SlideShare a Scribd company logo
Seminar Title
Privacy preserving on
Agenda
 Data Mining
 Why data mining
 Solution
 Applications of data mining
 Privacy Preservation with data mining
 Objectives
 Techniques
 Advantages
 Disadvantages
 Applications of PPDM
 Conclusion
 References
Data Mining
 The task of discovering interesting patterns from
large amount of data.
 Process of Analyzing data from different sources into
useful information.
Why data mining
 Data explosion problem
 Advance data collection tools and database
technology leads to tremendous amount of
data stored in database.
 We are drowning data but starving for
knowledge.
Solution
1) Data Warehouse - for storing large amount
of data
2) Data Mining - Extracting required
knowledge.
Applications
Industry Application
Finance Credit Card Analysis
Insurance Claims and Fraud Analysis
Telecommunication Call record Analysis
Transport Logistic Analysis
Consumer Goods Promotion analysis
Scientific Research Image, Audio, Video
Security Intrusion Detection System
Privacy Preservation with data mining
 Sensitive information should not be disclosed.
 Data mining aims to extract useful information from huge data where privacy
preserving aims to protect data against loss.
 Protect users information from intruders.
 Thus privacy is important for data mining application and also for
government because there are so many applications of data mining to handle
terrorisms.
 Preserve privacy while data collection and mining.
Objectives
 Perform data mining on union of two private data.
 Private data – users can not see internal data but can see
output.
 Achieving data mining goals without scarifying the
privacy of users.
 Develop an algorithm for modifying the original data
but private data and knowledge remain private after
mining process.
Techniques
 Data Perturbation
 Blocking Based Technique
 Cryptographic Technique
 Hybrid Technique
 Condensation Approach Technique
Advantages
 Help in development of various data mining
techniques.
 Allow safe sharing of large amount of data.
 Allow privacy for sensitive data.
 Track the current and large amount of data by
using Data Mining technique.
Disadvantages
 Need to improve technology.
 Hackers are smart to hack data.
Applications
 Improve customer services.
 Speed up the drug investigation.
 Homeland security.
 Medical database mining.
 Customer transaction.
Conclusion
Due to right to privacy in information, PPDM
has one of the newest trend in privacy and security
and data mining research. Data mining is useful to
extract required pattern from large amount of data
where privacy on data mining keep information
safe.
References
 International Journal of Advanced Research in Computer and
Communication Engineering Vol. 2, Issue 4, April 2013.
 International Journal of Computer Applications Technology and
Research Volume 3- Issue 7, 403-408, July 2014.
 International Journal of Innovative Research in Computer and
Communication Engineering (An ISO 3297: 2007 Certified
Organization) Vol. 2, Special Issue 3, July 2015.
 International Journal on Cybernetics and Informatics (IJCI) Vol. 3, No.
1, February 2014.
Privacy preserving on

More Related Content

PDF
E04623438
PPTX
Reconsidering IoT with respect to the GDPR
PPTX
Ethics, Professionalism and Other Emerging Technologies
PDF
www.ijerd.com
PPTX
Iot enabled technologies
PPTX
Business models for business processes on IoT
PDF
Big Data and Information Security
PPTX
Communication technologies
E04623438
Reconsidering IoT with respect to the GDPR
Ethics, Professionalism and Other Emerging Technologies
www.ijerd.com
Iot enabled technologies
Business models for business processes on IoT
Big Data and Information Security
Communication technologies

What's hot (20)

PPTX
Project Topics Information Technology
PDF
Ib3514141422
PPTX
International Journal on Cryptography and Information Security ( IJCIS)
PDF
Content an Insight to Security Paradigm for BigData on Cloud: Current Trend a...
PDF
International Journal on Cryptography and Information Security ( IJCIS)
PDF
Uncover important digital evidence with digital forensic tools
PDF
Privacy Preserving Data Mining
PDF
Privacy Preserving Data Mining
PDF
Internet of things (io t)
PDF
A Review Study on the Privacy Preserving Data Mining Techniques and Approaches
PPTX
SMART HEALTH AND Internet of Things (IoT) - RESEARCH Opportunities
PPTX
Research Topics in Network Security for PhD
PPTX
Nordic Tryggve project
PPT
PDF
International Journal of Engineering Research and Development (IJERD)
PPTX
Sources of IoT (JNTUK - UNIT 1)
PPTX
Privacy preserving in data mining with hybrid approach
PDF
Internet of Things Scalability
PDF
Real World Application of Big Data In Data Mining Tools
Project Topics Information Technology
Ib3514141422
International Journal on Cryptography and Information Security ( IJCIS)
Content an Insight to Security Paradigm for BigData on Cloud: Current Trend a...
International Journal on Cryptography and Information Security ( IJCIS)
Uncover important digital evidence with digital forensic tools
Privacy Preserving Data Mining
Privacy Preserving Data Mining
Internet of things (io t)
A Review Study on the Privacy Preserving Data Mining Techniques and Approaches
SMART HEALTH AND Internet of Things (IoT) - RESEARCH Opportunities
Research Topics in Network Security for PhD
Nordic Tryggve project
International Journal of Engineering Research and Development (IJERD)
Sources of IoT (JNTUK - UNIT 1)
Privacy preserving in data mining with hybrid approach
Internet of Things Scalability
Real World Application of Big Data In Data Mining Tools
Ad

Similar to Privacy preserving on (20)

PDF
Privacy Preserving Data Mining Using Inverse Frequent ItemSet Mining Approach
PDF
A Survey Paper on an Integrated Approach for Privacy Preserving In High Dimen...
PDF
Fundamentals of data mining and its applications
PDF
Modern Methods for Managing Data Security
PDF
Big Data: Privacy and Security Aspects
PDF
Witdom overview 2016
PDF
Data Mining Applications And Feature Scope Survey
PDF
A Review on Privacy Preservation in Data Mining
PDF
A Review on Privacy Preservation in Data Mining
PDF
A Review on Privacy Preservation in Data Mining
PDF
A review on privacy preservation in data mining
PDF
IRJET- Big Data Privacy and Security Challenges in Industries
PDF
J017536064
PDF
Good Practices and Recommendations on the Security and Resilience of Big Data...
PDF
Data security and privacy
PPTX
Basic principles to information privacy in data mining & data warehouse
PPT
Data mining and privacy preserving in data mining
PDF
DATA SCIENCE METHODOLOGY FOR CYBERSECURITY PROJECTS
PDF
Two-Phase TDS Approach for Data Anonymization To Preserving Bigdata Privacy
PDF
The Survey of Data Mining Applications And Feature Scope
Privacy Preserving Data Mining Using Inverse Frequent ItemSet Mining Approach
A Survey Paper on an Integrated Approach for Privacy Preserving In High Dimen...
Fundamentals of data mining and its applications
Modern Methods for Managing Data Security
Big Data: Privacy and Security Aspects
Witdom overview 2016
Data Mining Applications And Feature Scope Survey
A Review on Privacy Preservation in Data Mining
A Review on Privacy Preservation in Data Mining
A Review on Privacy Preservation in Data Mining
A review on privacy preservation in data mining
IRJET- Big Data Privacy and Security Challenges in Industries
J017536064
Good Practices and Recommendations on the Security and Resilience of Big Data...
Data security and privacy
Basic principles to information privacy in data mining & data warehouse
Data mining and privacy preserving in data mining
DATA SCIENCE METHODOLOGY FOR CYBERSECURITY PROJECTS
Two-Phase TDS Approach for Data Anonymization To Preserving Bigdata Privacy
The Survey of Data Mining Applications And Feature Scope
Ad

Recently uploaded (20)

DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PDF
Digital Logic Computer Design lecture notes
PPTX
Geodesy 1.pptx...............................................
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PPTX
Lesson 3_Tessellation.pptx finite Mathematics
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PDF
PPT on Performance Review to get promotions
PPT
Mechanical Engineering MATERIALS Selection
PPTX
Sustainable Sites - Green Building Construction
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
Digital Logic Computer Design lecture notes
Geodesy 1.pptx...............................................
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
Lesson 3_Tessellation.pptx finite Mathematics
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
Embodied AI: Ushering in the Next Era of Intelligent Systems
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PPT on Performance Review to get promotions
Mechanical Engineering MATERIALS Selection
Sustainable Sites - Green Building Construction
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
CYBER-CRIMES AND SECURITY A guide to understanding
Operating System & Kernel Study Guide-1 - converted.pdf

Privacy preserving on

  • 3. Agenda  Data Mining  Why data mining  Solution  Applications of data mining  Privacy Preservation with data mining  Objectives  Techniques  Advantages  Disadvantages  Applications of PPDM  Conclusion  References
  • 4. Data Mining  The task of discovering interesting patterns from large amount of data.  Process of Analyzing data from different sources into useful information.
  • 5. Why data mining  Data explosion problem  Advance data collection tools and database technology leads to tremendous amount of data stored in database.  We are drowning data but starving for knowledge.
  • 6. Solution 1) Data Warehouse - for storing large amount of data 2) Data Mining - Extracting required knowledge.
  • 7. Applications Industry Application Finance Credit Card Analysis Insurance Claims and Fraud Analysis Telecommunication Call record Analysis Transport Logistic Analysis Consumer Goods Promotion analysis Scientific Research Image, Audio, Video Security Intrusion Detection System
  • 8. Privacy Preservation with data mining  Sensitive information should not be disclosed.  Data mining aims to extract useful information from huge data where privacy preserving aims to protect data against loss.  Protect users information from intruders.  Thus privacy is important for data mining application and also for government because there are so many applications of data mining to handle terrorisms.  Preserve privacy while data collection and mining.
  • 9. Objectives  Perform data mining on union of two private data.  Private data – users can not see internal data but can see output.  Achieving data mining goals without scarifying the privacy of users.  Develop an algorithm for modifying the original data but private data and knowledge remain private after mining process.
  • 10. Techniques  Data Perturbation  Blocking Based Technique  Cryptographic Technique  Hybrid Technique  Condensation Approach Technique
  • 11. Advantages  Help in development of various data mining techniques.  Allow safe sharing of large amount of data.  Allow privacy for sensitive data.  Track the current and large amount of data by using Data Mining technique.
  • 12. Disadvantages  Need to improve technology.  Hackers are smart to hack data.
  • 13. Applications  Improve customer services.  Speed up the drug investigation.  Homeland security.  Medical database mining.  Customer transaction.
  • 14. Conclusion Due to right to privacy in information, PPDM has one of the newest trend in privacy and security and data mining research. Data mining is useful to extract required pattern from large amount of data where privacy on data mining keep information safe.
  • 15. References  International Journal of Advanced Research in Computer and Communication Engineering Vol. 2, Issue 4, April 2013.  International Journal of Computer Applications Technology and Research Volume 3- Issue 7, 403-408, July 2014.  International Journal of Innovative Research in Computer and Communication Engineering (An ISO 3297: 2007 Certified Organization) Vol. 2, Special Issue 3, July 2015.  International Journal on Cybernetics and Informatics (IJCI) Vol. 3, No. 1, February 2014.