ANONYMIZATION BASED ON NESTED CLUSTERING FOR PRIVACY PRESERVATION IN DATA MINING
Journal Title: Indian Journal of Computer Science and Engineering - Year 2013, Vol 4, Issue 3
Abstract
Privacy Preservation in data mining protects the data from revealing unauthorized extraction of information. Data Anonymization techniques implement this by modifying the data, so that the original values cannot be acquired easily. Perturbation techniques are variedly used which will greatly affect the quality of data, since there is a trade-off between privacy preservation and information loss which will subsequently affect the result of data mining. The method that is proposed in this paper is based on nested clustering of data and perturbation on each cluster. The size of clusters is kept optimal to reduce the information loss. The paper explains the methodology, implementation and results of nested clustering. Various metrics are also provided to explicate that this method overcomes the disadvantages of other perturbation methods.
Authors and Affiliations
V. Rajalakshmi , G. S. Anandha Mala
A REVIEW OF M-LEARNING MODELS
In the most recent times, mobile visitors form the fastest growing Web community. The ease with which web pages or information is retrieved from the Web using PDAs or cell phones is a result of the rapid development in w...
TRACING EFFICIENT PATH USING WEB PATH TRACING
In the fast improving society, people depend on online purchase of goods than spending time physically. So there are lots of resources emerged for this online buying and selling of materials. Efficient and attractive web...
A STUDY OF INTELLIGENT CONTROLLERS APPLICATION IN DISTRIBUTED SYSTEMS
Intelligent Control emulates the human intelligence and achieves automation in various areas of Engineering. Intelligent Controls have been used mainly in the areas of Electrical Systems; Machine Intelligence based syste...
RANK LEVEL FUSION USING FINGERPRINT AND IRIS BIOMETRICS
Authentication of users is an essential and difficult to achieve in all systems. Shared secrets like Personal Identification Numbers (PIN) or Passwords and key devices such as Smart cards are not presently sufficient in...
ANALYSING THE ACCEPTANCE CRITERIA AMONG THE CONCEPTS FOR GENERATING AUTOMATED ONTOLOGIES
The semantic search yields fruitful results while searching the concepts. Ontologies play a crucial role in searching the concepts in a semantic way. It is otherwise said that, wherever search is needed, ontology search...