An efficient perturbation approach for multivariate data in sensitive and reliable data mining

被引:6
|
作者
Paul, Mahit Kumar [1 ]
Islam, Md Rabiul [1 ]
Sattar, A. H. M. Sarowar [1 ]
机构
[1] Rajshahi Univ Engn & Technol, Dept Comp Sci & Engn, Rajshahi 6204, Bangladesh
关键词
Privacy preserving data mining; Data perturbation; Data privacy; Information privacy; Privacy; Data utility; OF-THE-ART; PRIVACY; INFORMATION;
D O I
10.1016/j.jisa.2021.102954
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the rapid enhancement of technology, cloud data is increasing rapidly which contains individuals' sensitive information such as medical diagnostics reports. While extracting knowledge from those sensitive data, both privacy of individuals' and the utility of data should be preserved which is a crucial concern in data mining related activities. Though therein exist several methods to preserve privacy, a single method can not maintain the harmony interim privacy and data utility. Often achieving individuals' privacy leads to the loss of the data utility and the opposite is true also. To address the vital issue, a four-stage data perturbation approach, called NRoReM, is proposed in this work based on normalization, geometric rotation, linear regression, and scalar multiplication for sensitive data mining. The proposed approach is experimented with over ten UCI data set using three benchmark classifiers. The empirical exploration of privacy protection, attack resistance, information entropy analysis, data utility, and error analysis exhibits that NRoReM preserves both privacy of individuals' and data utility on a larger scale for 90% of the data set than 3-Dimensional Rotation Transformation (3DRT) and 2-Dimensional Rotation Transformation (2DRT).
引用
收藏
页数:13
相关论文
共 50 条
  • [31] An Efficient Tree-based Fuzzy Data Mining Approach
    Lin, Chun-Wei
    Hong, Tzung-Pei
    Lu, Wen-Hsiang
    INTERNATIONAL JOURNAL OF FUZZY SYSTEMS, 2010, 12 (02) : 150 - 157
  • [32] An Efficient Density-based Approach for Data Mining Tasks
    Carlotta Domeniconi
    Dimitrios Gunopulos
    Knowledge and Information Systems, 2004, 6 : 750 - 770
  • [33] An Efficient Approach for Intrusion Detection Using Data Mining Methods
    Wankhade, Kapil
    Patka, Sadia
    Thool, Ravindra
    2013 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2013, : 1615 - 1618
  • [34] A data mining approach for efficient selection bitmap join index
    Necir, Hamid
    INTERNATIONAL JOURNAL OF DATA MINING MODELLING AND MANAGEMENT, 2010, 2 (03) : 238 - 251
  • [35] Efficient Mining of Data Streams Using Associative Classification Approach
    Kompalli, Prasanna Lakshmi
    Cherku, Ramesh Kumar
    INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 2015, 25 (03) : 605 - 631
  • [36] A Data Mining Approach for Multivariate Outlier Detection in Postprocessing of Multitemporal InSAR Results
    Bakon, Matus
    Oliveira, Irene
    Perissin, Daniele
    Sousa, Joaquim Joao
    Papco, Juraj
    IEEE JOURNAL OF SELECTED TOPICS IN APPLIED EARTH OBSERVATIONS AND REMOTE SENSING, 2017, 10 (06) : 2791 - 2798
  • [37] An approach for prevention of privacy breach and information leakage in sensitive data mining
    Prakash, M.
    Singaravel, G.
    COMPUTERS & ELECTRICAL ENGINEERING, 2015, 45 : 134 - 140
  • [38] Data mining, data perturbation and degrees of freedom of projection pursuit regression
    Pourahmadi, M
    Lin, TC
    MINING AND MODELING MASSIVE DATA SETS IN SCIENCE, ENGINEERING, AND BUSINESS WITH A SUBTHEME IN ENVIRONMENTAL STATISTICS, 1997, 29 (01): : 164 - 168
  • [39] Algorithm for efficient data mining
    Latha, S. P.
    Ramaraj, N.
    ICCIMA 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND MULTIMEDIA APPLICATIONS, VOL II, PROCEEDINGS, 2007, : 66 - +
  • [40] Scalable, Reliable and Robust Data Mining Infrastructures
    Pawar, Shrikant
    Stanam, Aditya
    PROCEEDINGS OF THE 2020 FOURTH WORLD CONFERENCE ON SMART TRENDS IN SYSTEMS, SECURITY AND SUSTAINABILITY (WORLDS4 2020), 2020, : 123 - 125