • 2. Privacy preserving data publishing 2 A typical scenario for data collection and publishing is described in Figure above. In the data collection phase, the data publisher collects data from record owners (e.g., Alice and Bob).
  • 3. Privacy preserving data publishing In the data publishing phase, the data publisher releases the collected data to a data miner or to the public, called the data recipient, who will then conduct data mining on the published data. In this survey, data mining has a broad sense, not necessarily restricted to pattern mining or model building. For example, a hospital collects data from patients and publishes the patient records to an external medical centre. In this example, the hospital is the data publisher, patients are record owners, and the medical centre is the data recipient. 3
  • 4. Related work given in Base Paper 4 The base paper explain about the privacy preservation on publish data by using anonymization technique through record elimination method. First of all explain about type of attack on publish data. There are two kind of major attack on publish data:- 1> Record linkage(Identity discloser attack) 2> Attribute linkage(Attribute discloser attack) Identity discloser attack:- Identity discloser occurs where new information about some individual is revealed, i.e., the released data make it possible to infer the characteristic of an individual more accurately than it would be possible before the data release. Attribute discloser attack:- attribute discloser can occur with or without identity discloser. it has been recognized that even discloser of false attribute information may cause.
  • 5. 5 Related work given in Base Paper In this paper the K-Anonymity technique used for preserve the publish data with the comparison with other technique given below. 1> L-Diversity 2> T-Closeness K-anonymity:- The data base said to be k-anonymous where attribute are suppressed or generalized until each row is identical with at least k-1 other row. The data anonymization technique are :- 1> Generalization 2> Bucketization 3> Suppresion
  • 6. 6 Limitation/Drawback of k-anonymization technique Some limitation of k-anonymity technique are given below:- 1> It does not hide whether a given individual is in the database. 2> It reveals individuals' sensitive attributes. 3> It does not protect against attacks based on background knowledge. 4> mere knowledge of the k-anonymization algorithm can violate privacy. 5> It cannot be applied to high-dimensional data without complete loss of utility . 6> Special methods are required if a dataset is anonymized and published more than once.
  • 7. 7 Literacy survey on paper t-Closeness: Privacy Beyond k-Anonymity and -Diversity The t-closeness Principle:- An equivalence class is said to have t-closeness if the distance between the distribution of a sensitive attribute in this class and the distribution of the attribute in the whole table is no more than a threshold t. A table is said to have t-closeness if all equivalence classes have t-closeness.
  • 8. 8 Proposed work with behalf of Base Paper The proposed work on behalf of base paper I want to used:- 1> The concept of generalization 2> Slicing