A novel framework for optimised privacy preserving data mining using the innovative desultory technique

被引:8
|
作者
Indumathi, J. [1 ]
Uma, G. V. [1 ]
机构
[1] Anna Univ, Dept Comp Sci & Engn, Madras 600025, Tamil Nadu, India
关键词
access control; CLARANS; clustering; data mining; desultory; dissimilarity matrix; PPDM; privacy preserving data mining; randomisation; simulating annealing;
D O I
10.1504/IJCAT.2009.026596
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Computing is an ogle spectator witnessing afloat similar to a tornado. The chic data analysis and mining techniques compromise privacy and their exploitation have reached the pinnacle, demanding our attention. Amongst the available diverse techniques available for privacy preservation, the existing techniques involve only individual preservations. This work proposes novel three-tier architecture. The subsequent coalescing of three best secure techniques endows us with a three-fold privacy preservation, namely access control limitation technique, randomization and Privacy Preserving Clustering (PPC). Thus, our framework gives an efficient control system comprising authentication, authorization and access for each database application; efficiency and economical benefits of randomization and advantages of PPC. We have further proposed a method for computing the object-based dissimilarity for secure computation for all different attribute types. PPC uses a combination of CLARANS with Simulating Annealing in order to achieve increased privacy, efficient scaling and improvised performance.
引用
收藏
页码:194 / 203
页数:10
相关论文
共 50 条
  • [21] Privacy Preserving Data Mining by Cyptography
    Sharma, Anand
    Ojha, Vibha
    RECENT TRENDS IN NETWORK SECURITY AND APPLICATIONS, 2010, 89 : 576 - +
  • [22] Privacy-preserving data mining
    Agrawal, R
    Srikant, R
    SIGMOD RECORD, 2000, 29 (02) : 439 - 450
  • [23] A Survey on Privacy Preserving Data Mining
    Wang, Jian
    Luo, Yongcheng
    Zhao, Yan
    Le, Jianjin
    FIRST INTERNATIONAL WORKSHOP ON DATABASE TECHNOLOGY AND APPLICATIONS, PROCEEDINGS, 2009, : 111 - 114
  • [24] Research on Privacy Preserving Data Mining
    Wang, Pingshui
    Wang, Jiandong
    Zhu, Xinfeng
    Jiang, Jian
    2010 INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT (CCCM2010), VOL I, 2010, : 172 - 175
  • [25] On data distortion for privacy preserving data mining
    Kabir, Saif M. A.
    Youssef, Amr M.
    Elhakeem, Ahmed K.
    2007 CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1-3, 2007, : 308 - 311
  • [26] An Overview of Privacy Preserving Data Mining
    Qi, Xinjun
    Zong, Mingkui
    2011 INTERNATIONAL CONFERENCE OF ENVIRONMENTAL SCIENCE AND ENGINEERING, VOL 12, PT B, 2012, 12 : 1341 - 1347
  • [27] A Survey on Privacy Preserving Data Mining
    Saranya, K.
    Premalatha, K.
    Rajasekar, S. S.
    2015 2ND INTERNATIONAL CONFERENCE ON ELECTRONICS AND COMMUNICATION SYSTEMS (ICECS), 2015, : 1740 - U2102
  • [28] A Review on Privacy Preserving Data Mining
    Shanthi, A. S.
    Karthikeyan, M.
    2012 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC), 2012, : 438 - 441
  • [29] Study of Privacy Preserving Data Mining
    Li, Haisheng
    2010 THIRD INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY AND SECURITY INFORMATICS (IITSI 2010), 2010, : 700 - 703
  • [30] Survey on privacy preserving data mining
    Wang P.
    International Journal of Digital Content Technology and its Applications, 2010, 4 (09) : 1 - 7