An efficient perturbation approach for multivariate data in sensitive and reliable data mining

被引:6
|
作者
Paul, Mahit Kumar [1 ]
Islam, Md Rabiul [1 ]
Sattar, A. H. M. Sarowar [1 ]
机构
[1] Rajshahi Univ Engn & Technol, Dept Comp Sci & Engn, Rajshahi 6204, Bangladesh
关键词
Privacy preserving data mining; Data perturbation; Data privacy; Information privacy; Privacy; Data utility; OF-THE-ART; PRIVACY; INFORMATION;
D O I
10.1016/j.jisa.2021.102954
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the rapid enhancement of technology, cloud data is increasing rapidly which contains individuals' sensitive information such as medical diagnostics reports. While extracting knowledge from those sensitive data, both privacy of individuals' and the utility of data should be preserved which is a crucial concern in data mining related activities. Though therein exist several methods to preserve privacy, a single method can not maintain the harmony interim privacy and data utility. Often achieving individuals' privacy leads to the loss of the data utility and the opposite is true also. To address the vital issue, a four-stage data perturbation approach, called NRoReM, is proposed in this work based on normalization, geometric rotation, linear regression, and scalar multiplication for sensitive data mining. The proposed approach is experimented with over ten UCI data set using three benchmark classifiers. The empirical exploration of privacy protection, attack resistance, information entropy analysis, data utility, and error analysis exhibits that NRoReM preserves both privacy of individuals' and data utility on a larger scale for 90% of the data set than 3-Dimensional Rotation Transformation (3DRT) and 2-Dimensional Rotation Transformation (2DRT).
引用
收藏
页数:13
相关论文
共 50 条
  • [21] K-Anonymization approach for privacy preservation using data perturbation techniques in data mining
    Kiran, Ajmeera
    Shirisha, N.
    MATERIALS TODAY-PROCEEDINGS, 2022, 64 : 578 - 584
  • [22] An efficient approach to mining frequent itemsets on data streams
    Ansari, Sara
    Sadreddini, Mohammad Hadi
    World Academy of Science, Engineering and Technology, 2009, 37 : 489 - 495
  • [23] Hybrid Approach for Privacy Enhancement in Data Mining Using Arbitrariness and Perturbation
    Murugeshwari, B.
    Rajalakshmi, S.
    Sudharson, K.
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2023, 44 (03): : 2293 - 2307
  • [24] Geometric data perturbation for privacy preserving outsourced data mining
    Chen, Keke
    Liu, Ling
    KNOWLEDGE AND INFORMATION SYSTEMS, 2011, 29 (03) : 657 - 695
  • [25] Fostering interpretability of data mining models through data perturbation
    Belkoura, Seddik
    Zanin, Massimiliano
    LaTorre, Antonio
    EXPERT SYSTEMS WITH APPLICATIONS, 2019, 137 : 191 - 201
  • [26] Geometric data perturbation for privacy preserving outsourced data mining
    Keke Chen
    Ling Liu
    Knowledge and Information Systems, 2011, 29 : 657 - 695
  • [27] Data organization and access for efficient data mining
    Dunkel, B
    Soparkar, N
    15TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING, PROCEEDINGS, 1999, : 522 - 529
  • [28] A Hybrid Approach of Privacy Preserving Data Mining using Suppression and Perturbation Techniques
    Kaur, Arshveer
    2017 INTERNATIONAL CONFERENCE ON INNOVATIVE MECHANISMS FOR INDUSTRY APPLICATIONS (ICIMIA), 2017, : 306 - 311
  • [29] An Efficient Density-based Approach for Data Mining Tasks
    Domeniconi, Carlotta
    Gunopulos, Dimitrios
    KNOWLEDGE AND INFORMATION SYSTEMS, 2004, 6 (06) : 750 - 770
  • [30] An Efficient Approach to Book Review Mining Using Data Classification
    Harvinder
    Soni, Devpriya
    Madan, Shipra
    EMERGING ICT FOR BRIDGING THE FUTURE, VOL 2, 2015, 338 : 629 - 636