Preserving Privacy Using Data Perturbation in Data Stream

Abstract

Data stream can be conceived as a continuous and changing sequence of data that continuously arrive at a system to store or process. Examples of data streams include computer network traffic, phone conversations, web searches and sensor data etc. The data owners or publishers may not be willing to exactly reveal the true values of their data due to various reasons, most notably privacy considerations. To preserve data privacy during data mining, the issue of privacy preserving data mining has been widely studied and many techniques have been proposed. However, existing techniques for privacy preserving data mining is designed for traditional static data sets and are not suitable for data streams. So the privacy preservation issue of data streams mining is need for the time. This paper focused on describing a method that extends the process of data perturbation on data sets to achieve privacy preservation. The technique mainly exploits a combination of isometric transformations i.e. translation and rotation transformations used with a secure random function in order to provide secrecy of user-specified attributes without losing accuracy in results.

Authors and Affiliations

1Neha Gupta , IndrJeet Rajput

Keywords

Related Articles

Biological Effect of High Frequency Electromagnetic Radiation – A Review 

In the era of wireless communication, the exposure to electromagnetic radiations is increasing. Most of these radiations fall in the category of microwaves. In addition, domestic appliances and medical treatments a...

MSNN based techniques for Face and Eye Recognition 

The accurate technique of face recognition effects the performance of a face detection system. An accurate eye localization system is required for better results. There are various techniques for Face and eye det...

Design of Dynamic Error Handling Tool 

t— In any programming language or environment, error messages perform role of intermediate between system (program development tool) and programmer. So it is important point of interaction in system. This point bec...

An Unobservable Secure Routing Protocol against Wormhole and Black hole Attacks in MANET. 

Mobile ad-hoc network (MANET) is a selfconfiguring infrastructure-less network of mobile devices. The sensitive information such as mobility behavior should be kept private from adversaries in wireless environments...

Interference Mitigation by CDMA RAKE Receiver With Walsh-Hadamard Sequence  

Interference Mitigation by CDMA RAKE Receiver With Walsh-Hadamard Sequence Interference Mitigation by CDMA RAKE Receiver With Walsh-Hadamard Sequence Interference Mitigation by CDMA RAKE Receiver With Walsh-...

Download PDF file
  • EP ID EP125788
  • DOI -
  • Views 83
  • Downloads 0

How To Cite

1Neha Gupta, IndrJeet Rajput (2013). Preserving Privacy Using Data Perturbation in Data Stream. International Journal of Advanced Research in Computer Engineering & Technology(IJARCET), 2(5), 1699-1704. https://europub.co.uk/articles/-A-125788