Preserving the Privacy and Sharing the Data using Classification on Perturbed Data

Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 3

Abstract

Data mining is a powerful tool which supports automatic extraction of unknown patterns from large amounts of data. The knowledge extracted by data mining process support a variety of domains like marketing, weather forecasting, and medical diagnosis .The process of data mining requires a large data to be collected from diverse sites. With the rapid growth of the Internet, networking, hardware and software technology there is tremendous growth in the amount of data collection and data sharing. Huge volumes of detailed data are regularly collected from organizations and such datasets also contain personal as well as sensitive data about individuals. Though the data mining operation extracts useful knowledge to support variety of domains but access to personal data poses a threat to individual privacy. There is increased concern on how sensitive and private information can be protected while performing data mining operation. Privacy preserving data mining algorithms gives solution for the privacy problem. PPDM gives valid data mining results and also guarantees privacy protection for sensitive data stored in the data warehouse. In this paper we analyzed the threats to privacy that can occur due to data mining process. We have proposed a framework that allows systemic transformation of original data using randomized data perturbation technique and the modified data is submitted as a result of query to the parties using decision tree approach. This approach gives the valid results for analysis purpose but the actual or true data is not revealed and the privacy is preserved.

Authors and Affiliations

P. Kamakshi , Dr. A. Vinaya Babu

Keywords

Related Articles

A Survey on Early Determination of Zero Quantized Coefficients in Video Coding

In video encoding, there are a large number of discrete cosine transform (DCT) coefficients of the prediction residue which are quantized to zeros. Therefore, it is desired to design a method which can early detect zero...

IMPROVED PART IDENTIFICATION AND REQUISITION USING 3D ILLUSTRATED PARTS CATALOGUES IN AEROSPACE AND DEFENSE

Part identification and requisition is being carried out in aerospace and defense using Illustrated Parts Catalogues that are in hardcopy format. This paper introduces the concept of 3D Illustrated Parts Catalogues, whic...

An Effective Round Robin Algorithm using Min-Max Dispersion Measure

Round Robin (RR) scheduling algorithm is a preemptive scheduling algorithm. It is designed especially for time sharing Operating System (OS). In RR scheduling algorithm the CPU switches between the processes when the sta...

An Efficient Pruning Technique for Mining Frequent Itemsets in Spatial Databases

Frequent Itemset Mining is evaluating the rules and relationship within the data items are optimizing it, in the large spatial databases (for e.g. Images, Docs, AVI files etc).It is one of the major problems in DM (Data...

Interactive Co-presence Environment with Mixed Reality Using Remote and Local Avatar

Recent years, with the rapid development of ICT (Information and Communication Technology) technology, there are more and more applications which can provide users with different styles of indirect communication over the...

Download PDF file
  • EP ID EP85374
  • DOI -
  • Views 150
  • Downloads 0

How To Cite

P. Kamakshi, Dr. A. Vinaya Babu (2010). Preserving the Privacy and Sharing the Data using Classification on Perturbed Data. International Journal on Computer Science and Engineering, 2(3), 860-864. https://europub.co.uk/articles/-A-85374