A Comparative Study of Data Perturbation Using Fuzzy Logic to Preserve Privacy

被引:6
|
作者
Jahan, Thanveer [1 ]
Narasimha, G. [1 ]
Rao, C. V. Guru [2 ]
机构
[1] JNTU, Dept Comp Sci & Engn, Hyderabad, Andhra Pradesh, India
[2] S R Engg, Dept Comp Sci & Engn, Warangal, Andhra Pradesh, India
来源
NETWORKS AND COMMUNICATIONS (NETCOM2013) | 2014年 / 284卷
关键词
D O I
10.1007/978-3-319-03692-2_13
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The latest advances in the field of information technology have increased enormous growth in the data collection in this era. Individual's data are shared for business or legal reasons, containing sensitive information. Sharing data is a mutual benefit for business growth. The need to preserve privacy has become a challenging problem in privacy preserving data mining. In this paper we deal with a data analysis system having sensitive information. Exposing the information of an individual leads to security threats and could be harmful. The confidential attributes are perturbed or distorted using fuzzy logic. Fuzzy logic is used to protect individual's data to hide details of data in public. Data is owned by an authorized user, and applies distortion. The Authorized user having original dataset distorts numeric data using S-fuzzy membership function. This distorted data is published to the analyst, hiding the sensitive information present in the original data. The analysts perform data mining techniques on the distorted dataset. Accuracy is measured using classification and clustering techniques generated on distorted data is relative to the original, thus privacy is achieved. Comparison of various classifiers is generated on the original and distorted datasets.
引用
收藏
页码:161 / 170
页数:10
相关论文
共 50 条
  • [41] Adaptive complementary filter using fuzzy logic and simultaneous perturbation stochastic approximation algorithm
    Shen, Xiaowei
    Yao, Minli
    Jia, Weimin
    Yuan, Ding
    MEASUREMENT, 2012, 45 (05) : 1257 - 1265
  • [42] Enhancing resource utilization and privacy in IoT data placement through fuzzy logic and PSO optimization
    Dhanushkodi, Kavitha
    Kumar, Raushan
    Mittal, Pratyush
    Das, Saumye Saran
    Suryavenu, Neelam Naga Saivenkata
    Venkataramani, Kiruthika
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (09): : 12603 - 12626
  • [43] Fuzzy logic and neuro-fuzzy modelling of diesel spray penetration: A comparative study
    Lee, S. H.
    Howlett, R. J.
    Crua, C.
    Walters, S. D.
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2007, 18 (01) : 43 - 56
  • [44] A Hybrid Approach of Privacy Preserving Data Mining using Suppression and Perturbation Techniques
    Kaur, Arshveer
    2017 INTERNATIONAL CONFERENCE ON INNOVATIVE MECHANISMS FOR INDUSTRY APPLICATIONS (ICIMIA), 2017, : 306 - 311
  • [45] K-Anonymization approach for privacy preservation using data perturbation techniques in data mining
    Kiran, Ajmeera
    Shirisha, N.
    MATERIALS TODAY-PROCEEDINGS, 2022, 64 : 578 - 584
  • [46] A Survey on Privacy Concerns in Blockchain Applications and Current Blockchain Solutions to Preserve Data Privacy
    Baskaran, Hasventhran
    Yussof, Salman
    Rahim, Fiza Abdul
    ADVANCES IN CYBER SECURITY (ACES 2019), 2020, 1132 : 3 - 17
  • [47] A Differentially Privacy Assisted Federated Learning Scheme to Preserve Data Privacy for IoMT Applications
    Barnawi, Ahmed
    Chhikara, Prateek
    Tekchandani, Rajkumar
    Kumar, Neeraj
    Alzahrani, Bander
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2024, 21 (04): : 4686 - 4700
  • [48] K-Anonymization approach for privacy preservation using data perturbation techniques in data mining
    Kiran, Ajmeera
    Shirisha, N.
    MATERIALS TODAY-PROCEEDINGS, 2022, 64 : 578 - 584
  • [49] Reliability of Supervised Machine Learning Using Synthetic Data in Health Care: Model to Preserve Privacy for Data Sharing
    Rankin, Debbie
    Black, Michaela
    Bond, Raymond
    Wallace, Jonathan
    Mulvenna, Maurice
    Epelde, Gorka
    JMIR MEDICAL INFORMATICS, 2020, 8 (07)
  • [50] Reliability Assessment of Microarray Data Using Fuzzy Classification Methods: A Comparative Study
    Mandava, Ajay K.
    Shahram, Latifi
    Regentova, Emma E.
    ADVANCES IN COMPUTING AND COMMUNICATIONS, PT I, 2011, 190 : 351 - 360