Abstract
Data mining includes extracting useful and interesting patterns from large dataset, to create and enhance decision support systems. Due to this, data mining has become an important component in various fields of day-to-day life including medicine, business, education, science and so on. Numerous data mining techniques have been developed. These techniques make the privacy preservation an important issue. When applying privacy preservation techniques, importance is given to the utility and information loss. In this paper we propose Preference Imposed Individual Ranking based microaggregation with Optimal Noise addition technique (P-IRON) for anonymizing the individual records. Through the experimental results, our proposed technique is validated to prevent the disclosure of sensitive data without degradation of data utilization. Our work highlights some discussions about future work and promising directions in the perspective of privacy preservation in data mining.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Dehkordi, M.N., Badie, K., Zadeh, A.K.: A novel method for privacy preserving in association rule mining based on genetic algorithms. JSW 4(6), 555–562 (2009)
Lindell, Y., Pinkas, B.: Privacy preserving data mining. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 36–54. Springer, Heidelberg (2000). doi:10.1007/3-540-44598-6_3
Agrawal, R., Srikant, R.: Privacy-preserving data mining. ACM SIGMOD Rec. 29(2), 439–450 (2000). ACM
Muralidhar, K., Parsa, R., Sarathy, R.: A general additive data perturbation method for database security. Manage. Sci. 45(10), 1399–1415 (1999)
Aggarwal, C.C., Yu, P.S.: A condensation approach to privacy preserving data mining. In: Bertino, E., Christodoulakis, S., Plexousakis, D., Christophides, V., Koubarakis, M., Böhm, K., Ferrari, E. (eds.) EDBT 2004. LNCS, vol. 2992, pp. 183–199. Springer, Heidelberg (2004). doi:10.1007/978-3-540-24741-8_12
Chen, K., Liu, L.: A random rotation perturbation approach to privacy preserving data classification (2005)
Liu, K., Kargupta, H., Ryan, J.: Random projection-based multiplicative data perturbation for privacy preserving distributed data mining. IEEE Trans. Knowl. Data Eng. 18(1), 92–106 (2006)
Chen, K., Sun, G., Liu, L.: Towards attack-resilient geometric data perturbation. In: Proceedings of the 2007 SIAM International Conference on Data Mining. Society for Industrial and Applied Mathematics (2007)
Oliveira, S.R.M., Zaiane, O.R.: Privacy preserving clustering by data transformation. J. Inf. Data Manag. 1(1), 37 (2010)
Gal, T.S., Chen, Z., Gangopadhyay, A.: A privacy protection model for patient data with multiple sensitive attributes. IGI Glob. 2, 28 (2008)
Aggarwal, C.C., Yu, P.S.: Privacy-preserving data mining: a survey. In: Gertz, M., Jajodia, S. (eds.) Handbook of Database Security, 431–460. Springer, New York (2008)
Domingo-Ferrer, J., Mateo-Sanz, J.M.: Practical data-oriented microaggregation for statistical disclosure control. IEEE Trans. Knowl. Data Eng. 14(1), 189–201 (2002)
Domingo-Ferrer, J., et al.: Efficient multivariate data-oriented microaggregation. The VLDB J. Int. J. Very Large Data Bases 15(4), 355–369 (2006)
Oganian, A., Domingo-Ferrer, J.: On the complexity of optimal microaggregation for statistical disclosure control. Stat. J. U. N. Econ. Comm. Eur. 18(4), 345–353 (2001)
Solanas, A., Martinez-Balleste, A., Domingo-Ferrer, J.: V-MDAV: a multivariate microaggregation with variable group size. In: Proceedings of the 17th COMPSTAT Symposium of the IASC, Rome (2006)
Lin, J.-L., et al.: Density-based microaggregation for statistical disclosure control. Expert Syst. Appl. 37(4), 3256–3263 (2010)
Kabir, M.E., Wang, H.: Microdata protection method through microaggregation: a median-based approach. Inf. Secur. J. Glob. Perspect. 20(1), 1–8 (2011)
Soria-Comas, J., et al.: T-Closeness through microaggregation: strict privacy with enhanced utility preservation. IEEE Trans. Knowl. Data Eng. 27(11), 3098–3110 (2015)
Sánchez, D., et al.: Utility-preserving differentially private data releases via individual ranking microaggregation. Inf. Fusion 30, 1–14 (2016)
Gal, T.S., et al.: A data recipient centered de-identification method to retain statistical attributes. J. Biomed. Inform. 50, 32–45 (2014)
Han, J., Kamber, M.: Data Mining: Concepts and Techniques. Morgan Kaufmann Publishers, San Francisco (2000)
Arumugam, G., Sulekha, V.: IMR based anonymization for privacy preservation in data mining. In: Proceedings of the 11th International Knowledge Management in Organizations Conference on the Changing Face of Knowledge Management Impacting Society. ACM (2016)
Wishart, D.: 256. Note: an algorithm for hierarchical classifications. Biometrics 25, 165–170 (1969)
Soria-Comas, J., Domingo-Ferrer, J.: Optimal data-independent noise for differential privacy. Inf. Sci. 250, 200–214 (2013)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Arumugam, G., Jane Varamani Sulekha, V. (2017). P-IRON for Privacy Preservation in Data Mining. In: Uden, L., Lu, W., Ting, IH. (eds) Knowledge Management in Organizations. KMO 2017. Communications in Computer and Information Science, vol 731. Springer, Cham. https://doi.org/10.1007/978-3-319-62698-7_34
Download citation
DOI: https://doi.org/10.1007/978-3-319-62698-7_34
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-62697-0
Online ISBN: 978-3-319-62698-7
eBook Packages: Computer ScienceComputer Science (R0)