Data mining is beneath the attack of privacy promoters due to confusion regarding what it really is and a accurate concern related how it’s normally done. This paper presents how techniques from the community of security can modify data mining for its betterment, allowing all its advantages as it still maintaining its privacy.Large Volumes of precise personal data is regularly gathered and observed by various kinds of applications by the use of data mining, analyzing those data is profitable to the users of the application. It is a significant asset to users of the application such as governments for taking effective decisions or business organizations. But analyzing those data enables treats to the privacy if properly not done. This task targeted to disclose the information by preventing sensitive data. Different methods consisting kanonymity, randomization and data hiding have been proposed for the same.
 Mohamed A.Ouda,Sameh A. Salem, Ihab A. Ali, and ElSayed M.Saad “Privacy-Preserving Data Mining (PPDM) Method for Horizontally Partitioned Data”, IJCSI International Journal of Computer Science Issues,ISSN (Online): 1694-0814, Vol. 9, Issue 5, No 1, September 2012.
 Li Liu , Kantarcioglu, M. , Thuraisingham, B. “Privacy Preserving Decision Tree Mining from Perturbed Data”, System Sciences, HICSS '09. 42nd Hawaii International Conference, IEEE, ISBN:978-0-7695-3450-3, 2009.
 K. VenkataRamana and V.ValliKumari, "Graph Based Local Recoding For Data Anonymization", International Journal of Database Management Systems (IJDMS), ISSN: 0975-5705 (Online); 0975-5985(Print), Vol.5, No.4, August, 2013.
 Yashaswini, “A Survey on Privacy Preserving Data Mining”, International Journal of Innovative Research inComputer and Communication Engineering, ISSN(Online) : 2320-9801, Vol. 3, Special Issue 7, October 2015.
 ManolisTerrovitis _ Nikos Mamoulis _ PanosKalnis," Local and Global Recoding Methods for Anonymizing Setvalued Data", Research Center Mathematical and Computer Sciences and Engineering,KingAbdullah University of Science and Technology, ISSN:0949- 877X,2011.
 Kiran P, S Sathish Kumar and DrKavya“A Novel Framework using Elliptic Curve Cryptography for Extremely Secure Transmission in Distributed Privacy Preserving Data Mining”, An International Journal (ACIJ), ISSN 2229-726X, Vol.3, No.2,March 2012.
 Anand Sharma and vibhaojha “Privacy preserving Data Mining by Cryptography” in Springer-LNCS-CICS,1865 0929, “Recent Trends in Network Security and Applications”. pp.576-581, Vol:89,2010.
 Malik, M.B, Ghazi, M.A. Ali, R., Computer and Communication Technology (ICCCT), “Privacy Preserving Data Mining Techniques: Current Scenario and Future Prospects”, IEEE Third International Conference, ISBN: 978-1-4673-3149-4, 2012.
 M. Prakash, G. Singaravel, “A New Model for Privacy Preserving Sensitive Data Mining”, in proceedings of ICCCNTCoimbatore, India, IEEE 2012.
 Kunwar Singh kushwah, AbhayPanwar, “A Privacy Preservation Technique Using Machine Learning Technique”, International Journal of Engineering and Innovative Technology (IJEIT), ISSN: 2277-3754, Volume 4, Issue 8, February 2015.
 Mrs. S. Vasanthi, Ms. S. Nandhini, “Privacy Preserving using Association Rule in Data Mining Techniques”, International Journal of Advanced Research in Computer and Communication Engineering, ISSN(Online): 2278- 1323,Vol. 4, Issue 8, August 2015.
 Vishal RavindraRedekar, Dr. K.N.Honwadkar, “PrivacyPreserving Mining of Association Rules in Cloud”, International Journal of Science and Research (IJSR), ISSN(Online): 2319-7064, Volume 3 Issue 11, November 2014.
[Mausumidey , Dr. AnamikaAhirwar (2016) Privacy Preservation Data Mining: A Survey IJIRCST Vol-3 Issue-3 Page No-160-163] (ISSN 2347 - 5552). www.ijircst.org
Dept. Of Computer Science & Engineering, MaharanaPratap College of Technology, Gwalior,India deymausumi4@gmai