Skip to main content

Fuzzy-Based Privacy Preserving Approach in Centralized Database Environment

  • Conference paper
  • First Online:
Advances in Computational Intelligence (ICCI 2015)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 509))

Included in the following conference series:

Abstract

In data mining applications, sharing of huge volume of detailed personal data is proved to be beneficial. Different types of data include criminal records, medical history, shopping habits, credit records, etc. These types of data are very much significant for any company and governments for decision making. When analyzing the data, privacy policy may avoid data owners from sharing information. In privacy preserving, data owner must provide a solution for achieving the dual goal of privacy preservation as well as accurate clustering result. Nowadays, privacy issues are challenging concern for the data miners. Privacy preservation is a multitalented task as it ensures the privacy of individuals without trailing the correctness of data mining results. This paper proposes data transformation methods for privacy preserving clustering based on fuzzy in centralized database environment. After experimenting, results proved that hybrid approach gives best results for all the member functions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  1. Ahmed, S.M.T., Haque, S., Tauhid, S.M.F.: A fuzzy based approach for privacy preserving clustering. Int. J. Sci. Eng. Res. 5(2), 1067–1071 (2014)

    Google Scholar 

  2. Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Hippocratic Databases. In: Proceedings 28th International Conference on Very Large Databases (VLDB’02), pp. 143–154 (2002)

    Google Scholar 

  3. Westin, A.F.: Freebies and privacy: what net users think, Technical Report, Opinion Research Corporation (1999)

    Google Scholar 

  4. Chen, K., Liu, L.: A random rotation perturbation approach to privacy data classification. In: Proceedings IEEE International Conference on Data Mining (ICDM), pp. 589–592 (2005)

    Google Scholar 

  5. Hall, M., Frank, E., Holmes, G., Pfahringer, B., Reutemann, P., Witten, I.H.: The WEKA data mining software: an update. SIGKDD Explor. 11(1) (2009)

    Google Scholar 

  6. Kadampur, M.A., Somayajulu, D.V.L.N., Shivaji Dhiraj, S.S., Satyam Shailesh, G.P.: Privacy preserving clustering by cluster bulging for information sustenance. In: 4th International Conference on Information and Automation for Sustainability (ICIAfS’08), Colombo, Sri Lanka (2008)

    Google Scholar 

  7. Kamakshi, P., Babu, A.V.: A novel framework to improve the quality of additive perturbation technique. In: Proceedings International Journal of Computer Applications, vol. 30, No. 6 (2011)

    Google Scholar 

  8. Karthikeyan, B., Manikandan, G., Vaithiyanathan, V.: A fuzzy based approach for privacy preserving clustering. J. Theor. Appl. Inf. Technol. vol. 32, No.2 (2011)

    Google Scholar 

  9. Korba, L.: Privacy in distributed electronic commerce. In: Proceedings 35 Hawaii International Conference on System Science, Hawaii (2002)

    Google Scholar 

  10. Li,L., Zhang, Q.: A privacy preserving clustering technique using hybrid data transformation method. In: Proceedings IEEE international conference of grey systems and intelligent services (2009)

    Google Scholar 

  11. Liu J., XU, Y.: Harbin: privacy preserving clustering by random response method of geometric transformation. In: Proceedings Fourth International Conference on Internet Computing for Science and Engineering (2009)

    Google Scholar 

  12. Naga Lakshmi, M., Sandhya Rani, K.: Privacy preserving clustering based on fuzzy data transformation methods. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 3(8), 1027–1033 (2013)

    Google Scholar 

  13. Oliveira, S.R.M., Zaiyane, O.R.: Achieving privacy preservation when sharing data for clustering. In: Proceedings Workshop on Secure Data Management in a Connected World, in Conjunction with VLDB’2004, Toronto, Ontario, Canada, 67–82 (2004)

    Google Scholar 

  14. Oliveira, S.R.M., Zaiyane, O.R.: Privacy preserving clustering by data transformation. In: Proceedings 18th Brazilian Conference on Databases (2003)

    Google Scholar 

  15. UCI Machine Learning Repository: http://archive.ics.uci.edu/ml/datasets.html

  16. Zadeh, L.A.: Fuzzy sets. Inf. Control, 8, 338–353 (1965)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to V. K. Saxena .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Science+Business Media Singapore

About this paper

Cite this paper

Saxena, V.K., Pushkar, S. (2017). Fuzzy-Based Privacy Preserving Approach in Centralized Database Environment. In: Sahana, S.K., Saha, S.K. (eds) Advances in Computational Intelligence. ICCI 2015. Advances in Intelligent Systems and Computing, vol 509. Springer, Singapore. https://doi.org/10.1007/978-981-10-2525-9_29

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-2525-9_29

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-2524-2

  • Online ISBN: 978-981-10-2525-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics