{"title":"Contemporary trends in privacy preserving collaborative data mining- A survey","authors":"A. Shah, R. Gulati","doi":"10.1109/EESCO.2015.7254044","DOIUrl":null,"url":null,"abstract":"Growing concerns amongst the competitors for maintaining the privacy of their customer's information has increased in recent years. Multiple parties desire to collaborate to conduct data mining without breaching privacy of each contributing party. Organizations, both public and private, publish sensitive micro data for research and/or trend analysis. The main confront for developing a secured framework is a consideration for privacy as well as efficiency and complications amongst the collaborating parties for generating standardization. The paper surveys various techniques applied for Privacy Preserving Collaborative Data Mining and summarizes the demerits of the same.","PeriodicalId":305584,"journal":{"name":"2015 International Conference on Electrical, Electronics, Signals, Communication and Optimization (EESCO)","volume":"131 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 International Conference on Electrical, Electronics, Signals, Communication and Optimization (EESCO)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EESCO.2015.7254044","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6
Abstract
Growing concerns amongst the competitors for maintaining the privacy of their customer's information has increased in recent years. Multiple parties desire to collaborate to conduct data mining without breaching privacy of each contributing party. Organizations, both public and private, publish sensitive micro data for research and/or trend analysis. The main confront for developing a secured framework is a consideration for privacy as well as efficiency and complications amongst the collaborating parties for generating standardization. The paper surveys various techniques applied for Privacy Preserving Collaborative Data Mining and summarizes the demerits of the same.