Privacy preservation of the user data and properly balancing between privacy and utility

被引:3
|
作者
Yuvaraj N. [1 ]
Praghash K. [2 ]
Karthikeyan T. [3 ]
机构
[1] Research and Development, ICT Academy
[2] Department of Electronics and Communication Engineering, Koneru Lakshmaiah Education Foundation, AP, Vaddeswaram
[3] Department of Electronics and Telecommunications Engineering, Higher College of Technology, University of Technology and Applied Sciences
来源
International Journal of Business Intelligence and Data Mining | 2022年 / 20卷 / 04期
关键词
ACO; ant colony optimisation; ECC; elliptical curve cryptography; privacy preservation; utility;
D O I
10.1504/IJBIDM.2022.123216
中图分类号
学科分类号
摘要
The privacy and utility are the trade-off factors, where the performance of one factor should sacrifice to achieve the other. If privacy is achieved without publishing the data, then efficient utility cannot be achieved, hence the original dataset tends to get published without privacy. Therefore, it is essential to maintain the equilibrium between privacy and utility of datasets. In this paper, we propose a new privacy utility method, where the privacy is maintained by lightweight elliptical curve cryptography (ECC), and utility is maintained through ant colony optimisation (ACO) clustering. Initially, the datasets are clustered using ACO and then the privacy of clustered datasets is maintained using ECC. The proposed method has experimented over medical datasets and it is compared with existing methods through several performance metrics like clustering accuracy, F-measure, data utility, and privacy metrics. The analysis shows that the proposed method obtains improved privacy preservation using the clustering algorithm than existing methods. © 2022 Inderscience Enterprises Ltd.
引用
收藏
页码:394 / 411
页数:17
相关论文
共 50 条
  • [31] Fuzzy Set based Data Publishing For Privacy Preservation
    Xie, Meng-bo
    Qian, Quan
    2016 17TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD), 2016, : 569 - 574
  • [32] Privacy Preservation in Utility Mining Based on Genetic Algorithm: A New Approach
    Rathi, Sugandha
    Soni, Rishi
    PROCEEDINGS OF FIFTH INTERNATIONAL CONFERENCE ON SOFT COMPUTING FOR PROBLEM SOLVING (SOCPROS 2015), VOL 2, 2016, 437 : 71 - 80
  • [33] Research on data combination privacy preservation mechanism for SaaS
    Zhang K.
    Li Q.-Z.
    Shi Y.-L.
    Jisuanji Xuebao/Chinese Journal of Computers, 2010, 33 (11): : 2044 - 2054
  • [34] Development of User-Participatory Crowdsensing System for Improved Privacy Preservation
    Kim, Mihui
    Yun, Junhyeok
    FUTURE INTERNET, 2020, 12 (03):
  • [35] A Study on Privacy Preservation for Multi-user and Multi-granularity
    Li, Dong
    He, Xianmang
    Chen, Huahui
    Dong, Yihong
    Chen, Yefang
    2013 IEEE 13TH INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOPS (ICDMW), 2013, : 638 - 645
  • [36] PRIVACY PRESERVATION IN BIG DATA USING ANONYMIZATION TECHNIQUES
    Karle, Tanashri
    Vora, Deepali
    2017 1ST IEEE INTERNATIONAL CONFERENCE ON DATA MANAGEMENT, ANALYTICS AND INNOVATION (ICDMAI), 2017, : 340 - 343
  • [37] An Intensified Approach for Privacy Preservation in Incremental Data Mining
    Rajalakshmi, V.
    Mala, G. S. Anandha
    ADVANCES IN COMPUTING AND INFORMATION TECHNOLOGY, VOL 3, 2013, 178 : 347 - +
  • [38] Can the Utility of Anonymized Data be Used for Privacy Breaches?
    Wong, Raymond Chi-Wing
    Fu, Ada Wai-Chee
    Wang, Ke
    Yu, Philip S.
    Pei, Jian
    ACM TRANSACTIONS ON KNOWLEDGE DISCOVERY FROM DATA, 2011, 5 (03)
  • [39] CAPPAD: a privacy-preservation solution for autonomous vehicles using SDN, differential privacy and data aggregation
    Gheisari, Mehdi
    Khan, Wazir Zada
    Najafabadi, Hamid Esmaeili
    Mcardle, Gavin
    Rabiei-Dastjerdi, Hamidreza
    Liu, Yang
    Fernandez-Campusano, Christian
    Abdalla, Hemn Barzan
    APPLIED INTELLIGENCE, 2024, 54 (04) : 3417 - 3428
  • [40] CAPPAD: a privacy-preservation solution for autonomous vehicles using SDN, differential privacy and data aggregation
    Mehdi Gheisari
    Wazir Zada Khan
    Hamid Esmaeili Najafabadi
    Gavin McArdle
    Hamidreza Rabiei-Dastjerdi
    Yang Liu
    Christian Fernández-Campusano
    Hemn Barzan Abdalla
    Applied Intelligence, 2024, 54 : 3417 - 3428