From: A comprehensive review on privacy preserving data mining
References | PPDM | Hide association rule | Distortion method | Classification method | Clustering method | Associative classification | Outsource data mining | Association rule | Distributed method | K-anonymity | Parameters |
---|---|---|---|---|---|---|---|---|---|---|---|
Matwin (2013) | √ |  |  |  |  |  |  |  |  |  | Privacy |
Vatsalan et al. (2013) | √ |  |  |  |  |  |  |  |  |  | Privacy |
Qi and Zong (2012) | √ |  |  |  |  |  |  |  |  |  | Privacy |
Raju et al. (2009) | √ |  |  |  |  |  |  |  |  |  | Privacy |
√ |  |  |  |  |  |  |  |  |  | Privacy | |
Mukkamala and Ashok (2011) | √ | √ |  |  |  |  |  |  |  |  | Privacy |
Weng et al. 2008) |  | √ |  |  |  |  |  |  |  |  | Privacy and efficiency |
Dehkordi et al. 2009) |  | √ |  |  |  |  |  |  |  |  | Security, privacy and utility |
Gkoulalas-Divanis and Verykios (2009) |  | √ |  |  |  |  |  |  |  |  | Efficiency |
Li et al. (2009b) |  | √ |  |  |  |  |  |  |  |  | Privacy |
Kasthuri and Meyyappan (2013) |  | √ |  |  |  |  |  |  |  |  | Privacy |
Quoc et al. (2013) |  | √ |  |  |  |  |  |  |  |  | Privacy |
Domadiya and Rao (2013) |  | √ |  |  |  |  |  |  |  |  | Efficient |
Kamakshi (2012) |  |  | √ |  |  |  |  |  |  |  | Privacy and utility |
Zhang et al. (2012a) |  |  | √ |  |  |  |  |  |  |  | Privacy |
Zhang et al. (2012b) |  |  | √ |  |  |  |  |  |  |  | Privacy |
Li et al. (2009a) |  |  | √ |  |  |  |  |  |  |  | Privacy |
Kamakshi and Meyyappan (2010) |  |  | √ |  |  |  |  |  |  |  | Privacy |
Islam and Brankovic (2011) |  |  | √ |  |  |  |  |  |  |  | Privacy |
Wang and Lee (2008) |  |  | √ |  |  |  |  |  |  |  | Accuracy, efficiency, and privacy |
Xiong et al. 2006) |  |  |  | √ |  |  |  |  |  |  | Privacy |
Singh et al. (2010) |  |  |  | √ |  |  |  |  |  |  | Privacy and efficiency |
Baotou (2010) |  |  |  | √ |  |  |  |  |  |  | Privacy |
Vaidya et al. (2008) |  |  |  | √ |  |  |  |  |  |  | Privacy |
Kantarcıoglu and Vaidya (2003) |  |  |  | √ |  |  |  |  |  |  | Privacy and accuracy |
Sathiyapriya and Sadasivam (2013) |  |  |  | √ |  |  |  |  |  |  | Security and privacy |
Yi and Zhang (2013) |  |  |  |  | √ |  |  |  |  |  | Accuracy and privacy |
Raghuram and Gyani (2012) |  |  |  |  |  | √ |  |  |  |  | Performance, scalability and execution time |
Lin and Lo (2013) |  |  |  |  |  | √ |  |  |  |  | Privacy, efficiency, and effective |
Harnsamut and Natwichai (2008) |  |  |  |  |  | √ |  |  |  |  | Privacy and efficient |
Seisungsittisunti and Natwichai (2011) |  |  |  |  |  | √ |  |  |  |  | Privacy |
Giannotti et al. (2013) |  |  |  |  |  |  | √ |  |  |  | Security and privacy |
Worku et al. (2014) |  |  |  |  |  |  | √ |  |  |  | Security and privacy |
Arunadevi and Anuradha (2014) |  |  |  |  |  |  | √ |  |  |  | Security and privacy |
Lai et al. (2014) |  |  |  |  |  |  | √ |  |  |  | Security and privacy |
Kerschbaum and Julien (2008) |  |  |  |  |  |  | √ |  |  |  | Privacy and performance |
Shrivastava et al. (2011) |  |  |  |  |  |  |  | √ |  |  | Efficiency and security |
Vijayarani et al. (2010a) |  |  |  |  |  |  |  | √ |  |  | Privacy and utility |
Aggarwal and Yu (2008) |  |  |  |  |  |  |  | √ |  |  | Privacy |
Belwal et al. (2013) |  |  |  |  |  |  |  | √ |  |  | Privacy |
Jain et al. (2011) |  |  |  |  |  |  |  | √ |  |  | Privacy |
Naeem et al. (2010) |  |  |  |  |  |  |  | √ |  |  | Privacy and accuracy |
Li and Liu (2009) |  |  |  |  |  |  |  | √ |  |  | Efficiency |
Ying-hua et al. (2011) |  |  |  |  |  |  |  |  | √ |  | Privacy |
Li (2013) |  |  |  |  |  |  |  |  | √ |  | Privacy |
Dev et al. (2012) |  |  |  |  |  |  |  |  | √ |  | Privacy |
Tassal (2014) |  |  |  |  |  |  |  |  | √ |  | Privacy |
Chan and Keng (2013) |  |  |  |  |  |  |  |  | √ |  | Privacy |
Dong and Kresman (2009) |  |  |  |  |  |  |  |  | √ |  | Privacy |
Aggarwal et al. (2005) |  |  |  |  |  |  |  |  | √ |  | Privacy |
Xu and Yi (2011) |  |  |  |  |  |  |  |  | √ |  | Privacy |
Inan and Saygin (2010) |  |  |  |  |  |  |  |  | √ |  | Privacy |
Nanavati and Jinwala (2012) |  |  |  |  |  |  |  |  | √ |  | Privacy |
Agrawal and Srikant (2000) |  |  |  |  |  |  |  |  | √ |  | Privacy and efficient |
Wang et al. (2010) |  |  |  |  |  |  |  |  | √ |  | Privacy and performance |
Nguyen et al. (2012) |  |  |  |  |  |  |  |  | √ |  | Privacy and an effective |
Om Kumar et al. (2013) |  |  |  |  |  |  |  |  | √ |  | Privacy |
Mokeddem and Belbachir (2010) |  |  |  |  |  |  |  |  | √ |  | Privacy and accuracy |
Ibrahim et al. (2012) |  |  |  |  |  |  |  |  | √ |  | Privacy and efficiency |
Patel et al. (2012) |  |  |  |  |  |  |  |  | √ |  | Privacy |
Kumbhar and Kharat (2012) |  |  |  |  |  |  |  |  | √ |  | Privacy, accuracy and efficiency |
Nix et al. (2012) |  |  |  |  |  |  |  |  | √ |  | Privacy |
Keshavamurthy et al. (2013) |  |  |  |  |  |  |  |  | √ |  | Accuracy and privacy |
 |  |  |  |  |  |  |  |  | √ | Privacy | |
 |  |  |  |  |  |  |  |  | √ | Privacy, efficiency, accuracy and utility | |
Friedman et al. (2008), Loukides and Gkoulalas-divanis (2012) |  |  |  |  |  |  |  |  |  | √ | Privacy and utility |
Ciriani et al. (2008) |  |  |  |  |  |  |  |  |  | √ | Privacy |
 |  |  |  |  |  |  |  |  | √ | Privacy and utility | |
 |  |  |  |  |  |  |  |  | √ | quality of anonymity and reduce the information loss | |
 |  |  |  |  |  |  |  |  | √ | Privacy | |
 |  |  |  |  |  |  |  |  | √ | Privacy | |
 |  |  |  |  |  |  |  |  | √ | Privacy | |
 |  |  |  |  |  |  |  |  | √ | Privacy | |
 |  |  |  |  |  |  |  |  | √ | Privacy | |
 |  |  |  |  |  |  |  |  | √ | Privacy, utility and effectiveness | |
 |  |  |  |  |  |  |  |  | √ | Privacy and efficiency | |
 |  |  |  |  |  |  |  |  | √ | Privacy | |
 |  |  |  |  |  |  |  |  | √ | Privacy | |
 |  |  |  |  |  |  |  |  | √ | Privacy | |
 |  |  |  |  |  |  |  |  | √ | Privacy | |
Nergiz and Gök (2014), Nergiz et al. (2013), Monreale et al. (2014) |  |  |  |  |  |  |  |  |  | √ | Privacy, utility and accuracy |
 |  |  |  |  |  |  |  |  | √ | Privacy and scalable | |
Zhang et al. (2014a) |  |  |  |  |  |  |  |  |  | √ | Privacy and scalability |
 |  |  |  |  |  |  |  |  | √ | Privacy, scalability and efficiency | |
 |  |  |  |  |  |  |  |  | √ | Privacy |