Using K-Means Clustering Algorithm for Handling Data Precision

被引:0
作者
Suganthi, P. [1 ]
Kala, K. [1 ]
Balasubramanian, C. [2 ]
机构
[1] PSR Rengasamy Coll Engn Women, Dept CSE, Sivakasi, Tamil Nadu, India
[2] PSR Rengasamy Coll Engn Women, CSE, Sivakasi, Tamil Nadu, India
来源
2016 INTERNATIONAL CONFERENCE ON COMPUTING TECHNOLOGIES AND INTELLIGENT DATA ENGINEERING (ICCTIDE'16) | 2016年
关键词
Privacy preserving; Anonymized Table; Clustering; AES encryption algorithm;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The sensitive data are patient record details, organization record which are handled only administrative member. Preservation of privacy is a major feature of data mining and individual's privacy without losing of confidential data. The objective of privacy preserving data mining is to mine significant information from large amounts of dataset. To prevent the misuse of sensitive information such as patient record by the system administrator. The database administrator collects patient's data which are maintained in secured manner. The sensitive information has patient's name, Address, Disease, Date of Visit. The privacy preservation mechanism can be carried out through anonymization techniques. In order to preserve the sensitive data, the system administrator modifying the patient details. Privacy preserving techniques used to handle the sensitive information from unsanctioned users. The proposal system is original patient record should be transformed into Anonymized table which is identified only by administrative. To keep anonymized table in cluster form using k-means clustering algorithm. To keep anonymized table in cluster form using k-means clustering algorithm. To partition anonymized table into cluster, and each cluster has similar data object which is based on anonymized data attribute. After that the grouped similar data to be protected using AES encryption algorithm. The aim of this paper is to provide more accuracy and better level of privacy of sensitive attribute.
引用
收藏
页数:6
相关论文
共 9 条
  • [1] Chaudhuri S., 2011, Proceedings of the 5th Biennial Conference on Innovative Data Systems Research (CIDR), P96
  • [2] Privacy-Preserving Data Publishing: A Survey of Recent Developments
    Fung, Benjamin C. M.
    Wang, Ke
    Chen, Rui
    Yu, Philip S.
    [J]. ACM COMPUTING SURVEYS, 2010, 42 (04)
  • [3] A Framework for Efficient Data Anonymization under Privacy and Accuracy Constraints
    Ghinita, Gabriel
    Karras, Panagiotis
    Kalnis, Panos
    Mamoulis, Nikos
    [J]. ACM TRANSACTIONS ON DATABASE SYSTEMS, 2009, 34 (02):
  • [4] Li N., 2011, ARXIV110126042011
  • [5] Lin J.L., 2008, P INT WORKSH PRIV AN
  • [6] Lipmaa H., 2007, CRYPTOGRAPHIC TECHNI
  • [7] Machanavajjhala A., 2007, ACM T KNOWL DISCOV D, V1, P3, DOI [DOI 10.1145/1217299.1217302, 10.1145/1217299.1217302]
  • [8] Mohammad N., 2010, ACM T KNOWLEDGE DISC
  • [9] Xiao J X., 2011, P ACM SIGMOD INTLCON