Abstract
The internet world today stands on the pillars of the security principles and Cryptography. It is very important to be able to preserve the privacy and confidentiality of critical data. In this paper we address the privacy preservation problem against unauthorized secondary use of information. To do so, we have tried to study the various data perturbation and Reconstruction Based Techniques which ensures that the mining process will not violate privacy up to a certain degree of security. This is done by Perturb ting the data and adding randomization and transforming the data through translating the data, rotating it and adding some noise.
View more >>