A novel framework for optimised privacy preserving data mining using the innovative desultory technique

被引:8
|
作者
Indumathi, J. [1 ]
Uma, G. V. [1 ]
机构
[1] Anna Univ, Dept Comp Sci & Engn, Madras 600025, Tamil Nadu, India
关键词
access control; CLARANS; clustering; data mining; desultory; dissimilarity matrix; PPDM; privacy preserving data mining; randomisation; simulating annealing;
D O I
10.1504/IJCAT.2009.026596
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Computing is an ogle spectator witnessing afloat similar to a tornado. The chic data analysis and mining techniques compromise privacy and their exploitation have reached the pinnacle, demanding our attention. Amongst the available diverse techniques available for privacy preservation, the existing techniques involve only individual preservations. This work proposes novel three-tier architecture. The subsequent coalescing of three best secure techniques endows us with a three-fold privacy preservation, namely access control limitation technique, randomization and Privacy Preserving Clustering (PPC). Thus, our framework gives an efficient control system comprising authentication, authorization and access for each database application; efficiency and economical benefits of randomization and advantages of PPC. We have further proposed a method for computing the object-based dissimilarity for secure computation for all different attribute types. PPC uses a combination of CLARANS with Simulating Annealing in order to achieve increased privacy, efficient scaling and improvised performance.
引用
收藏
页码:194 / 203
页数:10
相关论文
共 50 条
  • [31] δ-privacy: Bounding Privacy Leaks in Privacy Preserving Data Mining
    Li, Zhizhou
    Lai, Ten H.
    DATA PRIVACY MANAGEMENT, CRYPTOCURRENCIES AND BLOCKCHAIN TECHNOLOGY, 2017, 10436 : 124 - 142
  • [32] Privacy Preserving Data Mining using Visual Steganography and Encryption
    Sah, Hare Ram
    Gunasekaran, G.
    10TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION (ICCSE 2015), 2015, : 154 - 158
  • [33] Fuzzy Random Decision Tree (FRDT) Framework for Privacy Preserving Data Mining
    Sumalatha, L.
    Sankar, P. Uma
    PROCEEDINGS OF THE 2016 SAI COMPUTING CONFERENCE (SAI), 2016, : 195 - 202
  • [34] Multi-party, privacy-preserving distributed data mining using a game theoretic framework
    Kargupta, Hillol
    Das, Kamalika
    Liu, Kun
    KNOWLEDGE DISCOVERY IN DATABASES: PKDD 2007, PROCEEDINGS, 2007, 4702 : 523 - +
  • [35] Reversible privacy preserving data mining: a combination of difference expansion and privacy preserving
    Tung-Shou Chen
    Wei-Bin Lee
    Jeanne Chen
    Yuan-Hung Kao
    Pei-Wen Hou
    The Journal of Supercomputing, 2013, 66 : 907 - 917
  • [36] Reversible privacy preserving data mining: a combination of difference expansion and privacy preserving
    Chen, Tung-Shou
    Lee, Wei-Bin
    Chen, Jeanne
    Kao, Yuan-Hung
    Hou, Pei-Wen
    JOURNAL OF SUPERCOMPUTING, 2013, 66 (02): : 907 - 917
  • [37] ESA: A Novel Privacy Preserving Framework
    Wang L.
    Meng X.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2022, 59 (01): : 144 - 171
  • [38] Privacy preserving data mining algorithms by data distortion
    Wu Xiao-dan
    Yue Dian-min
    Liu Feng-li
    Wang Yun-feng
    Chu Chao-Hsien
    PROCEEDINGS OF THE 2006 INTERNATIONAL CONFERENCE ON MANAGEMENT SCIENCE & ENGINEERING (13TH), VOLS 1-3, 2006, : 223 - 228
  • [39] A Novel Privacy Preserving Framework for Large Scale Graph Data Publishing
    Ding, Xiaofeng
    Wang, Cui
    Choo, Kim-Kwang Raymond
    Jin, Hai
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2021, 33 (02) : 331 - 343
  • [40] Novel Algorithms for Privacy Preserving Utility Mining
    Yeh, Teh-Shan
    Hsu, Po-Chiang
    Wen, Ming-Hsun
    ISDA 2008: EIGHTH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS, VOL 1, PROCEEDINGS, 2008, : 291 - 296