A Comparative Study of Data Perturbation Using Fuzzy Logic to Preserve Privacy

被引:6
|
作者
Jahan, Thanveer [1 ]
Narasimha, G. [1 ]
Rao, C. V. Guru [2 ]
机构
[1] JNTU, Dept Comp Sci & Engn, Hyderabad, Andhra Pradesh, India
[2] S R Engg, Dept Comp Sci & Engn, Warangal, Andhra Pradesh, India
来源
NETWORKS AND COMMUNICATIONS (NETCOM2013) | 2014年 / 284卷
关键词
D O I
10.1007/978-3-319-03692-2_13
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The latest advances in the field of information technology have increased enormous growth in the data collection in this era. Individual's data are shared for business or legal reasons, containing sensitive information. Sharing data is a mutual benefit for business growth. The need to preserve privacy has become a challenging problem in privacy preserving data mining. In this paper we deal with a data analysis system having sensitive information. Exposing the information of an individual leads to security threats and could be harmful. The confidential attributes are perturbed or distorted using fuzzy logic. Fuzzy logic is used to protect individual's data to hide details of data in public. Data is owned by an authorized user, and applies distortion. The Authorized user having original dataset distorts numeric data using S-fuzzy membership function. This distorted data is published to the analyst, hiding the sensitive information present in the original data. The analysts perform data mining techniques on the distorted dataset. Accuracy is measured using classification and clustering techniques generated on distorted data is relative to the original, thus privacy is achieved. Comparison of various classifiers is generated on the original and distorted datasets.
引用
收藏
页码:161 / 170
页数:10
相关论文
共 50 条
  • [31] PREDICT: A case study, using fuzzy logic
    Kerscher, WJ
    Booker, JM
    Meyer, MA
    Smith, RE
    ANNUAL RELIABILITY AND MAINTAINABILITY SYMPOSIUM, 2003 PROCEEDINGS, 2003, : 188 - 195
  • [32] Study on Recommender System using Fuzzy Logic
    Yadav, Dinesh Kumar
    Katarya, Rahul
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTING METHODOLOGIES AND COMMUNICATION (ICCMC 2018), 2018, : 50 - 54
  • [33] A Comparative Study: Fuzzy Logic and ANN in Addressing Inverse Depletion
    Khuwaileh, Bassam A.
    Alshabi, Mohammad
    Matesha, Polina
    ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING FOR MULTI-DOMAIN OPERATIONS APPLICATIONS VI, 2024, 13051
  • [34] Application of cryptography in data privacy using fuzzy graph theory
    Pius, Anu
    Kirubaharan, D. R.
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2021, 24 (08): : 2389 - 2401
  • [35] COMPARATIVE STUDY OF DC MOTOR SPEED CONTROL USING NEURAL NETWORKS AND FUZZY LOGIC CONTROLLER
    Batayneh, Wafa
    Nawafleh, Nash'at
    PROCEEDINGS OF THE ASME INTERNATIONAL MECHANICAL ENGINEERING CONGRESS AND EXPOSITION, 2015, VOL 4B, 2016,
  • [36] From Data to Insights: Using Fuzzy Logic in Spatial Data Summarization with Fuzzy Spatial OLAP
    Keskin, Sinan
    Yazici, Adnan
    2024 IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS, FUZZ-IEEE 2024, 2024,
  • [37] Academic Data Privacy-Preserving using Centralized and Distributed Systems: A Comparative Study
    Lamaazi, Hanane
    Alneyadi, Aysha Saeed Mohammed
    Serhani, Mohamed Adel
    2024 6TH INTERNATIONAL CONFERENCE ON BIG-DATA SERVICE AND INTELLIGENT COMPUTATION, BDSIC 2024, 2024, : 8 - 16
  • [38] Comparative study of Solar PV MPPT by Perturbation and Observation and Fuzzy Method
    Jena, Prasanta Kumar
    Mohapatra, Abinash
    Srikanth
    Choudhary, Prashant
    2016 IEEE UTTAR PRADESH SECTION INTERNATIONAL CONFERENCE ON ELECTRICAL, COMPUTER AND ELECTRONICS ENGINEERING (UPCON), 2016, : 515 - 518
  • [39] Fuzzy logic consequent perturbation analysis for electric vehicles
    Economou, J. T.
    Tsourdos, A.
    White, B. A.
    PROCEEDINGS OF THE INSTITUTION OF MECHANICAL ENGINEERS PART D-JOURNAL OF AUTOMOBILE ENGINEERING, 2007, 221 (D7) : 757 - 765
  • [40] Privacy preserving data classification with rotation perturbation
    Chen, KK
    Liu, L
    Fifth IEEE International Conference on Data Mining, Proceedings, 2005, : 589 - 592