Proposed method for privacy preservation using perturbation and cryptography

Authors

  • Akash Siddhpura M.E. Scholar, Computer Engineering, Noble group of institutes, Junagadh
  • Prof. Daxa Vekariya Assistant Professor, Computer Engineering, Noble group of institutes, Junagadh
  • Dr. Vipul Vekariy Associate Professor, Computer Engineering, Noble group of institutes, Junagadh

Keywords:

Data Mining, Privacy Preserving Data Mining, Privacy Preserving, Cryptography, Encryption, Privacy Preserving Data Mining Techniques.

Abstract

Due to the wide deployment of information technology, privacy concern has been major issue in data
mining. So for that new path is identified which is known as Privacy Preserving Data Mining (PDDM). Available PDDM
techniques are Perturbation, Generalization, Anonymization, Randomization and Cryptography. All of them have some
advantages as well as disadvantages also. If apply only cryptography PDDM using symmetric key encryption algorithm,
then there will chances of losing data, because if anyone knows the key then data is available to anyone. If we apply
perturbation PDDM only then it will not give you accurate result. So if we will use cryptography and perturbation then it
will achieve security as well as very less chances of losing data after applying the privacy preserving.

Published

2017-11-25

How to Cite

Akash Siddhpura, Prof. Daxa Vekariya, & Dr. Vipul Vekariy. (2017). Proposed method for privacy preservation using perturbation and cryptography. International Journal of Advance Engineering and Research Development (IJAERD), 4(11), 1194–1197. Retrieved from https://ijaerd.org/index.php/IJAERD/article/view/4297