Gaussian Noise Multiplicative Privacy for Data Perturbation Under Multi Level Trust
Keywords:noise, Gaussian, data perturbation, trust, multi level
Data mining is the technique of exploring and analyzing huge blocks of information to find significant trends and patterns. Perturbation is a mechanism that has been introduced in the fields of celestial mechanics and mathematical physics. Each characteristic has a weight that represents how accurate and comprehensive it is. Database and data security administrators are forced to perform a difficult balancing act when it comes to granting employees access to organizational data. for this To use multiplicative data perturbation in conjunction with single level and multilayer trust the geometric type of multiplicative data perturbation will be carried out in this method, as well. When generating the perturbed copy, geometric perturbation involves the orthonormal matrix, translational matrix, and a random generated Gaussian noise vector, among other things. In the beginning, the orthonormal matrix will be used to perform the rotation perturbation, and then the translational matrix and Gaussian noise components will be added to it for the final perturbed copy. We can say that under single level trust, additive Gaussian data perturbation produces perturbed copies using uniform Gaussian noise. Regardless of their trust ratings, all data miners receive the same perturbed copy. Additive Gaussian data perturbation at multi level trust is studied for data miners at various trust levels. A common randomization technique that guarantees confidentiality and trustworthy data mining findings is data perturbation.
Mall, P. K., Narayan, V., Srivastava, S., Sabarwal, M., Kumar, V., Awasthi, S., & Tyagi, L. (2023). Rank Based Two Stage Semi-Supervised Deep Learning Model for X-Ray Images Classification: AN APPROACH TOWARD TAGGING UNLABELED MEDICAL DATASET. Journal of Scientific & Industrial Research (JSIR), 82(08), 818-830.
Mall, P. K., Singh, P. K., Srivastav, S., Narayan, V., Paprzycki, M., Jaworska, T., & Ganzha, M. (2023). A comprehensive review of deep neural networks for medical image processing: Recent developments and future opportunities. Healthcare Analytics, 100216.
THANGA REVATHI S (2017)” DATA PRIVACY PRESERVATION USING DATA PERTURBATION TECHNIQUES” International Journal of Soft Computing and Artificial Intelligence, ISSN: 2321-404X, International Journal of Soft Computing and Artificial Intelligence, ISSN: 2321-404X,
S.Srijayanthi (2017)” A Comprehensive Survey on Privacy Preserving Big Data Mining” International Journal of Computer Applications Technology and Research Volume 6–Issue 2, 79-86, 2017, ISSN:-2319–8656
Awasthi, S., Srivastava, A. P., Srivastava, S., & Narayan, V. (2019, April). A Comparative Study of Various CAPTCHA Methods for Securing Web Pages. In 2019 International Conference on Automation, Computational and Technology Management (ICACTM) (pp. 217-223). IEEE.
Ravi, A.T. & Chitra, S.. (2015). Privacy Preserving Data Mining. Research Journal of Applied Sciences, Engineering and Technology. 9. 616-621. 10.19026/rjaset.9.1445.
Sun, X., Xu, R., Wu, L. et al. A differentially private distributed data mining scheme with high efficiency for edge computing. J Cloud Comp 10, 7 (2021). https://doi.org/10.1186/s13677-020-00225-3
Dedi Gunawan (2020)” Classification of Privacy Preserving Data Mining Algorithms: A Review” Jurnal Elektronika dan Telekomunikasi (JET), Vol. 20, No. 2, December 2020, pp. 36-46
V. Jane Varamani Sulekh (2018)” NOISE BASED PRIVACY PRESERVING DATAMINING TECHNIQUES” International Journal of Computer Engineering and Applications, Volume XII, Issue IV, April 18, www.ijcea.com ISSN 2321-3469
Mr. Swapnil Kadam (2015)” Preserving Data Mining through Data Perturbation” International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 4 Issue 11
Shan, Jinzhao & Lin, Ying & Zhu, Xiaoke. (2020). A New Range Noise Perturbation Method based on Privacy Preserving Data Mining. 131-136. 10.1109/ICAIIS49377.2020.9194850.
Luo, Zhifeng & Wen, Congmin. (2014). A chaos-based multiplicative perturbation scheme for privacy preserving data mining. Proceedings of the IEEE International Conference on Software Engineering and Service Sciences, ICSESS. 941-944. 10.1109/ICSESS.2014.6933720.
Narayan, V., Awasthi, S., Fatima, N., Faiz, M., Bordoloi, D., Sandhu, R., & Srivastava, S. (2023, May). Severity of Lumpy Disease detection based on Deep Learning Technique. In 2023 International Conference on Disruptive Technologies (ICDT) (pp. 507-512). IEEE.
Fares, Tamer & Khalil, Awad & Mohamed, Bensaada. (2008). Privacy Preservation in Data Mining using Additive Noise.. 21st International Conference on Computer Applications in Industry and Engineering, CAINE 2008. 50-55.
Narayan, V., Faiz, M., Mall, P. K., & Srivastava, S. (2023). A Comprehensive Review of Various Approach for Medical Image Segmentation and Disease Prediction. Wireless Personal Communications, 1-30.
Awasthi, S., Srivastava, P. K., Kumar, N., Ojha, R. P., Pandey, P. S., Singh, R., ... & Bakare, Y. B. (2023). An epidemic model for the investigation of multi‐malware attack in wireless sensor network. IET Communications.
Smit, S., Popova, E., Milić, M., Costa, A., & Martínez, L. Machine Learning-based Predictive Maintenance for Industrial Systems. Kuwait Journal of Machine Learning, 1(3). Retrieved from http://kuwaitjournals.com/index.php/kjml/article/view/139
Sanapala, A. ., Lakshmi, B. J. ., Kundra, K. S. R. ., & Madhuri, K. B. . (2023). Air Pollution Detection and Control System Using ML Techniques. International Journal on Recent and Innovation Trends in Computing and Communication, 11(4), 219–225. https://doi.org/10.17762/ijritcc.v11i4.6442
Anupong, W., Yi-Chia, L., Jagdish, M., Kumar, R., Selvam, P. D., Saravanakumar, R., & Dhabliya, D. (2022). Hybrid distributed energy sources providing climate security to the agriculture environment and enhancing the yield. Sustainable Energy Technologies and Assessments, 52 doi:10.1016/j.seta.2022.102142
How to Cite
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.