A Privacy-Preserving Data Mining Through Comprehensive GNIPP Approach in Sensitive Data Sets

Journal Title: International Journal of Experimental Research and Review - Year 2024, Vol 44, Issue 8

Abstract

The quick growth of methods for analyzing data and the availability of easily available datasets have made it possible to build a thorough analytics model that can help with support decision-making. In the meantime, protecting personal privacy is crucial. A popular technique for medical evaluation and prediction, decision trees are easy to comprehend and interpret. However, the decision tree construction procedure may reveal personal information about an individual. By keeping the statistical properties intact and limiting the chance of privacy leaking within a reasonable bound, differential privacy offers a formal mathematical definition of privacy. To construct a boosting random forest that preserves privacy, we propose a Gaussian Noise Integrated Privacy Preservation (GNIPP) in this study. To address the issue of personal information breaches, we have designed a unique Gaussian distribution mechanism in GNIPP that enables the nodes with deeper depth to obtain more privacy during the decision tree construction process. We propose a comprehensive boosting technique based on the decision forest's prediction accuracy for assembling multiple decision trees into a forest. Furthermore, we propose an iterative technique to accelerate the assembly of decision trees. After all, we demonstrate through experimentation that the suggested GNIPP outperforms alternative algorithms on two real-world datasets.

Authors and Affiliations

Shailesh Kumar Vyas, Swapnili Karmore

Keywords

Related Articles

A small molecule inhibits pancreatic cancer stem cells

Pancreatic cancer is the fourth highest cause of cancer-related deaths in the United States, with a projected 60,430 new cases diagnosed and 48,220 patients dying in 2021. We employed a small chemical, N-(6-Chloro-2-enzo...

Phishing Detection: A Hybrid Model with Feature Selection and Machine Learning Techniques

Various phishing problems increase in cyber space with the progress of information technology. One of the prominent cyber-attacks rooted in social engineering is known as phishing. This malicious activity aims to deceive...

Formation of medium-ring heterocyclic compounds by two-directional ring-closing metathesis reaction

Ahmed, A., Ohler, E. and Mulzer, J. (2001). Synthesis of (S)-4-Methyl-3,6-dihydro-2H pyran-2-carbaldehyde by Twodirectional Ring Closing Metathesis: Application to the C27-C15-Fragment of Laulimalide. Synthesis. 2001(13)...

A Secure Biometric-Based User Authentication Scheme for Cyber-Physical Systems in Healthcare

The effectiveness and advantages of Cyber-Physical Systems (CPS) are significantly influenced by the interconnectivity of individual devices or nodes, such as Internet of Things (IoT) devices. The exchange of data that i...

A Cross-Sectional Study to Analyze the Physical and Cognitive Fatigue Due to Sleep Disruption Among Shift Workers in Tamilnadu

The objective of this research is to analyse the extent and manner of the kind of fatigue among shift workers in Tamil Nadu, India. As for shift workers, they often have disturbed night’s sleep. Shift work is distinguish...

Download PDF file
  • EP ID EP750721
  • DOI 10.52756/ijerr.2024.v44spl.002
  • Views 60
  • Downloads 0

How To Cite

Shailesh Kumar Vyas, Swapnili Karmore (2024). A Privacy-Preserving Data Mining Through Comprehensive GNIPP Approach in Sensitive Data Sets. International Journal of Experimental Research and Review, 44(8), -. https://europub.co.uk/articles/-A-750721