Encrypting and Preserving Sensitive Attributes in Customer Churn Data Using Novel Dragonfly Based Pseudonymizer Approach

被引:2
|
作者
Nagaraj, Kalyan [1 ]
Sharvani, G. S. [1 ]
Sridhar, Amulyashree [1 ]
机构
[1] RV Coll Engn, Dept Comp Sci & Engn, Bangalore 560059, Karnataka, India
关键词
customer data; churn analysis; privacy; ensemble approach; data mining; FEATURE-SELECTION; PRIVACY; PREDICTION; RETENTION;
D O I
10.3390/info10090274
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With miscellaneous information accessible in public depositories, consumer data is the knowledgebase for anticipating client preferences. For instance, subscriber details are inspected in telecommunication sector to ascertain growth, customer engagement and imminent opportunity for advancement of services. Amongst such parameters, churn rate is substantial to scrutinize migrating consumers. However, predicting churn is often accustomed with prevalent risk of invading sensitive information from subscribers. Henceforth, it is worth safeguarding subtle details prior to customer-churn assessment. A dual approach is adopted based on dragonfly and pseudonymizer algorithms to secure lucidity of customer data. This twofold approach ensures sensitive attributes are protected prior to churn analysis. Exactitude of this method is investigated by comparing performances of conventional privacy preserving models against the current model. Furthermore, churn detection is substantiated prior and post data preservation for detecting information loss. It was found that the privacy based feature selection method secured sensitive attributes effectively as compared to traditional approaches. Moreover, information loss estimated prior and post security concealment identified random forest classifier as superlative churn detection model with enhanced accuracy of 94.3% and minimal data forfeiture of 0.32%. Likewise, this approach can be adopted in several domains to shield vulnerable information prior to data modeling.
引用
收藏
页数:21
相关论文
共 50 条
  • [1] Customer churn prediction using data mining approach
    Qaisi, Laila M.
    Rodan, Ali
    Qaddoum, Kefaya
    Al-Sayyed, Rizik
    2018 FIFTH HCT INFORMATION TECHNOLOGY TRENDS (ITT): EMERGING TECHNOLOGIES FOR ARTIFICIAL INTELLIGENCE, 2018, : 348 - 352
  • [2] A Metaheuristic Approach for Encrypting Blockchain Data Attributes Using Ciphertext Policy Technique
    Deb, Nabamita
    Elashiri, Mohamed A.
    Veeramakali, T.
    Rahmani, Abdul Wahab
    Degadwala, Sheshang
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2022, 2022
  • [3] A Metaheuristic Approach for Encrypting Blockchain Data Attributes Using Ciphertext Policy Technique
    Deb, Nabamita
    Elashiri, Mohamed A.
    Veeramakali, T.
    Rahmani, Abdul Wahab
    Degadwala, Sheshang
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2022, 2022
  • [4] A privacy preserving approach based on attributes correlation partition for multiple sensitive attributes
    Xie, Jing
    Zhang, Jian-Pei
    Yang, Jing
    Zhang, Bing
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2014, 42 (09): : 1718 - 1723
  • [5] Multiple Sensitive Attributes Based Privacy Preserving Data Publishing
    Vanasiwala, Jasmina N.
    Nanavati, Nirali R.
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTING METHODOLOGIES AND COMMUNICATION (ICCMC 2018), 2018, : 394 - 400
  • [6] A Data-Driven Approach to Improve Customer Churn Prediction Based on Telecom Customer Segmentation
    Zhang, Tianyuan
    Moro, Sergio
    Ramos, Ricardo F.
    FUTURE INTERNET, 2022, 14 (03):
  • [7] Privacy preserving approach based on proximity privacy for numerical sensitive attributes
    Xie, Jing
    Zhang, Jian-Pei
    Yang, Jing
    Zhang, Bing
    Tongxin Xuebao/Journal on Communications, 2015, 36 (04):
  • [8] Privacy Preserving Data Publishing for Multiple Sensitive Attributes Based on Security Level
    Xiao, Yuelei
    Li, Haiqi
    INFORMATION, 2020, 11 (03)
  • [9] Privacy Preserving Data Publishing with Multiple Sensitive Attributes based on Overlapped Slicing
    Widodo
    Budiardjo, Eko Kuswardono
    Wibowo, Wahyu Catur
    INFORMATION, 2019, 10 (12)
  • [10] Offering a hybrid approach of data mining to predict the customer churn based on bagging and boosting methods
    Fathian, Mohammad
    Hoseinpoor, Yaser
    Minaei-Bidgoli, Behrouz
    KYBERNETES, 2016, 45 (05) : 732 - 743