Abstract
In recent past, the data are generated massively from medical sector due to the advancements and growth of technology leading to high-dimensional and massive data. Handling the medical data is crucial since it contains some sensitive data of the individuals. If the sensitive data is revealed to the adversaries or others then that may be vulnerable to attack. Hiding the huge volume of data is practically difficult task among the researchers. Therefore, in real life only the sensitive data are hidden from the huge volume of data for providing security since hiding the entire data is costlier. Therefore, the sensitive attributes must be identified from the huge volume of data in order to hide them for preserving the privacy. In order to identify the sensitive data to hide them for providing security, reducing the computational and transmission cost in secured data transmission, this chapter presents a pragmatic approach to identify the sensitive attributes for preserving privacy. This proposed method is tested on the various real-world datasets with different classifiers and also the results are presented.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Dong, Xinhua, R., Li, H., He, W., Zhou, Z., Xue, and H., Wu.: Secure sensitive data sharing on a big data platform. Tsinghua Science and Technology 20, 1 (2015), 72–80.
Yu, Shucheng, C., Wang, K., Ren, and W., Lou.: Attribute based data sharing with attribute revocation. In Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ACM (2010) 261–270.
Yakoubov, Sophia, V., Gadepally, N., Schear, E., Shen, and A., Yerukhimovich, A.: Survey of cryptographic approaches to securing big-data analytics in the cloud. In High Performance Extreme Computing Conference (HPEC), (2014) 1–6.
Rashid, A., Hatem, and N.B M., Yasin.: Generalization Technique for Privacy Preserving of Medical information. International Journal of Engineering and Technology 6, 4 (2014) 262.
Xu, Lei, C., Jiang, J., Wang, J., Yuan, and Y., Ren.: Information security in big data: privacy and data mining. Access, 2 (2014) 1149–1176.
Liu, Fang, X., Shu, D., Yao, and A.R., Butt.: Privacy-preserving scanning of big content for sensitive data exposure with MapReduce. In Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, (2015) 195–206.
Zhang, Xuyun, C., Liu, S., Nepal, W., Dou, and J., Chen.: Privacy-preserving layer over MapReduce on Cloud. In Cloud and Green Computing (CGC), 2012 Second International Conference on, (2012) 304–310.
Yang, Ji-Jiang, J.Q Li, and Y., Niu.: A hybrid solution for privacy preserving medical data sharing in the cloud environment. Future Generation Computer Systems 43 (2015) 74–86.
Gal, Tamas S., Z., Chen, and A., Gangopadhyay.: A privacy protection model for patient data with multiple sensitive attributes. IGI Global (2008) 28–44.
X., Ge, J., Zhu (2011). (Ed.).: Privacy-preserving data mining, “New Fundamental Technologies in Data Mining”-, Prof. Kimito Funatsu ISBN: 978-953-307-547-1, inTech.
Prabhakaran, V.M., S. Balamurugan, and S. Charanyaa.: Privacy Preserving Personal Health Care Data in Cloud.
Wang, Cong, S.S Chow, Q. Wang, K. Ren, and W. Lou.: Privacy-preserving public auditing for secure cloud storage. “Computers, IEEE Transactions” on 62, 2 (2013) 362–375.
Gupta, Niyati, A., Rawal, V.L., Narasimhan, and S., Shiwani.: Accuracy, sensitivity and specificity measurement of various classification techniques on healthcare data. IOSR J. Comput. Eng. (IOSR-JCE) 11, 5 (2013) 70–73.
Vasudevan, K., Prince.: Sensitive Attributes based Privacy Preserving in Data Mining using k-anonymity.
Liu, Yali, C., Corbett, K., Chiang, R., Archibald, B., Mukherjee, and D., Ghosal.: SIDD: A framework for detecting sensitive data exfiltration by an insider attack. In System Sciences, 2009. HICSS’09. 42nd Hawaii International Conference on, (2009) 1–10.
Gholami, Ali, and E., Laure.: Security and Privacy of Sensitive Data in Cloud Computing: A Survey of Recent Developments. (2016) 1601-01498.
C., Wang, Q., Wang, K., Ren, and W., Lou.: Ensuring Data Storage Security in Cloud Computing. In INFOCOM, (2010) 1–9.
Asir Antony Gnana Singh, D., Escalin Fernando, A., Jebamalar Leavline, E.: Performance Analysis on Clustering Approaches for Gene Expression Data. “International Journal of Advanced Research in Computer and Communication Engineering” 5, 2(2016) 196–200.
Danasingh Asir Antony Gnana Singh, S. Appavu Alias Balamurugan, and E. Jebamalar Leavline.: Literature Review on Feature Selection Methods for High-Dimensional Data. International Journal of Computer Applications, 136, 1 (2016) 9–17.
D. Asir Antony Gnana Singh, E. Jebamalar Leavline, E. Priyanka, C. Sumathi.: Feature Selection Using Rough Set for Improving the Performance of the Supervised Learner. International Journal of Advanced Science and Technology 87 (2016): 1–8.
D. Asir Antony Gnana Singh, E. Jebamalar Leavline, R. Priyanka, and P. Padma Priya.: Dimensionality Reduction using Genetic Algorithm for Improving Accuracy in Medical Diagnosis. I. J. Intelligent Systems and Applications (2016).
D. Asir Antony Gnana Singh, S. Appavu Alias Balamurugan, and E. Jebamalar Leavline.: A novel feature selection method for image classification. Optoelectronics And Advanced Materials-Rapid Communications. 9, 11–12 (2015) 1362–1368.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Tamizhpoonguil, B., Singh, D.A.A.G., Leavline, E.J. (2017). Identifying Sensitive Attributes for Preserving Privacy. In: Dash, S., Vijayakumar, K., Panigrahi, B., Das, S. (eds) Artificial Intelligence and Evolutionary Computations in Engineering Systems. Advances in Intelligent Systems and Computing, vol 517. Springer, Singapore. https://doi.org/10.1007/978-981-10-3174-8_54
Download citation
DOI: https://doi.org/10.1007/978-981-10-3174-8_54
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-3173-1
Online ISBN: 978-981-10-3174-8
eBook Packages: EngineeringEngineering (R0)