Gaussian Noise Multiplicative Privacy for Data Perturbation Under Multi Level Trust

Authors

  • Ranjeet Kumar Rai Research Scholar, Department of Computer Science, MUIT Lucknow
  • Manish Varsney Prof. School of Engineering & Technology, MUIT , Lucknow

Keywords:

noise, Gaussian, data perturbation, trust, multi level

Abstract

Data mining is the technique of exploring and analyzing huge blocks of information to find significant trends and patterns. Perturbation is a mechanism that has been introduced in the fields of celestial mechanics and mathematical physics. Each characteristic has a weight that represents how accurate and comprehensive it is. Database and data security administrators are forced to perform a difficult balancing act when it comes to granting employees access to organizational data. for this To use multiplicative data perturbation in conjunction with single level and multilayer trust the geometric type of multiplicative data perturbation will be carried out in this method, as well. When generating the perturbed copy, geometric perturbation involves the orthonormal matrix, translational matrix, and a random generated Gaussian noise vector, among other things. In the beginning, the orthonormal matrix will be used to perform the rotation perturbation, and then the translational matrix and Gaussian noise components will be added to it for the final perturbed copy. We can say that under single level trust, additive Gaussian data perturbation produces perturbed copies using uniform Gaussian noise. Regardless of their trust ratings, all data miners receive the same perturbed copy. Additive Gaussian data perturbation at multi level trust is studied for data miners at various trust levels. A common randomization technique that guarantees confidentiality and trustworthy data mining findings is data perturbation.

Downloads

Download data is not yet available.

References

Mall, P. K., Narayan, V., Srivastava, S., Sabarwal, M., Kumar, V., Awasthi, S., & Tyagi, L. (2023). Rank Based Two Stage Semi-Supervised Deep Learning Model for X-Ray Images Classification: AN APPROACH TOWARD TAGGING UNLABELED MEDICAL DATASET. Journal of Scientific & Industrial Research (JSIR), 82(08), 818-830.

Mall, P. K., Singh, P. K., Srivastav, S., Narayan, V., Paprzycki, M., Jaworska, T., & Ganzha, M. (2023). A comprehensive review of deep neural networks for medical image processing: Recent developments and future opportunities. Healthcare Analytics, 100216.

THANGA REVATHI S (2017)” DATA PRIVACY PRESERVATION USING DATA PERTURBATION TECHNIQUES” International Journal of Soft Computing and Artificial Intelligence, ISSN: 2321-404X, International Journal of Soft Computing and Artificial Intelligence, ISSN: 2321-404X,

S.Srijayanthi (2017)” A Comprehensive Survey on Privacy Preserving Big Data Mining” International Journal of Computer Applications Technology and Research Volume 6–Issue 2, 79-86, 2017, ISSN:-2319–8656

Awasthi, S., Srivastava, A. P., Srivastava, S., & Narayan, V. (2019, April). A Comparative Study of Various CAPTCHA Methods for Securing Web Pages. In 2019 International Conference on Automation, Computational and Technology Management (ICACTM) (pp. 217-223). IEEE.

Ravi, A.T. & Chitra, S.. (2015). Privacy Preserving Data Mining. Research Journal of Applied Sciences, Engineering and Technology. 9. 616-621. 10.19026/rjaset.9.1445.

Sun, X., Xu, R., Wu, L. et al. A differentially private distributed data mining scheme with high efficiency for edge computing. J Cloud Comp 10, 7 (2021). https://doi.org/10.1186/s13677-020-00225-3

Dedi Gunawan (2020)” Classification of Privacy Preserving Data Mining Algorithms: A Review” Jurnal Elektronika dan Telekomunikasi (JET), Vol. 20, No. 2, December 2020, pp. 36-46

V. Jane Varamani Sulekh (2018)” NOISE BASED PRIVACY PRESERVING DATAMINING TECHNIQUES” International Journal of Computer Engineering and Applications, Volume XII, Issue IV, April 18, www.ijcea.com ISSN 2321-3469

Mr. Swapnil Kadam (2015)” Preserving Data Mining through Data Perturbation” International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 4 Issue 11

Shan, Jinzhao & Lin, Ying & Zhu, Xiaoke. (2020). A New Range Noise Perturbation Method based on Privacy Preserving Data Mining. 131-136. 10.1109/ICAIIS49377.2020.9194850.

Luo, Zhifeng & Wen, Congmin. (2014). A chaos-based multiplicative perturbation scheme for privacy preserving data mining. Proceedings of the IEEE International Conference on Software Engineering and Service Sciences, ICSESS. 941-944. 10.1109/ICSESS.2014.6933720.

Narayan, V., Awasthi, S., Fatima, N., Faiz, M., Bordoloi, D., Sandhu, R., & Srivastava, S. (2023, May). Severity of Lumpy Disease detection based on Deep Learning Technique. In 2023 International Conference on Disruptive Technologies (ICDT) (pp. 507-512). IEEE.

Fares, Tamer & Khalil, Awad & Mohamed, Bensaada. (2008). Privacy Preservation in Data Mining using Additive Noise.. 21st International Conference on Computer Applications in Industry and Engineering, CAINE 2008. 50-55.

Narayan, V., Faiz, M., Mall, P. K., & Srivastava, S. (2023). A Comprehensive Review of Various Approach for Medical Image Segmentation and Disease Prediction. Wireless Personal Communications, 1-30.

Awasthi, S., Srivastava, P. K., Kumar, N., Ojha, R. P., Pandey, P. S., Singh, R., ... & Bakare, Y. B. (2023). An epidemic model for the investigation of multi‐malware attack in wireless sensor network. IET Communications.

Smit, S., Popova, E., Milić, M., Costa, A., & Martínez, L. Machine Learning-based Predictive Maintenance for Industrial Systems. Kuwait Journal of Machine Learning, 1(3). Retrieved from http://kuwaitjournals.com/index.php/kjml/article/view/139

Sanapala, A. ., Lakshmi, B. J. ., Kundra, K. S. R. ., & Madhuri, K. B. . (2023). Air Pollution Detection and Control System Using ML Techniques. International Journal on Recent and Innovation Trends in Computing and Communication, 11(4), 219–225. https://doi.org/10.17762/ijritcc.v11i4.6442

Anupong, W., Yi-Chia, L., Jagdish, M., Kumar, R., Selvam, P. D., Saravanakumar, R., & Dhabliya, D. (2022). Hybrid distributed energy sources providing climate security to the agriculture environment and enhancing the yield. Sustainable Energy Technologies and Assessments, 52 doi:10.1016/j.seta.2022.102142

Downloads

Published

30.08.2023

How to Cite

Rai, R. K. ., & Varsney, M. (2023). Gaussian Noise Multiplicative Privacy for Data Perturbation Under Multi Level Trust. International Journal of Intelligent Systems and Applications in Engineering, 11(11s), 318–322. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/3475

Issue

Section

Research Article