Preserving Privacy Using Data Perturbation in Data Stream

Abstract

Data stream can be conceived as a continuous and changing sequence of data that continuously arrive at a system to store or process. Examples of data streams include computer network traffic, phone conversations, web searches and sensor data etc. The data owners or publishers may not be willing to exactly reveal the true values of their data due to various reasons, most notably privacy considerations. To preserve data privacy during data mining, the issue of privacy preserving data mining has been widely studied and many techniques have been proposed. However, existing techniques for privacy preserving data mining is designed for traditional static data sets and are not suitable for data streams. So the privacy preservation issue of data streams mining is need for the time. This paper focused on describing a method that extends the process of data perturbation on data sets to achieve privacy preservation. The technique mainly exploits a combination of isometric transformations i.e. translation and rotation transformations used with a secure random function in order to provide secrecy of user-specified attributes without losing accuracy in results.

Authors and Affiliations

1Neha Gupta , IndrJeet Rajput

Keywords

Related Articles

A 5 level, 3 phase H-bridge PWM method for I.M. Controlling with field oriented techniques  

This paper presents a micro controller based field oriented control 5-level inverter for three phase Induction motor. IGBT is used as power element. Pulse width modulation techniques (PWM), introduced three decad...

Segmentation of the White Matter from the Brain fMRI Images 

Segmentation of the white matter from the brain fMRI images for the study of brain activities and for the diagnosis for various brain related diseases caused by the changes and damages to regions of the brain conti...

An efficient technique for maximization of network lifetime & minimization of delay for the performance enhancement of WSN 

The Main emphasis of this paper is to analyze and assess the performance of various techniques in the effort to determine the maximum lifetime of the nodes & minimization of delay. This paper,mainly concentrate...

A STUDY OF DIFFERENT ATTACKS IN MANET AND DISCUSSION ABOUT SOLUTIONS OF BLACK HOLE ATTACK ON AODV PROTOCOL

MANET are gaining popularity now days due to flexibility and communication without the infrastructure or centralized access point. The dynamic changing nature of network topology makes any node in MANET to leave and join...

DVS Scheduling in Multi Core Real Time System 

Embedded systems have been widely used in portable devices. To meet real time application demands computing capability of the embedded system should be high. It is very important for designing of embedded system to...

Download PDF file
  • EP ID EP125788
  • DOI -
  • Views 112
  • Downloads 0

How To Cite

1Neha Gupta, IndrJeet Rajput (2013). Preserving Privacy Using Data Perturbation in Data Stream. International Journal of Advanced Research in Computer Engineering & Technology(IJARCET), 2(5), 1699-1704. https://europub.co.uk/articles/-A-125788