Preserving the Privacy and Sharing the Data using Classification on Perturbed Data
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 3
Abstract
Data mining is a powerful tool which supports automatic extraction of unknown patterns from large amounts of data. The knowledge extracted by data mining process support a variety of domains like marketing, weather forecasting, and medical diagnosis .The process of data mining requires a large data to be collected from diverse sites. With the rapid growth of the Internet, networking, hardware and software technology there is tremendous growth in the amount of data collection and data sharing. Huge volumes of detailed data are regularly collected from organizations and such datasets also contain personal as well as sensitive data about individuals. Though the data mining operation extracts useful knowledge to support variety of domains but access to personal data poses a threat to individual privacy. There is increased concern on how sensitive and private information can be protected while performing data mining operation. Privacy preserving data mining algorithms gives solution for the privacy problem. PPDM gives valid data mining results and also guarantees privacy protection for sensitive data stored in the data warehouse. In this paper we analyzed the threats to privacy that can occur due to data mining process. We have proposed a framework that allows systemic transformation of original data using randomized data perturbation technique and the modified data is submitted as a result of query to the parties using decision tree approach. This approach gives the valid results for analysis purpose but the actual or true data is not revealed and the privacy is preserved.
Authors and Affiliations
P. Kamakshi , Dr. A. Vinaya Babu
Centroid based Categorization Approach for Extraction of Body Sensor Network Data
Monitoring human activities using wearable wireless sensor nodes has the potential to enable many useful applications for everyday situations. The long-term lifestyle categorization can greatly improve healthcare by gath...
A Study on Similarity Computations in Template Matching Technique for Identity Verification
This paper describes a study on the development of a human face verification system by merely using template matching (TM) as the main verification engine. In contrast to common face recognition techniques, our approach...
Mining Recurrent Pattern Identification on Large Database
Recurrent pattern mining is an important problem in the context of data mining. In this paper data mining algorithms have been discussed and compared. Recurrent pattern mining has been an important area in data mining re...
Data Warehouse Schema Evolution and Adaptation Framework Using Ontology
Data Warehouse systems aim at integrating data from multiple heterogeneous, distributed, autonomous data sources. Due to changing business needs the data warehouse systems are never meant to be static. Changes in the dat...
Message Encryption Using Deceptive Text and Randomized Hashing
In this paper a new approach for message encryption using the concept called deceptive text is proposed.In this scheme we don’t need send encrypted plain text to receiver, instead, we send a meaningful deceptive text and...