Skip to main content

Privacy Preserving Mining

This blog present latest IEEE projects for cse topics on privacy preserving mining. Here we list various topics with sample code for the topics. So various approaches adopt by the researcher for hiding the privacy of the people was done where techniques and related codes were listed on different pages as well. In this approach of privacy outsourced data was preserved by the latest researcher for the mining of sensitive information. 

So following are topics available over here:
In this work one can opt different approaches for hiding sensitive information which may be obtain by manual involvement or data mining approaches. As this is reverse process of mining so first it is required to find information which need to be hide.
1. K Annonymity
2. Super class Substitution
3. Perturbation
4. Subsitution
5. Removing
6. Rule suppression which may be obtain by markov model, aprior algorithm or decision tree, etc.
7. Column Removal
8. Gaussian Mixing by adding Noise
9. Robfrugal Mixing
10. Encryption (In worst case only as it loose privacy preserving property)
Bu using above methods one can easily apply privacy preserving on any kind of data which may contain only text or only numeric or both text and numeric.


Popular posts from this blog

Computer Science Latest Research Topics

This blog provide latest research project with titles and related code links for free download. All listed projects are for computer science field only. Here people can easily search there category of project than subcategory. In this blog all latest ieee projects for cse is listed. 
Whole work of computer is moving to replace circuits and human labor, so following are some category of computer science research.
Privacy Preserving Mining
Geo Spatial Mining
Test Mining
Web Mining
Temporal Mining
Information Retreival
Dynamic Load Balancing
Cloud Computing
Fog Computing

Artificial Intelligence / Soft Computing