Privacy preservation of the user data and properly balancing between privacy and utility

被引:3
|
作者
Yuvaraj N. [1 ]
Praghash K. [2 ]
Karthikeyan T. [3 ]
机构
[1] Research and Development, ICT Academy
[2] Department of Electronics and Communication Engineering, Koneru Lakshmaiah Education Foundation, AP, Vaddeswaram
[3] Department of Electronics and Telecommunications Engineering, Higher College of Technology, University of Technology and Applied Sciences
来源
International Journal of Business Intelligence and Data Mining | 2022年 / 20卷 / 04期
关键词
ACO; ant colony optimisation; ECC; elliptical curve cryptography; privacy preservation; utility;
D O I
10.1504/IJBIDM.2022.123216
中图分类号
学科分类号
摘要
The privacy and utility are the trade-off factors, where the performance of one factor should sacrifice to achieve the other. If privacy is achieved without publishing the data, then efficient utility cannot be achieved, hence the original dataset tends to get published without privacy. Therefore, it is essential to maintain the equilibrium between privacy and utility of datasets. In this paper, we propose a new privacy utility method, where the privacy is maintained by lightweight elliptical curve cryptography (ECC), and utility is maintained through ant colony optimisation (ACO) clustering. Initially, the datasets are clustered using ACO and then the privacy of clustered datasets is maintained using ECC. The proposed method has experimented over medical datasets and it is compared with existing methods through several performance metrics like clustering accuracy, F-measure, data utility, and privacy metrics. The analysis shows that the proposed method obtains improved privacy preservation using the clustering algorithm than existing methods. © 2022 Inderscience Enterprises Ltd.
引用
收藏
页码:394 / 411
页数:17
相关论文
共 50 条
  • [1] Balancing between Utility and Privacy for k-Anonymity
    Babu, Korra Sathya
    Jena, Sanjay Kumar
    ADVANCES IN COMPUTING AND COMMUNICATIONS, PT 2, 2011, 191 : 1 - 8
  • [2] Privacy preservation for data cubes
    Sung, SY
    Liu, Y
    Xiong, H
    Ng, PA
    KNOWLEDGE AND INFORMATION SYSTEMS, 2006, 9 (01) : 38 - 61
  • [3] Privacy preservation for data cubes
    Sam Y. Sung
    Yao Liu
    Hui Xiong
    Peter A. Ng
    Knowledge and Information Systems, 2006, 9 : 38 - 61
  • [4] User-Centric Privacy Preservation in Data-Sharing Applications
    Gao, Feng
    He, Jingsha
    Peng, Shufen
    NETWORK AND PARALLEL COMPUTING, 2010, 6289 : 423 - +
  • [5] Privacy and Utility Preservation for Location Data Using Stay Region Analysis
    Dash, Manoranjan
    Teo, Sin G.
    ADVANCED DATA MINING AND APPLICATIONS, ADMA 2017, 2017, 10604 : 808 - 820
  • [6] Enhancing Utility via Clustering In Privacy Preservation
    Li, Yujia
    Wang, Xin
    Zhao, Lei
    2016 3RD INTERNATIONAL CONFERENCE ON SYSTEMS AND INFORMATICS (ICSAI), 2016, : 1008 - 1012
  • [7] A relative privacy model for effective privacy preservation in transactional data
    Bewong, Michael
    Liu, Jixue
    Liu, Lin
    Li, Jiuyong
    Choo, Kim-Kwang Raymond
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2019, 31 (23)
  • [8] Data Privacy Preservation and Trade-off Balance Between Privacy and Utility Using Deep Adaptive Clustering and Elliptic Curve Digital Signature Algorithm
    Yuvaraj, N.
    Praghash, K.
    Karthikeyan, T.
    WIRELESS PERSONAL COMMUNICATIONS, 2022, 124 (01) : 655 - 670
  • [9] Privacy Preservation in Streaming Data Collection
    Ng, Wee Siong
    Wu, Huayu
    Wu, Wei
    Xiang, Shili
    Tan, Kian-Lee
    PROCEEDINGS OF THE 2012 IEEE 18TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS 2012), 2012, : 810 - 815
  • [10] A Comparative Survey on Privacy Preservation And Privacy measuring Techniques in Data Publishing
    Kumar, Atul
    Gyanchandani, Manasi
    PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICICCS), 2018, : 1902 - 1906