A Comparative Study of Data Perturbation Using Fuzzy Logic to Preserve Privacy

  • Thanveer JahanEmail author
  • G. Narasimha
  • C. V. Guru Rao
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 284)


The latest advances in the field of information technology have increased enormous growth in the data collection in this era. Individual’s data are shared for business or legal reasons, containing sensitive information. Sharing data is a mutual benefit for business growth. The need to preserve privacy has become a challenging problem in privacy preserving data mining. In this paper we deal with a data analysis system having sensitive information. Exposing the information of an individual leads to security threats and could be harmful. The confidential attributes are perturbed or distorted using fuzzy logic. Fuzzy logic is used to protect individual’s data to hide details of data in public. Data is owned by an authorized user, and applies distortion. The Authorized user having original dataset distorts numeric data using S-fuzzy membership function. This distorted data is published to the analyst, hiding the sensitive information present in the original data. The analysts perform data mining techniques on the distorted dataset. Accuracy is measured using classification and clustering techniques generated on distorted data is relative to the original, thus privacy is achieved. Comparison of various classifiers is generated on the original and distorted datasets.


Fuzzy Logic Authorized User Sensitive Information Data Mining Technique Fuzzy Membership Function 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    V. Estvill–Castro, L. Brankovic, D.L. Dowe, Privacy in data mining. Australian Computer Society NSW Branch. Available at
  2. 2.
    Thanveer, G. Narasimha, C.V. GuruRao, Data Perturbation and Feature Selection in Preserving Privacy, in Proceeding of the 2012 Ninth International conference in Wireless and Optical Communication Networks(WOCN), (Indore). IEEE catalog number: CFP12604-CDR, ISBN: 978-1-4673-1989-8/12Google Scholar
  3. 3.
    Pengpeng Lin, Jun Zhang, Ingrid St. Omer, Huanjing Wang, Jie Wang, in A Comparative Study on Data Perturbation with Feature Selection. Proceeding of the international multiconference of engineers and computer scientists 2011, vol. 1 (IMECS, Hongkong, 2011), 16–18 Mar 2011Google Scholar
  4. 4.
    S.E. Fienberg, J. McIntyre, Data swapping: variations on a theme by Dalenius and Reiss. J. Off. Stat. 21, 309–323 (2005)Google Scholar
  5. 5.
    K. Muralidhar, R. Sarathy, Data shuffling a new masking approach for numerical data. Manage. Sci. 52, 658–670 (2006)Google Scholar
  6. 6.
    Y. Li, S. Zhu, L. Wang, S. Jajodia, Privacy enhanced micro aggregation method, in Proceedings of 2nd International Symposium on Foundations of Information and Knowledge Systems, 2002, pp. 148–159Google Scholar
  7. 7.
    Shuting Xu, Shuhua Lai, Fast Fourier Transform based data perturbation method for privacy protection, in Proceedings of IEEE Conference on Intelligence and Security Informatics, New Brunswick New Jersey, May 2007Google Scholar
  8. 8.
    S. Mukharjee, Zhiyuan Chen, A. Gangopadhyay, A privacy preserving technique for Euclidean distance-based mining algorithms using Fourier-related transforms, VLDB J. 15, 293–315 (2006)Google Scholar
  9. 9.
    Pinkas, Cryptographic techniques for privacy- preserving data mining, ACM SIGKDD Explorations, 4(2), 12–19 (2002)Google Scholar
  10. 10.
    B. Karthikeyan, G. Manikandan, V. Vaithiyanathan, A fuzzy based approach for privacy preserving clustering. J. Theor. Appl. Inf. Technol. 32(2), 118–122 (2011)Google Scholar
  11. 11.
    R. Agrawal, R. Srikant, Privacy–preserving data mining, in Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data, San Diego, 2003, pp. 86–97Google Scholar
  12. 12.
    S. Xu, J. Zhang, D. Han, J. Wang, Data distortion for privacy protection in a terrorist analysis system, in Proceedings of the 2005 I.E. International Conference on Intelligence and Security Informatics, 2005, pp. 459–464Google Scholar
  13. 13.
    V. Vallikumari, S. Srinivasa Rao, KVSVN. Raju, KV. Ramana, BVS. Avadhani, Fuzzy based approach for privacy preserving publication of data. Int. J. Comput. Sci. Netw. Secur. 8(1), (2008)Google Scholar
  14. 14.
    L. Zadeh, Fuzzy sets. Inf. Control. 8, 338–353 (1965)CrossRefzbMATHMathSciNetGoogle Scholar
  15. 15.
    J. Timothy, Ross, Fuzzy Logic with Engineering Applications (McGraw Hill, New York/Singapore, 1997)Google Scholar
  16. 16.
    T. Jahan, G. Narsimha, C.V Guru Rao, Privacy preserving clustering on distorted data in International Organization of Scientific Research. J. Comput. Eng. ISSN: 2278–0661, ISBN: 2278–8727 5(2), 25–29 (2012)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  • Thanveer Jahan
    • 1
    Email author
  • G. Narasimha
    • 1
  • C. V. Guru Rao
    • 2
  1. 1.Department of Computer Science and EngineeringJNTUHyderabadIndia
  2. 2.Department of Computer Science and EngineeringS.R EnggWarangalIndia

Personalised recommendations