A COMPLETE PRIVACY PRESERVATION SYSTEM FOR DATA MINING USING FUNCTION APPROXIMATION

被引:0
|
作者
Rajalakshmi, V. [1 ]
Lakshmi, M. [1 ]
Anu, V. Maria [1 ]
机构
[1] Sathyabama Univ, Sch Comp, Chennai 600119, Tamil Nadu, India
来源
JOURNAL OF WEB ENGINEERING | 2017年 / 16卷 / 3-4期
关键词
Privacy preservation; Radial basis function; Function approximation; Data anonymization; K-ANONYMIZATION; INFORMATION;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Data privacy has become the primary concern in the current scenario as there are many pioneering methods for efficient mining of data. There are many algorithms to preserve privacy and handle the trade-off between privacy and utility. The ultimate goal of these algorithms is to anonymize the data without reducing the utility of them. A Privacy preserving procedure should have a minimum execution time, which is the overhead of clustering algorithms implemented using classical methods. There is also no single procedure that completely handles the trade-off and also updates itself automatically. In this work, the anonymization is implemented using Radial Basis Function [RBF] network, which provides both maximum privacy and utility with a proper tuning parameter specified between privacy and utility. The network also updates itself when the trend of data changes by controlling the maximum amount of error with a threshold value.
引用
收藏
页码:277 / 292
页数:16
相关论文
共 50 条
  • [31] A Comparative Survey on Privacy Preservation And Privacy measuring Techniques in Data Publishing
    Kumar, Atul
    Gyanchandani, Manasi
    PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICICCS), 2018, : 1902 - 1906
  • [32] A Toll Data Publishing Method using Encryption and Differential Privacy Preservation Technology
    Shen, Lijun
    Su, Peng
    Lu, Xiaoyu
    Wang, Xiao
    Liu, Yifei
    Ouyang, Hai
    PROCEEDINGS OF 2017 IEEE 2ND INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC), 2017, : 1586 - 1594
  • [33] Privacy preservation of the user data and properly balancing between privacy and utility
    Yuvaraj N.
    Praghash K.
    Karthikeyan T.
    International Journal of Business Intelligence and Data Mining, 2022, 20 (04): : 394 - 411
  • [34] PPSSDHE: privacy preservation in smartphone sensors data using ElGamal homomorphic encryption
    Manimaran, S.
    Priya, D. Uma
    INTERNATIONAL JOURNAL OF SENSOR NETWORKS, 2024, 46 (04) : 218 - 229
  • [35] Privacy preservation in fuzzy association rules using rough set on intuitionistic fuzzy approximation spaces and DSR
    Geetha M.A.
    Iyengar N.Ch.S.N.
    Acharjya D.P.
    Geetha, Mary A. (geethamary.a@gmail.com), 1600, Inderscience Enterprises Ltd. (10): : 67 - 87
  • [36] Privacy preserving data mining algorithms by data distortion
    Wu Xiao-dan
    Yue Dian-min
    Liu Feng-li
    Wang Yun-feng
    Chu Chao-Hsien
    PROCEEDINGS OF THE 2006 INTERNATIONAL CONFERENCE ON MANAGEMENT SCIENCE & ENGINEERING (13TH), VOLS 1-3, 2006, : 223 - 228
  • [37] Privacy Preservation in Utility Mining Based on Genetic Algorithm: A New Approach
    Rathi, Sugandha
    Soni, Rishi
    PROCEEDINGS OF FIFTH INTERNATIONAL CONFERENCE ON SOFT COMPUTING FOR PROBLEM SOLVING (SOCPROS 2015), VOL 2, 2016, 437 : 71 - 80
  • [38] Privacy preservation of data using modified rider optimization algorithm: Optimal data sanitization and restoration model
    Shivashankar, Mohana
    Mary, Sahaaya Arul
    EXPERT SYSTEMS, 2021, 38 (03)
  • [39] An Improved Method for Privacy Preserving Data Mining
    Poovammal, E.
    Ponnavaikko, M.
    2009 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE, VOLS 1-3, 2009, : 1453 - +
  • [40] Heuristics For Privacy Preserving Data Mining: An Evaluation
    Mohana, S.
    Mary, S. A. Sahaaya Arul
    2017 INTERNATIONAL CONFERENCE ON ALGORITHMS, METHODOLOGY, MODELS AND APPLICATIONS IN EMERGING TECHNOLOGIES (ICAMMAET), 2017,