Preserving the Privacy and Sharing the Data using Classification on Perturbed Data
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 3
Abstract
Data mining is a powerful tool which supports automatic extraction of unknown patterns from large amounts of data. The knowledge extracted by data mining process support a variety of domains like marketing, weather forecasting, and medical diagnosis .The process of data mining requires a large data to be collected from diverse sites. With the rapid growth of the Internet, networking, hardware and software technology there is tremendous growth in the amount of data collection and data sharing. Huge volumes of detailed data are regularly collected from organizations and such datasets also contain personal as well as sensitive data about individuals. Though the data mining operation extracts useful knowledge to support variety of domains but access to personal data poses a threat to individual privacy. There is increased concern on how sensitive and private information can be protected while performing data mining operation. Privacy preserving data mining algorithms gives solution for the privacy problem. PPDM gives valid data mining results and also guarantees privacy protection for sensitive data stored in the data warehouse. In this paper we analyzed the threats to privacy that can occur due to data mining process. We have proposed a framework that allows systemic transformation of original data using randomized data perturbation technique and the modified data is submitted as a result of query to the parties using decision tree approach. This approach gives the valid results for analysis purpose but the actual or true data is not revealed and the privacy is preserved.
Authors and Affiliations
P. Kamakshi , Dr. A. Vinaya Babu
A Genetic Algorithm Optimized Decision Tree- SVM based Stock Market Trend Prediction System
Prediction of stock market trends has been an area of great interest both to researchers attempting to uncover the information hidden in the stock market data and for those who wish to profit by trading stocks. The extre...
Implementation and simulation of arithmetic logic unit, shifter and Multiplier in Quantum cellular automata technology
Quantum cellular automata (QCA) is a new technology in the nanometer scale and has been considered as one of the alternative to CMOS technology. QCA have a large potential in the development of circuits with high space d...
Segmentation Based Approach to Dynamic Page Construction from Search Engine Results
The results rendered by the search engines are mostly a linear snippet list. With the prolific increase in the dynamism of web pages there is a need for enhanced result lists from search engines in order to cope-up with...
Digital Eye Strain Reduction Techniques: A Review
Digital eye strain or computer vision syndrome (CVS) is caused when we spend considerable amount of time in staring at digital screens of desktop computer, laptop, e-readers, tablets and mobile phones. This paper discuss...
A Comparative Survey on Symmetric Key Encryption Techniques
Nowadays, the use of internet are growing increasingly across the world, security becomes a prime concern of issue for the society. Earlier security was a major issue for military applications but now the area of applica...