Preserving Privacy Using Data Perturbation in Data Stream

Abstract

Data stream can be conceived as a continuous and changing sequence of data that continuously arrive at a system to store or process. Examples of data streams include computer network traffic, phone conversations, web searches and sensor data etc. The data owners or publishers may not be willing to exactly reveal the true values of their data due to various reasons, most notably privacy considerations. To preserve data privacy during data mining, the issue of privacy preserving data mining has been widely studied and many techniques have been proposed. However, existing techniques for privacy preserving data mining is designed for traditional static data sets and are not suitable for data streams. So the privacy preservation issue of data streams mining is need for the time. This paper focused on describing a method that extends the process of data perturbation on data sets to achieve privacy preservation. The technique mainly exploits a combination of isometric transformations i.e. translation and rotation transformations used with a secure random function in order to provide secrecy of user-specified attributes without losing accuracy in results.

Authors and Affiliations

1Neha Gupta , IndrJeet Rajput

Keywords

Related Articles

Mitigating Denial of Service Attacks in Wireless Networks

The open nature of the wireless media becomes a root cause for denial of service attack. Denial of Service (DOS) can be different types and disrupt multiple layers. The idea here is to prevent the cyberspace from DOS att...

Sql-Injection Tool for finding the Vulnerability and Automatic Creation of Attacks on JSP  

These days’ cyber attacks have become a major concern because these attackers can steal important documents and damage websites and access confidential information and may drive many corporations that conduct the...

Study of Imaged Based Human Height Measurement & Application  

— The paper represents practical improvement in Imaged based human height measurement system. The configuration of proposed measurement is very simple, consisting of one static camera and laser circuitry. Camera...

SECURE MULTICAST COMMUNICATION USING GROUP BASED MULTICAST HIERARCHY  

Secure multicast communication is a significant requirement in emerging applications in adhoc environments like military or public emergency network applications. Membership dynamism is a major challenge in providi...

An Effective S-Box Comparison by Parity Based Fault Detection Scheme Using Composite Fields

AES is the most effective algorithm for network security that is more confidential, reliable and robust. A key step in the Advanced Encryption Standard (AES) algorithm is the subbyte transformation and its inverse . The...

Download PDF file
  • EP ID EP125788
  • DOI -
  • Views 99
  • Downloads 0

How To Cite

1Neha Gupta, IndrJeet Rajput (2013). Preserving Privacy Using Data Perturbation in Data Stream. International Journal of Advanced Research in Computer Engineering & Technology(IJARCET), 2(5), 1699-1704. https://europub.co.uk/articles/-A-125788