Ankit Jasoliya , Tejal Patel


Data mining gets valuable knowledge from huge amounts of data. In latest, data streams are new type of data, which are completely different from existing static data. The property of data streams are: Data has timing preference; data distribution changes constantly with time; the amount of data is large; here data flows in and out is very quickly; and on the spot reply is necessary. Existing algorithm is designed for the static database. If the data changes, it would be compulsory to rescan the whole dataset, which takes to more computation time and providing late respond to the user. Here we studied the problem of privacy-preserving data mining and many techniques have been find. However, existing techniques for privacy-preserving data mining are designed for static databases and are not suitable for dynamic data. When need to perform computation at that time to providing privacy. So the privacy preservation problem of data streams mining is very big issue. Here we generate data stream using MOA and then provide privacy to this stream. We proposed algorithms which take over the existing process of data streams classification to achieve more privacy preservation and accuracy.


Data mining, Data Perturbation, Data Stream, MOA, Weka, Privacy, Hoeffding Tree, Classification.

Full Text:



. Kiran Patel, Hitesh Patel, Parin Patel, “Privacy Preserving in Data stream classification using different proposed Perturbation Methods ”, IJEDR, 2014, Volume 2, Issue 2 | ISSN: 2321-9939.

. Manish Shannal, Atul Chaudhar, Manish Mathuria, Shalini Chaudhar, Santosh Kumar, “An Efficient Approach for Privacy Preserving in Data Mining ”, International Conference on Signal Propagation and Computer Technology, IEEE 2014,244-249.

. Radhika Kotecha, Sanjay Garg, “Data Streams and Privacy: Two Emerging Issues in Data Classification”, 5th Nirma University International Conference on Engineering (NUiCONE), IEEE 2015.

. Rupinder Kaur and Meenakshi Bansalt, “Transformation Approach for Boolean Attributes in Privacy Preserving Data Mining ” 1st International Conference on Next Generation Computing Technologies, IEEE 2015,644-648.

. Neha Pathak, Shweta Pandey, “An Efficient Method for Privacy Preserving Data Mining in Secure Multiparty Computation”, Nirma University International Conference on Engineering, IEEE 2013,1-3.

. Dhanalakshmi.M, Siva Sankari.E “Privacy Preserving Data Mining Techniques-Survey”, ICICES, IEEE 2014, ISBN No.978-1-4799-3834-6/14.

. Hina Vaghashia, Amit Ganatra “A Survey: Privacy Preserving Techniques in Data Mining ”, International Journal of Computer Applications (0975 – 8887) Volume 119 – No.4, June 2015

. C. Clifton, M. Kantarcioglu, and J. Vaidya, “Defining Privacy for Data Mining”, Next Generation Data Mining, AAAI/MIT Press, 2004.

. Sweeney L, "Achieving k-Anonymity privacy protection uses generalization and suppression" International journal of Uncertainty, Fuzziness and Knowledge based systems, 10(5), 571-588, 2002.

. Gayatri Nayak, Swagatika Devi, "A survey on Privacy Preserving Data Mining: Approaches and Techniques", ternational Journal of Engineering Science and Technology, Vol. 3 No. 3, 2127-2133, 2011.

. Charu C. Aggarwal, Philip S. Yu “Privacy-Preserving Data Mining Models and algorithm” advances in database systems 2008 Springer Science, Business Media, LLC


. Jiawei Han, Micheline Kamber, Jian Pei. Data Mining Concepts and Techniques: 3rd Edn; Morgan Kaufmann Publishers is an imprint of Elsevier. 225 Wyman Street, Waltham, MA 02451, USA.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.