z-logo
open-access-imgOpen Access
Review: Privacy Preserving and Sensitive Data Hiding Methods
Author(s) -
Sonu Tomar,
Piyush Kumar Singh
Publication year - 2015
Publication title -
journal of advance research in computer science and engineering (issn 2456-3552)
Language(s) - English
Resource type - Journals
ISSN - 2456-3552
DOI - 10.53555/nncse.v2i1.511
Subject(s) - internet privacy , computer science , information sensitivity , personally identifiable information , usability , information privacy , computer security , information hiding , identity (music) , data science , human–computer interaction , artificial intelligence , physics , embedding , acoustics
Privacy preserving data mining deals with hiding an individual’s sensitive identity without sacrificing the usability of data. It has become a very important area of concern but still this branch of research is in its infancy .People today have become well aware of the privacy intrusions of their sensitive data and are very reluctant to share their information. The major area of concern is that non-sensitive data even may deliver sensitive information, including personal information, facts or patterns. Several techniques of privacy preserving data mining have been proposed in literature.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom