Evaluating Privacy-Preserving Strategies via Perturbation based Data Mining Using Diverse Noise Techniques

Authors

  • Ranjeet Kumar Rai Research Scholar, Department of Computer Science & Engg. MUIT, Lucknow
  • Manish Varshney Prof. School of Engineering & Technology, MUIT, Lucknow

Keywords:

Data mining, Forecasting, Machine Learning, Cryptographic, Dataset

Abstract

Knowledge discovery from data, commonly referred to as data mining. it involves the extraction of significant information, which may be previously unknown, concealed, or relevant, from extensive data sets or databases through the utilization of statistical methodologies. With the introduction of enhanced hardware technologies, there has been a proliferation in the storage and recording of personal data pertaining to individuals. Sophisticated organizations employ data mining algorithms to uncover hidden patterns or insights within data. Data mining techniques find application in diverse fields such as marketing, medical diagnosis, forecasting system, and national security. However, in scenarios where data privacy is paramount, mining certain types of data without violating the privacy of data owners presents a formidable challenge, sparking growing concerns among privacy advocates. To address these concerns, it is imperative to advance data mining procedures that are complex to individual privacy considerations. Perturbation of data plays a pivotal role in Privacy-Preserving Data Mining (PPDM). Additive data safeguard data privacy. In contrast, multiplicative data perturbation involves a series of transformations, including rotation, translation, and the addition of noise components to the perturbed data copy.

Downloads

Download data is not yet available.

References

s.Nathiya (2015)” Providing Multi Security In Privacy Preserving Data Mining” International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume – 4 Issue - 12 December, 2015 Page No. 15392-15396

R, Kalaivani & Subbiah, Chidambaram. (2014). Additive Gaussian Noise Based Data Perturbation in Multi-Level Trust Privacy Preserving Data Mining. International Journal of Data Mining & Knowledge Management Process. 4. 21-29. 10.5121/ijdkp.2014.4303.

Kamaleswari S (2014)” Handling Non-Linear Attacks in Multilevel Trust Privacy Preserving Data Mining” International Journal of Computer Science and Information Technologies, Vol. 5 (2) , 2014, 1825-1827

Likun Liu (2012)” Two Noise Addition Methods For Privacy-Preserving Data Mining” I.J. Wireless and Microwave Technologies, 2012, 3, 28-33

Patil Dnyanesh (2012)” PERTURBATION BASED RELIABILITY AND MAINTAINING AUTHENTICATION IN DATA MINING” International Conference on Advances in Computer and Electrical Engineering (ICACEE'2012) Nov. 17-18

Yaping Li, Minghua Chen, Qiwei Li and Wei Zhang (2011)” Enabling Multi-level Trust in Privacy Preserving Data Mining”

Chen, Keke & Liu, Ling. (2008). A Survey of Multiplicative Perturbation for Privacy-Preserving Data Mining. 10.1007/978-0-387-70992-5_7.

A V Sriharsha, A V Sriharsha & Parthasarathy, C.. (2015). Perturbing sensitive data using additive noise. International Journal of Applied Engineering Research. 10. 38296-38301.

Yang, Kexin & Huo, Yanmei & Yang, Lei & Wang, Di & Hu, Liang & Liu, Likun. (2012). Two Noise Addition Methods For Privacy-Preserving Data Mining. International Journal of Wireless and Microwave Technologies. 2. 10.5815/ijwmt.2012.03.05.

Wilson, Rick & Rosen, Peter. (2003). Protecting Data through Perturbation Techniques: The Impact on Knowledge Discovery in Databases.. J. Database Manag.. 14. 14-26. 10.4018/978-1-59140-471-2.ch003.

Al-Ahmadi, Mohammad & Rosen, Peter & Wilson, Rick. (2008). Data mining performance on perturbed databases: important influences on classification accuracy. International Journal of Information and Computer Security. 2. 10.1504/IJICS.2008.016822.

Mall, Pawan Kumar, et al. "Rank Based Two Stage Semi-Supervised Deep Learning Model for X-Ray Images Classification: AN APPROACH TOWARD TAGGING UNLABELED MEDICAL DATASET." Journal of Scientific & Industrial Research (JSIR) 82.08 (2023): 818-830.

Narayan, Vipul, et al. "Enhance-Net: An Approach to Boost the Performance of Deep Learning Model Based on Real-Time Medical Images." Journal of Sensors 2023 (2023).

Narayan, Vipul, A. K. Daniel, and Pooja Chaturvedi. "E-FEERP: Enhanced Fuzzy based Energy Efficient Routing Protocol for Wireless Sensor Network." Wireless Personal Communications (2023): 1-28.

Mall, Pawan Kumar, et al. "FuzzyNet-Based Modelling Smart Traffic System in Smart Cities Using Deep Learning Models." Handbook of Research on Data-Driven Mathematical Modeling in Smart Cities. IGI Global, 2023. 76-95.

Narayan, Vipul, and A. K. Daniel. "A novel approach for cluster head selection using trust function in WSN." Scalable Computing: Practice and Experience 22.1 (2021): 1-13.

Narayan, Vipul, and A. K. Daniel. "Energy Efficient Protocol for Lifetime Prediction of Wireless Sensor Network using Multivariate Polynomial Regression Model." (2022).

Narayan, Vipul, and A. K. Daniel. "CHHP: coverage optimization and hole healing protocol using sleep and wake-up concept for wireless sensor network." International Journal of System Assurance Engineering and Management 13.Suppl 1 (2022): 546-556.

Roy, S., Roy, S., Sharma, M., Mishra, V., Rashtrapal, O., & Mall, P. K. A COMPARATIVE ANALYSIS of DEEP LEARNING MODELS FOR AIR QUALITY INDEX PREDICTION.

Chourase, I., & Mall, P. K. Forest Fire and Smoke Detection Using Ensemble. Learning technique with Deep Learning neural Networks.

Mall, P.K., Shukla, A., Singh, J. (2023). An Approach Towards Early Stage Detection of Lung Cancer Using Machine Learning. In: Singh, S.N., Mahanta, S., Singh, Y.J. (eds) Proceedings of the NIELIT's International Conference on Communication, Electronics and Digital Technology. NICE-DT 2023. Lecture Notes in Networks and Systems, vol 676. Springer, Singapore. https://doi.org/10.1007/978-981-99-1699-3_37

Mall, P.K., Mishra, A., Sinha, A. (2023). Comparative Analysis of Anomaly-Based Intrusion Detection System on Artificial Intelligence. In: Singh, S.N., Mahanta, S., Singh, Y.J. (eds) Proceedings of the NIELIT's International Conference on Communication, Electronics and Digital Technology. NICE-DT 2023. Lecture Notes in Networks and Systems, vol 676. Springer, Singapore. https://doi.org/10.1007/978-981-99-1699-3_12

Downloads

Published

07.02.2024

How to Cite

Rai, R. K., & Varshney, M. . (2024). Evaluating Privacy-Preserving Strategies via Perturbation based Data Mining Using Diverse Noise Techniques. International Journal of Intelligent Systems and Applications in Engineering, 12(15s), 286–293. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/4746

Issue

Section

Research Article