Preserving the Privacy and Sharing the Data using Classification on Perturbed Data

Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 3

Abstract

Data mining is a powerful tool which supports automatic extraction of unknown patterns from large amounts of data. The knowledge extracted by data mining process support a variety of domains like marketing, weather forecasting, and medical diagnosis .The process of data mining requires a large data to be collected from diverse sites. With the rapid growth of the Internet, networking, hardware and software technology there is tremendous growth in the amount of data collection and data sharing. Huge volumes of detailed data are regularly collected from organizations and such datasets also contain personal as well as sensitive data about individuals. Though the data mining operation extracts useful knowledge to support variety of domains but access to personal data poses a threat to individual privacy. There is increased concern on how sensitive and private information can be protected while performing data mining operation. Privacy preserving data mining algorithms gives solution for the privacy problem. PPDM gives valid data mining results and also guarantees privacy protection for sensitive data stored in the data warehouse. In this paper we analyzed the threats to privacy that can occur due to data mining process. We have proposed a framework that allows systemic transformation of original data using randomized data perturbation technique and the modified data is submitted as a result of query to the parties using decision tree approach. This approach gives the valid results for analysis purpose but the actual or true data is not revealed and the privacy is preserved.

Authors and Affiliations

P. Kamakshi , Dr. A. Vinaya Babu

Keywords

Related Articles

Backpropagation Learning Algorithms for Email Classification.

Today email has become one the fastest and most effective form of communication. The popularity of this mode of transmitting goods, information and services has motivated spammers to perfect their technical skills to foo...

Design of an Energy Efficient and Delay Tolerant Routing Protocol for Wireless Body Area Network

The Wireless Body Area Network provide continuous health monitoring and real-time feedback to the medical personnel. The devices used for WBAN have limited energy resources. For most devices it is impossible to recharge...

Implementation of Secured password for Web applications using two server model

The secured password is the most commonly used uthentication mechanism in security applications [11]. There ay be chances of password hacking from the hackers, so hat t is very essential to protect password informati...

An Enhanced Active contour based Segmentation for Fingerprint Extraction

Fingerprint Segmentation is one of the critical and important steps in Automatic Fingerprint Recognition System (AFIS). It is a process that separates the fingerprint image into two regions, the foreground and background...

Improved Optimal Competitive Hopfield Network for the Maximum Stable Set Problem

A large number of problems in artificial intelligence and other areas of computer science can be viewed as special cases of the Maximum Stable Set Problem (MSSP). In this paper, we propose a new approach to solve the MSS...

Download PDF file
  • EP ID EP85374
  • DOI -
  • Views 161
  • Downloads 0

How To Cite

P. Kamakshi, Dr. A. Vinaya Babu (2010). Preserving the Privacy and Sharing the Data using Classification on Perturbed Data. International Journal on Computer Science and Engineering, 2(3), 860-864. https://europub.co.uk/articles/-A-85374