Privacy Preserving Based on PCA Transformation Using Data Perturbation Technique

Abstract

Maintain confidentiality, privacy and security research in data mining (PPDM) is one of the biggest trends. Recent advances in data collection, data dissemination and related technologies have inaugurated a new era of research where existing data mining algorithms should be reconsidered from a different point of view, this of privacy preservation. We propose a simple PCA based transformation approach for various datasets to preserve privacy and maintain accuracy based on clustering. A privacy soil, the proposal to convert the data into nature, conservation saves. The accuracy of clustering before and after privacy preserving transformation was estimated.

Authors and Affiliations

Samir Patel , Kiran R. Amin

Keywords

Related Articles

DETERMINATION OF BLOOD CAPILIARY OBSTRUCTION THROUGH LASER SPECKLE IMAGING VIA SIMULATING THE OBSTRUCTION CONDITION

Laser Speckle contrast imaging was first introduced in 1980s, since then it has emerged as a powerful tool for full-field imaging technique for blood flow measurement. In recent years laser speckle contrast imaging techn...

Technical Review of Comparative Study on Different Algorithms of Image Inpainting 

Image inpainting is the technique of restoring the lost or damaged regions or modifying the image contents imperceptibly. Image inpainting can be used to fill in the missing area in an image which is visible to human eye...

Comparative Study on Text Pattern Matching for Heterogeneous System

Pattern-matching has been routinely used in various computer applications, for example, in editors, retrieval of information either textual, image, or sound and searching nucleotide or amino acid sequence patterns in gen...

Comparison of Software Test Data for Automatic Path Coverage Using Genetic Algorithm

This paper discusses genetic algorithms that can automatically generate test cases to test selected path. This algorithm takes a selected path as a target and executes sequences of operators iteratively for test cases to...

Applicability of Soft computing technique for Crime Forecasting: A Preliminary Investigation

Soft Computing is a multidisciplinary field originally proposed by Dr. Lotfi Zadeh. It is the fusion of methodologies designed to model solution to real world problems that are otherwise difficult to model mathematically...

Download PDF file
  • EP ID EP98597
  • DOI -
  • Views 152
  • Downloads 0

How To Cite

Samir Patel, Kiran R. Amin (2013). Privacy Preserving Based on PCA Transformation Using Data Perturbation Technique. International Journal of Computer Science & Engineering Technology, 4(5), 477-484. https://europub.co.uk/articles/-A-98597