An approach of Privacy Preserving Data mining using Perturbation & Cryptography Technique

Main Article Content

Akash Siddhpura, Prof. Daxa V. Vekariya

Abstract

Due to the wide deployment of information technology, privacy concern has been major issue in data mining. So for that new path is identified which is known as Privacy Preserving Data Mining (PDDM). Available PDDM techniques are Perturbation, Generalization, Anonymization, Randomization and Cryptography. All of them have some advantages as well as disadvantages also. If apply only cryptography PDDM using symmetric key encryption algorithm, then there will chances of losing data, because if anyone knows the key then data is available to anyone. If we apply perturbation PDDM only then it will not give you accurate result. So if we will use cryptography and perturbation then it will achieve security as well as very less chances of losing data after applying the privacy preserving.

Article Details

How to Cite
, A. S. P. D. V. V. (2018). An approach of Privacy Preserving Data mining using Perturbation & Cryptography Technique. International Journal on Future Revolution in Computer Science &Amp; Communication Engineering, 4(4), 255–259. Retrieved from http://www.ijfrcsce.org/index.php/ijfrcsce/article/view/1509
Section
Articles