Isometric Relocation of Data by Sequencing of Sub-Clusters for Privacy Preservation in Data Mining
نویسندگان
چکیده
Privacy preservation in data mining is a pioneering research area as the security of increasing amount of data is under risks. Privacy preservation in Data Mining [PPDM] is a delicate task as there is a trade-off between data Anonymization and their utility. Existing PPDM techniques uses Anonymization using randomization, generalization or suppression which reduces the utility of data. They also do not work on the data mining parameters like correlation, centroids etc., This paper provides a solution to handle this trade-off in an efficient way using Isometric relocation. The work uses isometric relocation as it maintains the correlation and data mining results. The methodology is explained with the algorithm and its performance is compared using real-life datasets with existing techniques on various metrics after exhaustive experimentations.
منابع مشابه
Preserving Privacy Using Data Perturbation in Data Stream
Data stream can be conceived as a continuous and changing sequence of data that continuously arrive at a system to store or process. Examples of data streams include computer network traffic, phone conversations, web searches and sensor data etc. The data owners or publishers may not be willing to exactly reveal the true values of their data due to various reasons, most notably privacy consider...
متن کاملPreservation of Utility through Hybrid k-Anonymization
Anonymization-based privacy protection ensures that published data cannot be linked back to an individual. The most common approach in this domain is to apply generalizations on the private data in order to maintain a privacy standard such as k-anonymity or `-diversity. While generalization-based techniques preserve truthfulness, relatively small output space of such techniques often results in...
متن کاملAnonymization Based on Nested Clustering for Privacy Preservation in Data Mining
Privacy Preservation in data mining protects the data from revealing unauthorized extraction of information. Data Anonymization techniques implement this by modifying the data, so that the original values cannot be acquired easily. Perturbation techniques are variedly used which will greatly affect the quality of data, since there is a trade-off between privacy preservation and information loss...
متن کاملIntroducing an algorithm for use to hide sensitive association rules through perturb technique
Due to the rapid growth of data mining technology, obtaining private data on users through this technology becomes easier. Association Rules Mining is one of the data mining techniques to extract useful patterns in the form of association rules. One of the main problems in applying this technique on databases is the disclosure of sensitive data by endangering security and privacy. Hiding the as...
متن کاملA Robust Data-obfuscation Approach for Privacy Preservation of Clustered Data
Privacy is defined as the freedom from unauthorized intrusion. The availability of personal information through online databases such as government records, medical records, and voters’ lists poses a threat to personal privacy. Intelligent search engines and data mining techniques further exacerbate the problem of privacy by simplifying access and retrieval of personal records. Data Obfuscation...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014