Skip to main content

Identifying Sensitive Attributes for Preserving Privacy

  • Conference paper
  • First Online:
Artificial Intelligence and Evolutionary Computations in Engineering Systems

Abstract

In recent past, the data are generated massively from medical sector due to the advancements and growth of technology leading to high-dimensional and massive data. Handling the medical data is crucial since it contains some sensitive data of the individuals. If the sensitive data is revealed to the adversaries or others then that may be vulnerable to attack. Hiding the huge volume of data is practically difficult task among the researchers. Therefore, in real life only the sensitive data are hidden from the huge volume of data for providing security since hiding the entire data is costlier. Therefore, the sensitive attributes must be identified from the huge volume of data in order to hide them for preserving the privacy. In order to identify the sensitive data to hide them for providing security, reducing the computational and transmission cost in secured data transmission, this chapter presents a pragmatic approach to identify the sensitive attributes for preserving privacy. This proposed method is tested on the various real-world datasets with different classifiers and also the results are presented.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 299.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 379.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Dong, Xinhua, R., Li, H., He, W., Zhou, Z., Xue, and H., Wu.: Secure sensitive data sharing on a big data platform. Tsinghua Science and Technology 20, 1 (2015), 72–80.

    Google Scholar 

  2. Yu, Shucheng, C., Wang, K., Ren, and W., Lou.: Attribute based data sharing with attribute revocation. In Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ACM (2010) 261–270.

    Google Scholar 

  3. Yakoubov, Sophia, V., Gadepally, N., Schear, E., Shen, and A., Yerukhimovich, A.: Survey of cryptographic approaches to securing big-data analytics in the cloud. In High Performance Extreme Computing Conference (HPEC), (2014) 1–6.

    Google Scholar 

  4. Rashid, A., Hatem, and N.B M., Yasin.: Generalization Technique for Privacy Preserving of Medical information. International Journal of Engineering and Technology 6, 4 (2014) 262.

    Google Scholar 

  5. Xu, Lei, C., Jiang, J., Wang, J., Yuan, and Y., Ren.: Information security in big data: privacy and data mining. Access, 2 (2014) 1149–1176.

    Google Scholar 

  6. Liu, Fang, X., Shu, D., Yao, and A.R., Butt.: Privacy-preserving scanning of big content for sensitive data exposure with MapReduce. In Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, (2015) 195–206.

    Google Scholar 

  7. Zhang, Xuyun, C., Liu, S., Nepal, W., Dou, and J., Chen.: Privacy-preserving layer over MapReduce on Cloud. In Cloud and Green Computing (CGC), 2012 Second International Conference on, (2012) 304–310.

    Google Scholar 

  8. Yang, Ji-Jiang, J.Q Li, and Y., Niu.: A hybrid solution for privacy preserving medical data sharing in the cloud environment. Future Generation Computer Systems 43 (2015) 74–86.

    Google Scholar 

  9. Gal, Tamas S., Z., Chen, and A., Gangopadhyay.: A privacy protection model for patient data with multiple sensitive attributes. IGI Global (2008) 28–44.

    Google Scholar 

  10. X., Ge, J., Zhu (2011). (Ed.).: Privacy-preserving data mining, “New Fundamental Technologies in Data Mining”-, Prof. Kimito Funatsu ISBN: 978-953-307-547-1, inTech.

    Google Scholar 

  11. Prabhakaran, V.M., S. Balamurugan, and S. Charanyaa.: Privacy Preserving Personal Health Care Data in Cloud.

    Google Scholar 

  12. Wang, Cong, S.S Chow, Q. Wang, K. Ren, and W. Lou.: Privacy-preserving public auditing for secure cloud storage. “Computers, IEEE Transactions” on 62, 2 (2013) 362–375.

    Google Scholar 

  13. Gupta, Niyati, A., Rawal, V.L., Narasimhan, and S., Shiwani.: Accuracy, sensitivity and specificity measurement of various classification techniques on healthcare data. IOSR J. Comput. Eng. (IOSR-JCE) 11, 5 (2013) 70–73.

    Google Scholar 

  14. Vasudevan, K., Prince.: Sensitive Attributes based Privacy Preserving in Data Mining using k-anonymity.

    Google Scholar 

  15. Liu, Yali, C., Corbett, K., Chiang, R., Archibald, B., Mukherjee, and D., Ghosal.: SIDD: A framework for detecting sensitive data exfiltration by an insider attack. In System Sciences, 2009. HICSS’09. 42nd Hawaii International Conference on, (2009) 1–10.

    Google Scholar 

  16. Gholami, Ali, and E., Laure.: Security and Privacy of Sensitive Data in Cloud Computing: A Survey of Recent Developments. (2016) 1601-01498.

    Google Scholar 

  17. C., Wang, Q., Wang, K., Ren, and W., Lou.: Ensuring Data Storage Security in Cloud Computing. In INFOCOM, (2010) 1–9.

    Google Scholar 

  18. Asir Antony Gnana Singh, D., Escalin Fernando, A., Jebamalar Leavline, E.: Performance Analysis on Clustering Approaches for Gene Expression Data. “International Journal of Advanced Research in Computer and Communication Engineering” 5, 2(2016) 196–200.

    Google Scholar 

  19. Danasingh Asir Antony Gnana Singh, S. Appavu Alias Balamurugan, and E. Jebamalar Leavline.: Literature Review on Feature Selection Methods for High-Dimensional Data. International Journal of Computer Applications, 136, 1 (2016) 9–17.

    Google Scholar 

  20. D. Asir Antony Gnana Singh, E. Jebamalar Leavline, E. Priyanka, C. Sumathi.: Feature Selection Using Rough Set for Improving the Performance of the Supervised Learner. International Journal of Advanced Science and Technology 87 (2016): 1–8.

    Google Scholar 

  21. D. Asir Antony Gnana Singh, E. Jebamalar Leavline, R. Priyanka, and P. Padma Priya.: Dimensionality Reduction using Genetic Algorithm for Improving Accuracy in Medical Diagnosis. I. J. Intelligent Systems and Applications (2016).

    Google Scholar 

  22. D. Asir Antony Gnana Singh, S. Appavu Alias Balamurugan, and E. Jebamalar Leavline.: A novel feature selection method for image classification. Optoelectronics And Advanced Materials-Rapid Communications. 9, 11–12 (2015) 1362–1368.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Balakrishnan Tamizhpoonguil .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Tamizhpoonguil, B., Singh, D.A.A.G., Leavline, E.J. (2017). Identifying Sensitive Attributes for Preserving Privacy. In: Dash, S., Vijayakumar, K., Panigrahi, B., Das, S. (eds) Artificial Intelligence and Evolutionary Computations in Engineering Systems. Advances in Intelligent Systems and Computing, vol 517. Springer, Singapore. https://doi.org/10.1007/978-981-10-3174-8_54

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-3174-8_54

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-3173-1

  • Online ISBN: 978-981-10-3174-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics