Algorithms

PPSF offers implementations of following privacy preserving algorithms.

K-Anonymity algorithms

The k-anonymity concept has been proposed to ensure that at least (k-1) transactions have the same values for sensitive attributes, so that at least (k-1) transactions  are indistinguishable from each other. Some papers are provided belows:

Privacy preserving data mining

PPDM algorithms mine frequency sensitive items of transactions and hide them, so that the sensitive information can not be mined by hackers. Some papers are provided belows:

Privacy preserving utility mining

PPUM algorithms mine high utility items and then hide the sensitive ones to preserve privacy information. Some papers are provided belows: