No more privacy Concern: A privacy-chain based homomorphic encryption scheme and statistical method for privacy preservation of user's private and sensitive data

被引:22
|
作者
Kumar, G. Sathish [1 ]
Premalatha, K. [2 ]
Maheshwari, G. Uma [3 ]
Kanna, P. Rajesh [2 ]
机构
[1] Sri Eshwar Coll Engn, Ctr Computat Imaging & Machine Vis, Dept Artificial Intelligence & Data Sci, Coimbatore, Tamil Nadu, India
[2] Bannari Amman Inst Technol, Dept Comp Sci & Engn, Erode, Tamil Nadu, India
[3] Dr Mahalingam Coll Engn & Technol, Dept Comp Sci & Engn, Coimbatore, Tamil Nadu, India
关键词
Classifiers; Data Perturbation; Homomorphic Encryption; Hamming Distance; Information Value; Privacy-chain; Weight of Evidence; PRESERVING DATA; PERTURBATION; REGRESSION;
D O I
10.1016/j.eswa.2023.121071
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Internet giants collects a huge volume of data using the modern technologies and apply them to data mining for prediction and decision making in numerous fields, for instance, health care, web analysis, insurance, market basket analysis and bioinformatics. However, the huge repositories collects variety of data, it inevitably gathers a mass of private and sensitive data about the users. The revelation of such private and sensitive information may harm the user's privacy. In recent years, privacy is becoming an increasingly main concern in many data mining applications. Privacy preserving data mining (PPDM) has been evolved as the solution for the privacy issues. PPDM deals with protecting the individual's data without compromising the data utility. In this paper, privacy-chain based homomorphic encryption scheme along with the statistical transformation method weight of evi-dence and information value is proposed to preserve the private and sensitive information about the user. The proposed statistical transformation with homomorphic encryption (STHE) algorithm will perturb both the nu-merical and categorical values from the adult income, bank marketing and lung cancer datasets without affecting the data utility. In STHE, the quasi-identifiers are initially perturbed with IV and then privacy-chain based ho-momorphic encryption using RSA is applied to preserve the data privacy. The performance of the STHE algorithm is made compared with the state-of-the-art algorithms using the classifier models, decision tree, random forest, extreme gradient boost, and support vector machines. The experimental results shows that the proposed STHE algorithm outperforms the existing techniques in terms of accuracy, performance, data transformation, data retrieval and privacy preservation level along with the data utility.
引用
收藏
页数:21
相关论文
共 50 条
  • [41] A privacy preserving attribute-based encryption scheme with user revocation
    Li, Jiguo
    Shi, Yuerong
    Zhang, Yichen
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2015, 52 (10): : 2281 - 2292
  • [42] A privacy-preserving method for cross-chain interoperability using homomorphic encryption
    Cao, Dongyu
    Li, Bixin
    Cai, Jingyuan
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2025, 18 (01) : 18 - 18
  • [43] Differential privacy scheme using Laplace mechanism and statistical method computation in deep neural network for privacy preservation
    Kumar, G. Sathish
    Premalatha, K.
    Maheshwari, G. Uma
    Kanna, P. Rajesh
    Vijaya, G.
    Nivaashini, M.
    ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2024, 128
  • [44] DPP: Data Privacy-Preserving for Cloud Computing based on Homomorphic Encryption
    Wang, Jing
    Wu, Fengheng
    Zhang, Tingbo
    Wu, Xiaohua
    2022 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY, CYBERC, 2022, : 29 - 32
  • [45] An efficient blockchain-based privacy-preserving scheme with attribute and homomorphic encryption
    Xu, Guangxia
    Zhang, Jiajun
    Cliff, Uchani Gutierrez Omar
    Ma, Chuang
    INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2022, 37 (12) : 10715 - 10750
  • [46] Privacy-Preserving IoT Data Aggregation Based on Blockchain and Homomorphic Encryption
    Loukil, Faiza
    Ghedira-Guegan, Chirine
    Boukadi, Khouloud
    Benharkat, Aicha-Nabila
    SENSORS, 2021, 21 (07)
  • [47] Fully Privacy-Preserving and Efficient Clustering Scheme based on Fully Homomorphic Encryption
    Zhang, Mengyu
    Wang, Long
    Zhang, Xiaoping
    Wang, Yisong
    Sun, Wenhou
    ICC 2024 - IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2024, : 2694 - 2700
  • [48] Homomorphic Encryption Scheme Based on Elliptic Curve Cryptography for Privacy Protection of Cloud Computing
    Hong, Ming-quan
    Zhao, Wen-bo
    Wang, Peng-yu
    2016 IEEE 2ND INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY), IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING (HPSC), AND IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2016, : 152 - 157
  • [49] A fully homomorphic-elliptic curve cryptography based encryption algorithm for ensuring the privacy preservation of the cloud data
    Kanna, G. Prabu
    Vasudevan, V.
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 4): : S9561 - S9569
  • [50] Chaotic Map based Privacy Preservation User Authentication Scheme for WBANs
    Sahoo, Shreeya Swagatika
    Mohanty, Sujata
    PROCEEDINGS OF THE 2019 IEEE REGION 10 CONFERENCE (TENCON 2019): TECHNOLOGY, KNOWLEDGE, AND SOCIETY, 2019, : 1037 - 1042