Multi-objective optimization-based privacy in data mining

被引:9
作者
Bhuyan, Hemanta Kumar [1 ]
Ravi, Vinayakumar [2 ]
Yadav, M. Srikanth [1 ]
机构
[1] Vignans Fdn Sci Technol & Res Deemed Univ, Dept Informat Technol, Guntur, Andhra Pradesh, India
[2] Prince Mohammad Bin Fahd Univ, Ctr Artificial Intelligence, Khobar 34754, Saudi Arabia
来源
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS | 2022年 / 25卷 / 06期
关键词
Multi-objective optimization; Privacy; Uniform distribution; Active function; Data mining; FRAMEWORK;
D O I
10.1007/s10586-022-03667-3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper addresses the data privacy based on interactive computation using an optimization model in data mining. When data are computed or sharing among users in online, it needs to maintain privacy for all computation during sharing of data. But user choice-based privacy is not available when sharing of data is required for data mining computation which is a big challenge for data privacy. Thus, we proposed the framework for anonymity of data privacy using various methods of multi-objective models as per the requirement of privacy. The proposed framework is designed with the help of two objects such as computational cost and privacy based on optimization model. Our framework maintains the balance between above objects as per user demands, i.e., increasing the privacy with decreasing the computational cost. In this model, the domain of privacy and computational cost for optimization problem solves the entity privacy requirements in a computing environment. We have used various methods such as Gaussian and uniform distribution, confidence interval, activation function, linear membership function with distinguish manner for maintaining of privacy and cost. As per the uniform distribution and parameter alpha-cut value for noise data, the optimal value is made accordingly. Example: for alpha = 0.2, and uniform distribution (- 1, 1), the optimal value is 0.0058. Similarly, as per different alpha values, classifiers result is different like alpha = 0.2 and 0.4, Multilayer perceptron values are 4.01 and 1.61 respectively. The solution of the proposed model controls the amount of privacy with complete freedom of choice of users with utmost flexibility.
引用
收藏
页码:4275 / 4287
页数:13
相关论文
共 36 条
[1]   Multi-objective cluster head selection using fitness averaged rider optimization algorithm for IoT networks in smart cities [J].
Alazab, Mamoun ;
Lakshmanna, Kuruva ;
Reddy, G. Thippa ;
Pham, Quoc-Viet ;
Maddikunta, Praveen Kumar Reddy .
SUSTAINABLE ENERGY TECHNOLOGIES AND ASSESSMENTS, 2021, 43
[2]   An efficient malware detection approach with feature weighting based on Harris Hawks optimization [J].
Alzubi, Omar A. ;
Alzubi, Jafar A. ;
Al-Zoubi, Ala' M. ;
Hassonah, Mohammad A. ;
Kose, Utku .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2022, 25 (04) :2369-2387
[3]   Blockchain and artificial intelligence enabled privacy-preserving medical data transmission in Internet of Things [J].
Alzubi, Omar A. ;
Alzubi, Jafar A. ;
Shankar, K. ;
Gupta, Deepak .
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2021, 32 (12)
[4]  
Asuncion A., 2007, Uci machine learning repository
[5]  
Bayardo RJ, 2005, PROC INT CONF DATA, P217
[6]  
Bhuyan, 2018, IEEE EXPLORE
[7]  
Bhuyan H. K., 2020, IEEE EXPLORE
[8]  
Bhuyan H. K., 2012, INT J ADV COMPUT TEC, V4, P297, DOI DOI 10.4156/IJACT.VOL4.ISSUE1.34
[9]   Analysis of Subfeature for Classification in Data Mining [J].
Bhuyan, Hemanta Kumar ;
Ravi, Vinayakumar .
IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT, 2023, 70 (08) :2732-2746
[10]   Individual privacy in data mining using fuzzy optimization [J].
Bhuyan, Hemanta Kumar ;
Kamila, Narendra Kumar ;
Pani, Subhendu Kumar .
ENGINEERING OPTIMIZATION, 2022, 54 (08) :1305-1323