Preserving the Privacy and Sharing the Data using Classification on Perturbed Data
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 3
Abstract
Data mining is a powerful tool which supports automatic extraction of unknown patterns from large amounts of data. The knowledge extracted by data mining process support a variety of domains like marketing, weather forecasting, and medical diagnosis .The process of data mining requires a large data to be collected from diverse sites. With the rapid growth of the Internet, networking, hardware and software technology there is tremendous growth in the amount of data collection and data sharing. Huge volumes of detailed data are regularly collected from organizations and such datasets also contain personal as well as sensitive data about individuals. Though the data mining operation extracts useful knowledge to support variety of domains but access to personal data poses a threat to individual privacy. There is increased concern on how sensitive and private information can be protected while performing data mining operation. Privacy preserving data mining algorithms gives solution for the privacy problem. PPDM gives valid data mining results and also guarantees privacy protection for sensitive data stored in the data warehouse. In this paper we analyzed the threats to privacy that can occur due to data mining process. We have proposed a framework that allows systemic transformation of original data using randomized data perturbation technique and the modified data is submitted as a result of query to the parties using decision tree approach. This approach gives the valid results for analysis purpose but the actual or true data is not revealed and the privacy is preserved.
Authors and Affiliations
P. Kamakshi , Dr. A. Vinaya Babu
Wearable technology a new paradigm in Educational Universities
Wearable technology, making a mark as the emerging technology where the goal of computing is to minimize the time and accessing the technology everywhere. It helps students in many ways. For identifying buildings by comb...
A Novel Approach for Controlling a Size of a Test Suite with Simple Technique
Software testing is an important activity in the software evelopment life cycle. and also expensive phase when ompared to all other phases of the software development life cycle. Software testing purpose is to etect,s...
Multiframe Image Super-resolution – A Comparison
The subject of resolution enhancement has become one of the most important digital processing applications in recent years. This paper focuses on comparison of two multiframe image super-resolution algorithms. Variety of...
Handwritten Gurmukhi Character Recognition Using Statistical and Background Directional Distribution Features
In this manuscript handwritten Gurmukhi character recognition for isolated characters is proposed. We have used some statistical features like zonal density, projection histograms (horizontal, vertical and both diagonal)...
IMPROVED PROTECTION IN VIDEO STEGANOGRAPHY USED COMPRESSED VIDEO BITSTREAMS
In this paper propose a new method for the real-time hiding of information used in compressed video bitstreams. This method is based on the real-time hiding of information in audio steganography. This method of steganogr...