Skip to main content

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 712))

Abstract

Data mining methods analyze the patterns found in data, irrespective of the confidential information of an individual. It has led to raise privacy concerns about confidential data. Different methods are inhibited in data mining to protect these data. Privacy preserving data mining plays a major role in protecting confidential data. The paper focuses on data perturbation method to preserve confidential data present in the real-world datasets. These identified confidential data are perturbed using fuzzy membership function (FMF) and obtains fuzzy data. The mining utility such as classification and clustering methods are used. The accuracy is determined and compared between an original data and fuzzy data. The results shown in the paper proves the proposed method is efficient in preserving confidential data.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. R. Agrawal and R. srikant “Privacy–Preserving data mining”, In proceedings of the 2000 ACM SIGMOD International Conference on management of data, pp 86–97, San Diego, CA, 2003.

    Google Scholar 

  2. V. Estvill–Castro, L. Brankovic, D.L. Dowe, “Privacy in datamining”, Australian Computer Society NSW Branch, Australia, Available at www.acs.org.au/nsw/articles/199082.html.

  3. J. Wang, W. Zhong, S. Xu, J. Zhang. “Selective Data Distortion via Structural Partition and SSVD for privacy Preseervation”, In Proceedings of the 2006 International Conference on Information & knowledge Engineering, pp: 114–120, CSREA Press, Las Vegas.

    Google Scholar 

  4. R. Agrawal, A. Evfimieski and R. Srikanth. “Information sharing across private databases”. In proceedings’ of the 2003 ACM SIGMOD International Conference on management of data, pp. 86–97, San Diego, CA, 2003.

    Google Scholar 

  5. S. Xu, J. Zhang, D. Han, J. Wang. Data distortion for privacy protection in a terrorist analysis system. in: Proceedings of the 2005 IEEE International Conference on Intelligence and Security Informatics, 2005, 459–464.

    Chapter  Google Scholar 

  6. Thanveer, G. Narasimha and C.V. Guru Rao “Data Perturbation and Feature selection in Preserving Privacy” In Proceeding of the 2012 Ninth International conference in wireless and optical communication networks (WOCN), Indore, Madhya Pradesh, India. IEEE catalog number: CFP12604-CDR, ISBN: 978-1-4673-1989-8/12.

    Google Scholar 

  7. T. Jahan, G. Narsimha, C.V Guru Rao, Privacy preserving clustering on distorted data in International Organization of Scientific Research. J. Comput. Eng. ISSN: 2278–0661, ISBN: 2278–8727 5(2), 25–29 (2012).

    Google Scholar 

  8. Thanveer Jahan, Dr. G. Narsimha, Dr. C.V. Guru Rao “A Hybrid Data Perturbation Approach To Preserve Privacy” International Journal of Scientific & Engineering Research, Volume 6, Issue 6, June-2015 1528 ISSN 2229-5518.

    Google Scholar 

  9. B. Gillburd, A. Schuster and R. Wolff. “K-TTP: A new Privacy model for large–scale distributed environments”. In Proceedings of the 10th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (kdd’04), Seattle, WA, USA, 2004.

    Google Scholar 

  10. B. Karthikeyan, G. Manikandan, V. Vaithiyanathan, A fuzzy based approach for privacy preserving clustering. J. Theor. Appl. Inf. Technol. 32(2), 118–122 (2011).

    Google Scholar 

  11. V. Vallikumari, S. Srinivasa Rao, KVSVN Raju, KV Ramana, BVS Avadhani “Fuzzy based approach for privacy preserving publication of data”, IJCSNS, Vol. 8 No. 1, January 2008.

    Google Scholar 

  12. P. Kamakshi, A. Vinaya Babu, “A Novel Framework to Improve the Quality of Additive Perturbation Technique”, In proceeding of International Journal of Computer Applications, Volume 30, No. 6, September 2011.

    Google Scholar 

  13. Aggarwal, C. C. and Yu, P. S. (2004), A condensation approach to privacy preserving data mining, in ‘Proceedings of International Conference on Extending Database Technology (EDBT)’, Vol. 2992, Springer, Heraklion, Crete, Greece, pp. 183–199.

    Chapter  Google Scholar 

  14. Zadeh L “Fuzzy sets”, Inf. Control. Vol. 8, PP, 338–353, 1965.

    Article  MathSciNet  Google Scholar 

  15. Thanveer Jahan, G. Narasimha, and C.V. Guru Rao “A Comparative Study of Data Perturbation Using Fuzzy Logic to Preserve Privacy” Networks and Communications (NetCom2013), Lecture Notes in Electrical Engineering 284, https://doi.org/10.1007/978-3-31903692-2_13, © Springer International Publishing Switzerland 2014.

    Google Scholar 

  16. Ishibuchi H., Yamamoto T.: Comparison of heuristic criteria for fuzzy rule selection in classification problems. Fuzzy Optimization and Decision Making, Vol 3, No. 2, 119–139, (2004).

    Article  MathSciNet  Google Scholar 

  17. K. Chen, and L. Liu, A Random Rotation Perturbation Approach to Privacy Data Classification, In Proc of IEEE Intl. Conf. on Data Mining (ICDM), pp. 589–592, 2005.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Thanveer Jahan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Jahan, T., Pavani, K., Narsimha, G., Guru Rao, C.V. (2018). A Data Perturbation Method to Preserve Privacy Using Fuzzy Rules. In: Bhateja, V., Tavares, J., Rani, B., Prasad, V., Raju, K. (eds) Proceedings of the Second International Conference on Computational Intelligence and Informatics . Advances in Intelligent Systems and Computing, vol 712. Springer, Singapore. https://doi.org/10.1007/978-981-10-8228-3_2

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-8228-3_2

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-8227-6

  • Online ISBN: 978-981-10-8228-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics