A Comparative Study of Data Perturbation Using Fuzzy Logic to Preserve Privacy

被引:6
|
作者
Jahan, Thanveer [1 ]
Narasimha, G. [1 ]
Rao, C. V. Guru [2 ]
机构
[1] JNTU, Dept Comp Sci & Engn, Hyderabad, Andhra Pradesh, India
[2] S R Engg, Dept Comp Sci & Engn, Warangal, Andhra Pradesh, India
来源
NETWORKS AND COMMUNICATIONS (NETCOM2013) | 2014年 / 284卷
关键词
D O I
10.1007/978-3-319-03692-2_13
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The latest advances in the field of information technology have increased enormous growth in the data collection in this era. Individual's data are shared for business or legal reasons, containing sensitive information. Sharing data is a mutual benefit for business growth. The need to preserve privacy has become a challenging problem in privacy preserving data mining. In this paper we deal with a data analysis system having sensitive information. Exposing the information of an individual leads to security threats and could be harmful. The confidential attributes are perturbed or distorted using fuzzy logic. Fuzzy logic is used to protect individual's data to hide details of data in public. Data is owned by an authorized user, and applies distortion. The Authorized user having original dataset distorts numeric data using S-fuzzy membership function. This distorted data is published to the analyst, hiding the sensitive information present in the original data. The analysts perform data mining techniques on the distorted dataset. Accuracy is measured using classification and clustering techniques generated on distorted data is relative to the original, thus privacy is achieved. Comparison of various classifiers is generated on the original and distorted datasets.
引用
收藏
页码:161 / 170
页数:10
相关论文
共 50 条
  • [1] Data Anonymization Using Pseudonym System to Preserve Data Privacy
    Abd Razak, Shukor
    Nazari, Nur Hafizah Mohd
    Al-Dhaqm, Arafat
    IEEE ACCESS, 2020, 8 (08): : 43256 - 43264
  • [2] Privacy preserving big data mining: association rule hiding using fuzzy logic approach
    Afzali, Golnar Assadat
    Mohammadi, Shahriar
    IET INFORMATION SECURITY, 2018, 12 (01) : 15 - 24
  • [3] A New Approach to Preserve Privacy Data Mining Based on Fuzzy Theory in Numerical Database
    Cui, Run
    Kim, Hyoung Joong
    FIFTH INTERNATIONAL CONFERENCE ON GRAPHIC AND IMAGE PROCESSING (ICGIP 2013), 2014, 9069
  • [4] Shifting Dataset To Preserve Data Privacy
    Pozi, Muhammad Syafiq Mohd
    Abu Bakar, Asmidar
    Ismail, Roslan
    Yussof, Salman
    Rahim, Fiza Abdul
    Ramli, Ramona
    2018 IEEE CONFERENCE ON E-LEARNING, E-MANAGEMENT AND E-SERVICES (IC3E), 2018, : 134 - 139
  • [5] Privacy Preserving Data Utility Mining Using Perturbation
    Jisna, Joseph
    Salim, A.
    DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY (ICDCIT 2018), 2018, 10722 : 112 - 120
  • [6] Comparative Study of MPPT and Pitch Angle using PI and Fuzzy Logic Controllers
    Kharchouf, Ibtissam
    Essadki, Ahmed
    Fdaili, Mohammed
    Nasser, Tamou
    2018 6TH INTERNATIONAL RENEWABLE AND SUSTAINABLE ENERGY CONFERENCE (IRSEC), 2018, : 868 - 873
  • [7] Comparative Study of DFIG Power Control using the Vector Control and Fuzzy Logic
    Aissaoui, Ikram
    Essadki, Ahmed
    Elmouhi, Noureddine
    PROCEEDINGS OF 2021 9TH INTERNATIONAL RENEWABLE AND SUSTAINABLE ENERGY CONFERENCE (IRSEC), 2021, : 673 - 678
  • [8] A Data Pipeline to Preserve Privacy in Educational Settings
    Tsoni, Rozita
    Zorkadis, Vasilios
    Verykios, Vassilios S.
    25TH PAN-HELLENIC CONFERENCE ON INFORMATICS WITH INTERNATIONAL PARTICIPATION (PCI2021), 2021, : 138 - 142
  • [9] Linguistic summaries of data using fuzzy logic
    Kacprzyk, J
    Yager, RR
    INTERNATIONAL JOURNAL OF GENERAL SYSTEMS, 2001, 30 (02) : 133 - 154
  • [10] A Comparative Study to Classify Big Data Using Fuzzy Techniques
    Labib, Soha Safwat
    2016 5TH INTERNATIONAL CONFERENCE ON ELECTRONIC DEVICES, SYSTEMS AND APPLICATIONS (ICEDSA), 2016,