Skip to main content

Table 3 Categorization of current studies

From: A comprehensive review on privacy preserving data mining

References PPDM Hide association rule Distortion method Classification method Clustering method Associative classification Outsource data mining Association rule Distributed method K-anonymity Parameters
Matwin (2013)           Privacy
Vatsalan et al. (2013)           Privacy
Qi and Zong (2012)           Privacy
Raju et al. (2009)           Privacy
Malina and Hajny (2013), Sachan et al. (2013)           Privacy
Mukkamala and Ashok (2011)          Privacy
Weng et al. 2008)           Privacy and efficiency
Dehkordi et al. 2009)           Security, privacy and utility
Gkoulalas-Divanis and Verykios (2009)           Efficiency
Li et al. (2009b)           Privacy
Kasthuri and Meyyappan (2013)           Privacy
Quoc et al. (2013)           Privacy
Domadiya and Rao (2013)           Efficient
Kamakshi (2012)           Privacy and utility
Zhang et al. (2012a)           Privacy
Zhang et al. (2012b)           Privacy
Li et al. (2009a)           Privacy
Kamakshi and Meyyappan (2010)           Privacy
Islam and Brankovic (2011)           Privacy
Wang and Lee (2008)           Accuracy, efficiency, and privacy
Xiong et al. 2006)           Privacy
Singh et al. (2010)           Privacy and efficiency
Baotou (2010)           Privacy
Vaidya et al. (2008)           Privacy
Kantarcıoglu and Vaidya (2003)           Privacy and accuracy
Sathiyapriya and Sadasivam (2013)           Security and privacy
Yi and Zhang (2013)           Accuracy and privacy
Raghuram and Gyani (2012)           Performance, scalability and execution time
Lin and Lo (2013)           Privacy, efficiency, and effective
Harnsamut and Natwichai (2008)           Privacy and efficient
Seisungsittisunti and Natwichai (2011)           Privacy
Giannotti et al. (2013)           Security and privacy
Worku et al. (2014)           Security and privacy
Arunadevi and Anuradha (2014)           Security and privacy
Lai et al. (2014)           Security and privacy
Kerschbaum and Julien (2008)           Privacy and performance
Shrivastava et al. (2011)           Efficiency and security
Vijayarani et al. (2010a)           Privacy and utility
Aggarwal and Yu (2008)           Privacy
Belwal et al. (2013)           Privacy
Jain et al. (2011)           Privacy
Naeem et al. (2010)           Privacy and accuracy
Li and Liu (2009)           Efficiency
Ying-hua et al. (2011)           Privacy
Li (2013)           Privacy
Dev et al. (2012)           Privacy
Tassal (2014)           Privacy
Chan and Keng (2013)           Privacy
Dong and Kresman (2009)           Privacy
Aggarwal et al. (2005)           Privacy
Xu and Yi (2011)           Privacy
Inan and Saygin (2010)           Privacy
Nanavati and Jinwala (2012)           Privacy
Agrawal and Srikant (2000)           Privacy and efficient
Wang et al. (2010)           Privacy and performance
Nguyen et al. (2012)           Privacy and an effective
Om Kumar et al. (2013)           Privacy
Mokeddem and Belbachir (2010)           Privacy and accuracy
Ibrahim et al. (2012)           Privacy and efficiency
Patel et al. (2012)           Privacy
Kumbhar and Kharat (2012)           Privacy, accuracy and efficiency
Nix et al. (2012)           Privacy
Keshavamurthy et al. (2013)           Accuracy and privacy
Wang et al. (2004), Machanavajjhala et al. (2007)           Privacy
Loukides et al. (2012), Wang et al. (2004)           Privacy, efficiency, accuracy and utility
Friedman et al. (2008), Loukides and Gkoulalas-divanis (2012)           Privacy and utility
Ciriani et al. (2008)           Privacy
He et al. (2011), Friedman et al. 2008)           Privacy and utility
Patil and Patankar (2013), He et al. (2011)           quality of anonymity and reduce the information loss
Zhu and Chen (2012), Patil and Patankar 2013)           Privacy
Soodejani et al. (2012, Zhu and Chen (2012)           Privacy
Karim et al. (2012), Soodejani et al. (2012)           Privacy
Loukides et al. (2012), Karim et al. (2012)           Privacy
Vijayarani et al. (2010a, b), (Loukides et al. 2012)           Privacy
Nergiz et al. (2009), Xu and Yi (2011)           Privacy, utility and effectiveness
Tai et al. (2013), Vijayarani et al. (2010b)           Privacy and efficiency
Tai et al. (2010, 2013)           Privacy
Pan et al. (2012), Tai et al. (2010)           Privacy
Deivanai et al. (2011), Pan et al. (2012)           Privacy
Monreale et al. (2014), Deivanai et al. (2011)           Privacy
Nergiz and Gök (2014), Nergiz et al. (2013), Monreale et al. (2014)           Privacy, utility and accuracy
Zhang et al. (2013a, 2014a), Nergiz et al. (2013)           Privacy and scalable
Zhang et al. (2014a)           Privacy and scalability
Zhang et al. (2013a, b), Zhang et al. (2014a)           Privacy, scalability and efficiency
Ding et al. (2013), Zhang et al. (2013c)           Privacy