A COMPLETE PRIVACY PRESERVATION SYSTEM FOR DATA MINING USING FUNCTION APPROXIMATION

被引:0
|
作者
Rajalakshmi, V. [1 ]
Lakshmi, M. [1 ]
Anu, V. Maria [1 ]
机构
[1] Sathyabama Univ, Sch Comp, Chennai 600119, Tamil Nadu, India
来源
JOURNAL OF WEB ENGINEERING | 2017年 / 16卷 / 3-4期
关键词
Privacy preservation; Radial basis function; Function approximation; Data anonymization; K-ANONYMIZATION; INFORMATION;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Data privacy has become the primary concern in the current scenario as there are many pioneering methods for efficient mining of data. There are many algorithms to preserve privacy and handle the trade-off between privacy and utility. The ultimate goal of these algorithms is to anonymize the data without reducing the utility of them. A Privacy preserving procedure should have a minimum execution time, which is the overhead of clustering algorithms implemented using classical methods. There is also no single procedure that completely handles the trade-off and also updates itself automatically. In this work, the anonymization is implemented using Radial Basis Function [RBF] network, which provides both maximum privacy and utility with a proper tuning parameter specified between privacy and utility. The network also updates itself when the trend of data changes by controlling the maximum amount of error with a threshold value.
引用
收藏
页码:277 / 292
页数:16
相关论文
共 50 条
  • [31] A Privacy Preserving Jaccard Similarity Function for Mining Encrypted Data
    Singh, Meena Dilip
    Krishna, P. Radha
    Saxena, Ashutosh
    TENCON 2009 - 2009 IEEE REGION 10 CONFERENCE, VOLS 1-4, 2009, : 502 - +
  • [32] Using cryptography for privacy protection in data mining systems
    Zhan, Justin
    WEB INTELLIGENCE MEETS BRAIN INFORMATICS, 2007, 4845 : 494 - +
  • [33] Privacy preservation for data cubes
    Sam Y. Sung
    Yao Liu
    Hui Xiong
    Peter A. Ng
    Knowledge and Information Systems, 2006, 9 : 38 - 61
  • [34] Privacy preservation for data cubes
    Sung, SY
    Liu, Y
    Xiong, H
    Ng, PA
    KNOWLEDGE AND INFORMATION SYSTEMS, 2006, 9 (01) : 38 - 61
  • [35] Ensuring Privacy in Data Mining using Neural Networks
    Niranjan, D.
    Manikandan, G.
    Sairam, N.
    Harish, V.
    Saikumar, Nooka
    RESEARCH JOURNAL OF PHARMACEUTICAL BIOLOGICAL AND CHEMICAL SCIENCES, 2016, 7 (04): : 1262 - 1267
  • [36] Individual privacy in data mining using fuzzy optimization
    Bhuyan, Hemanta Kumar
    Kamila, Narendra Kumar
    Pani, Subhendu Kumar
    ENGINEERING OPTIMIZATION, 2022, 54 (08) : 1305 - 1323
  • [37] Privacy Preserving Mining of Distributed Data Using Steganography
    Kumari, D. Aruna
    Rao, K. Raja Sekhar
    Suman, M.
    RECENT TRENDS IN NETWORK SECURITY AND APPLICATIONS, 2010, 89 : 263 - 269
  • [38] Privacy Preserving Data Utility Mining Using Perturbation
    Jisna, Joseph
    Salim, A.
    DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY (ICDCIT 2018), 2018, 10722 : 112 - 120
  • [39] Efficient approximation and privacy preservation algorithms for real time online evolving data streams
    Rahul A. Patil
    Pramod D. Patil
    World Wide Web, 2024, 27
  • [40] Efficient approximation and privacy preservation algorithms for real time online evolving data streams
    Patil, Rahul A.
    Patil, Pramod D.
    WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2024, 27 (01):