Cargando…

A comprehensive review on privacy preserving data mining

Preservation of privacy in data mining has emerged as an absolute prerequisite for exchanging confidential information in terms of data analysis, validation, and publishing. Ever-escalating internet phishing posed severe threat on widespread propagation of sensitive information over the web. Convers...

Descripción completa

Detalles Bibliográficos
Autores principales: Aldeen, Yousra Abdul Alsahib S., Salleh, Mazleena, Razzaque, Mohammad Abdur
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Springer International Publishing 2015
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4643068/
https://www.ncbi.nlm.nih.gov/pubmed/26587362
http://dx.doi.org/10.1186/s40064-015-1481-x
_version_ 1782400462711947264
author Aldeen, Yousra Abdul Alsahib S.
Salleh, Mazleena
Razzaque, Mohammad Abdur
author_facet Aldeen, Yousra Abdul Alsahib S.
Salleh, Mazleena
Razzaque, Mohammad Abdur
author_sort Aldeen, Yousra Abdul Alsahib S.
collection PubMed
description Preservation of privacy in data mining has emerged as an absolute prerequisite for exchanging confidential information in terms of data analysis, validation, and publishing. Ever-escalating internet phishing posed severe threat on widespread propagation of sensitive information over the web. Conversely, the dubious feelings and contentions mediated unwillingness of various information providers towards the reliability protection of data from disclosure often results utter rejection in data sharing or incorrect information sharing. This article provides a panoramic overview on new perspective and systematic interpretation of a list published literatures via their meticulous organization in subcategories. The fundamental notions of the existing privacy preserving data mining methods, their merits, and shortcomings are presented. The current privacy preserving data mining techniques are classified based on distortion, association rule, hide association rule, taxonomy, clustering, associative classification, outsourced data mining, distributed, and k-anonymity, where their notable advantages and disadvantages are emphasized. This careful scrutiny reveals the past development, present research challenges, future trends, the gaps and weaknesses. Further significant enhancements for more robust privacy protection and preservation are affirmed to be mandatory.
format Online
Article
Text
id pubmed-4643068
institution National Center for Biotechnology Information
language English
publishDate 2015
publisher Springer International Publishing
record_format MEDLINE/PubMed
spelling pubmed-46430682015-11-19 A comprehensive review on privacy preserving data mining Aldeen, Yousra Abdul Alsahib S. Salleh, Mazleena Razzaque, Mohammad Abdur Springerplus Review Preservation of privacy in data mining has emerged as an absolute prerequisite for exchanging confidential information in terms of data analysis, validation, and publishing. Ever-escalating internet phishing posed severe threat on widespread propagation of sensitive information over the web. Conversely, the dubious feelings and contentions mediated unwillingness of various information providers towards the reliability protection of data from disclosure often results utter rejection in data sharing or incorrect information sharing. This article provides a panoramic overview on new perspective and systematic interpretation of a list published literatures via their meticulous organization in subcategories. The fundamental notions of the existing privacy preserving data mining methods, their merits, and shortcomings are presented. The current privacy preserving data mining techniques are classified based on distortion, association rule, hide association rule, taxonomy, clustering, associative classification, outsourced data mining, distributed, and k-anonymity, where their notable advantages and disadvantages are emphasized. This careful scrutiny reveals the past development, present research challenges, future trends, the gaps and weaknesses. Further significant enhancements for more robust privacy protection and preservation are affirmed to be mandatory. Springer International Publishing 2015-11-12 /pmc/articles/PMC4643068/ /pubmed/26587362 http://dx.doi.org/10.1186/s40064-015-1481-x Text en © Aldeen et al. 2015 Open AccessThis article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.
spellingShingle Review
Aldeen, Yousra Abdul Alsahib S.
Salleh, Mazleena
Razzaque, Mohammad Abdur
A comprehensive review on privacy preserving data mining
title A comprehensive review on privacy preserving data mining
title_full A comprehensive review on privacy preserving data mining
title_fullStr A comprehensive review on privacy preserving data mining
title_full_unstemmed A comprehensive review on privacy preserving data mining
title_short A comprehensive review on privacy preserving data mining
title_sort comprehensive review on privacy preserving data mining
topic Review
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4643068/
https://www.ncbi.nlm.nih.gov/pubmed/26587362
http://dx.doi.org/10.1186/s40064-015-1481-x
work_keys_str_mv AT aldeenyousraabdulalsahibs acomprehensivereviewonprivacypreservingdatamining
AT sallehmazleena acomprehensivereviewonprivacypreservingdatamining
AT razzaquemohammadabdur acomprehensivereviewonprivacypreservingdatamining
AT aldeenyousraabdulalsahibs comprehensivereviewonprivacypreservingdatamining
AT sallehmazleena comprehensivereviewonprivacypreservingdatamining
AT razzaquemohammadabdur comprehensivereviewonprivacypreservingdatamining