Abstract
Data mining is the process of pattern recovery in multiple database fields. Big data is the great volume of data that is being processed in the environment of data mining. It is therefore impossible to use hand-held database management tools or typical data processing programme to collect data sets, so that data mining techniques have been deployed. An effective data transformation is a vital prerequisite for facilitating an efficient process for discovering information on a wider scale. I would want to mention that in present PPDM research, certain fundamental problems are not addressed. First of all, Privacy Preserving Data Mining (PPDM) does not have a standard terminology. Second, for the centralised database, most algorithms are developed. However, data are commonly stored in several sites in today’s global digital world. Third, many algorithms are focused on safeguarding the privacy of personal information, but do not focus on data mining results. There is no single approach to obtain data and to hide limitations. Fourth, each algorithm is specialised on data mining tasks primarily. No single strategy can work for any type of data clustering algorithm. Part of data privacy also is a crucial role in transforming data after data storage. These can be used as a guide to future PPDM research. Present research explores the privacy of data mining with various ways to approach the scope of new development approach.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Li D, Yu D (2014) Deep learning: methods and applications. Found Trends Signal Process, Now Publishers
Glauner PO (2015) Deep convolutional neural networks for smile recognition. arXiv preprint
Xiong M, Chen J, Wang Z, Liang C, Zheng Q, Han Z et al (2015) Deep feature representation via multiple stack auto-encoders. In: Advances in multimedia information processing—PCM 2015, Springer, pp 275–284
Olshausen BA (1996) Emergence of simple-cell receptive field properties by learning a sparse code for natural images. Nature 381:607–609
Gomes L (2014) Machine-learning maestro michael jordan on the delusions of big data and other huge engineering efforts. IEEE Spectr 20
Testolin A, Stoianov I, De Filippo De Grazia M, Zorzi M (2013) Deep unsupervised learning on a desktop PC: a primer for cognitive scientists. Front Psychol 4:10.3389
Swati K, Kumar S A comparative study of various data transformation techniques in data mining. Int J Sci Eng Technol 4(3):146–148, ISSN: 2277-1581
Gokulnath C, Priyan MK, Balan EV (2015) Preservation of privacy in data mining by using PCA based perturbation technique. In: 2015 International conference on smart technologies and management India, 6–8 May 2015, pp 202–206
Saritha K Sajimon Abraham big data challenges and issues: review on analytic techniques Indian Journal of Computer Science and Engineering (IJCSE)ISSN: 0976–5166 Vol. 8 No. 3 Jun-Jul 2017
Kiran A (2019) Data mining: random swapping based data perturbation technique for privacy preserving in data mining. Int J Recent Technol Eng (IJRTE) 8(1S4), ISSN: 2277-3878
Sharmila S, Vijayarani S (2017) Frequent item set mining and association rule generation using enhanced Apriori and enhanced Eclat algorithms. Int J Innov Res Comput Commun Eng 5(4)
Vijayarani S, Tamilarasi A (2010) Data transformation technique for protecting private information in privacy preserving data mining advanced computing. An Int J (ACIJ) 1(1)
Venkataramana S, Sekhar BVDS, Raju VS, Chakravarthy VVSSS, Srinivas G (2020) An experimental analysis of secure-energy trade-off using optimized routing protocol in modern-secure-WSN. EAI Endorsed Trans Scalable Inform Syst 7(26)
Kumar PK Novel framework for data transformation for yielding structured data in opinion mining. In: 2017 International conference on electrical, electronics, communication, computer and optimization techniques
Nethravathi NP, Rao PG CBTS: correlation based transformation strategy for privacy preserving data mining. In: IEEE transactions on knowledge and data engineering, vol 24, no 2, Feb 2012
Putri AW, Hira L (2016) Hybrid transformation in privacy-preserving data mining 978-1-5090-5671-2/16/©2016. IEEE
Yadav C, Wang S, Kumar M (2013) Algorithm and approaches to handle large Data-A Survey. IJCSN Int J Comput Sci Netw 2(3):2277–5420, ISSN (Online)
Fu Z A computational study of using genetic algorithms to develop intelligent decision trees 0-7803-6657-3/01/@Z0O O1. IEEE
Patil DV, Bichkar RS (2010) Multiple imputation of missing data with genetic algorithm based techniques. IJCA Special Issue on Evolutionary Comput Optim Tech ECOT
Zope AR, Vidhate A, Harale N (2013) Data mining approach in security information and event management. Int J Future Comput Commun 2(2)
Acharjya DP (2016) A survey on big data analytics: challenges, open research issues and tools. (IJACSA) Int J Adv Comput Sci Appl 7(2)
Saraireh S A secure data communication system using cryptography and steganography. Int J Comput Netw Commun (IJCNC) 5(3)
Akhil S, Uma K (2017) Survey on the challenges and issues on big data analytics. Int J Mech Eng Technol (IJMET) 8(12):138–149
Saidulu D (2017) Machine learning and statistical approaches for big data: issues, challenges and research directions. Int J Appl Eng Res 12(21):11691–11699, ISSN 0973-4562
Sivaram N, Ramar K (2010) Applicability of clustering and classification algorithms for recruitment data mining. Int J Comput Appl (0975–8887) 4(5)
Deshai N, Sekhar BVDS, Reddy PVGD, Chakravarthy VVSSS (2020) Processing real world datasets using big data Hadoop tools. J Sci Ind Res (JSIR) 79(7):631–635
Omana J, Monika S, Deepika B (2017) survey on efficiency of association rule mining techniques. Int J Comput Sci Mobile Comput 6(4):5–8
Karthikeyan T, Ravikumar N (2014) A survey on association rule mining. Int J Adv Res Comput Commun Eng 3(1)
Ying-hua L, Bing-ru Y, Dan-yang C, Nan M (2011) State-of-the-art in distributed privacy preserving data mining. In: IEEE 3rd international conference communication software and networks, pp 545–549
Mishra S, Mishra P (2014) A survey on association rule mining algorithms performance analysis. Int J Eng Res Technol (IJERT) 3(8), IJERTIJERT ISSN: 2278-0181
Natarajasivan D, Govindarajan M (2016) Context aware user interface recommendation system. Int J Innov Res Sci, Eng Technol 5(5), ISSN(Online): 2319-8753
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Jyothi, B., Lakshmi, V.N. (2023). Privacy Preserving Datamining Techniques with Data Security in Data Transformation. In: Satapathy, S.C., Lin, J.CW., Wee, L.K., Bhateja, V., Rajesh, T.M. (eds) Computer Communication, Networking and IoT. Lecture Notes in Networks and Systems, vol 459. Springer, Singapore. https://doi.org/10.1007/978-981-19-1976-3_34
Download citation
DOI: https://doi.org/10.1007/978-981-19-1976-3_34
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-1975-6
Online ISBN: 978-981-19-1976-3
eBook Packages: EngineeringEngineering (R0)