A novel framework for optimised privacy preserving data mining using the innovative desultory technique

被引:8
|
作者
Indumathi, J. [1 ]
Uma, G. V. [1 ]
机构
[1] Anna Univ, Dept Comp Sci & Engn, Madras 600025, Tamil Nadu, India
关键词
access control; CLARANS; clustering; data mining; desultory; dissimilarity matrix; PPDM; privacy preserving data mining; randomisation; simulating annealing;
D O I
10.1504/IJCAT.2009.026596
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Computing is an ogle spectator witnessing afloat similar to a tornado. The chic data analysis and mining techniques compromise privacy and their exploitation have reached the pinnacle, demanding our attention. Amongst the available diverse techniques available for privacy preservation, the existing techniques involve only individual preservations. This work proposes novel three-tier architecture. The subsequent coalescing of three best secure techniques endows us with a three-fold privacy preservation, namely access control limitation technique, randomization and Privacy Preserving Clustering (PPC). Thus, our framework gives an efficient control system comprising authentication, authorization and access for each database application; efficiency and economical benefits of randomization and advantages of PPC. We have further proposed a method for computing the object-based dissimilarity for secure computation for all different attribute types. PPC uses a combination of CLARANS with Simulating Annealing in order to achieve increased privacy, efficient scaling and improvised performance.
引用
收藏
页码:194 / 203
页数:10
相关论文
共 50 条
  • [1] Design of an augmented and optimised hiding technique and framework for privacy preserving data mining
    Indumathi, J.
    Uma, G. V.
    WORLD CONGRESS ON ENGINEERING 2008, VOLS I-II, 2008, : 315 - +
  • [2] Privacy preserving data mining: A noise addition framework using a novel clustering technique
    Islam, Md Zahidul
    Brankovic, Ljiljana
    KNOWLEDGE-BASED SYSTEMS, 2011, 24 (08) : 1214 - 1223
  • [3] Privacy Preserving Technique in Data Mining by Using Chinease Remainder Theorem
    Rajesh, P.
    Narasimha, G.
    Rupa, Ch.
    ECO-FRIENDLY COMPUTING AND COMMUNICATION SYSTEMS, 2012, 305 : 434 - +
  • [4] A Novel Framework for Preserving Privacy of Data Using Correlation Analysis
    Tripathy, Animesh
    Pradhan, Matrubhumi
    PROCEEDINGS OF THE 2012 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI'12), 2012, : 650 - 655
  • [5] A Framework for Evaluating Privacy Preserving Data Mining Algorithms*
    Elisa Bertino
    Igor Nai Fovino
    Loredana Parasiliti Provenza
    Data Mining and Knowledge Discovery, 2005, 11 : 121 - 154
  • [6] A Classification Based Framework for Privacy Preserving Data Mining
    Tripathy, Animesh
    Dansana, Jayanti
    Mishra, Ranjita
    PROCEEDINGS OF THE 2012 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI'12), 2012, : 660 - 666
  • [7] A framework for evaluating privacy preserving data mining algorithms
    Bertino, E
    Fovino, IN
    Provenza, LP
    DATA MINING AND KNOWLEDGE DISCOVERY, 2005, 11 (02) : 121 - 154
  • [8] A novel technique of Privacy Preserving Association Rule Mining
    Mohammed, Rana Saad
    Hussien, Enas Mohammed
    Mutter, Jinan Redha
    2016 AL-SADIQ INTERNATIONAL CONFERENCE ON MULTIDISCIPLINARY IN IT AND COMMUNICATION TECHNIQUES SCIENCE AND APPLICATIONS (AIC-MITCSA), 2016,
  • [9] A Novel Approach for Horizontal Privacy Preserving Data Mining
    Jalla, Hanumantha Rao
    Girija, P. N.
    INFORMATION SYSTEMS DESIGN AND INTELLIGENT APPLICATIONS, VOL 2, INDIA 2016, 2016, 434 : 101 - 111
  • [10] Privacy Preserving Data Mining Technique to Secure Distributed Client Data
    Dani, Virendra
    Kokate, Priyanka
    Kushwah, Surbhi
    Waghela, Swapnil
    HYBRID INTELLIGENT SYSTEMS, HIS 2021, 2022, 420 : 565 - 574